ffffffffff, &(0x7f0000000000)=[{0x1, 0x9, 0x1000}, {0x3, 0x1, 0x1000}, {0x2, 0x1, 0x1000}], 0x3, &(0x7f0000000080)={r0, r1+60000000}) (async) semtimedop(0xffffffffffffffff, &(0x7f0000000000)=[{0x1, 0x9, 0x1000}, {0x3, 0x1, 0x1000}, {0x2, 0x1, 0x1000}], 0x3, &(0x7f0000000080)={r0, r1+60000000}) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:09 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000080)='asymmetric\x00', 0x0, &(0x7f00000005c0)="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", 0x400, r0) 19:11:09 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, 0x0, 0x800) 19:11:09 executing program 1: ioctl$DRM_IOCTL_MODE_GETPROPBLOB(0xffffffffffffffff, 0xc01064ac, &(0x7f0000001580)={0x0, 0x1000, &(0x7f0000000580)=""/4096}) 19:11:09 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x34, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:09 executing program 1: ioctl$DRM_IOCTL_MODE_GETPROPBLOB(0xffffffffffffffff, 0xc01064ac, &(0x7f0000001580)={0x0, 0x1000, &(0x7f0000000580)=""/4096}) 19:11:09 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000080)='asymmetric\x00', 0x0, &(0x7f00000005c0)="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", 0x400, r0) 19:11:09 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x78, r1, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_LEVEL={0x44, 0x2b, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x2}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x1}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x9}, @NL802154_SECLEVEL_ATTR_FRAME={0x8}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x1}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x3}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x9}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:09 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:09 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, 0x0, 0x800) 19:11:09 executing program 1: r0 = syz_open_dev$dri(0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r0, 0xc01064ac, &(0x7f0000001580)={0x0, 0x1000, &(0x7f0000000580)=""/4096}) 19:11:09 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000080)='asymmetric\x00', 0x0, &(0x7f00000005c0)="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", 0x401, r0) 19:11:09 executing program 4: r0 = msgget$private(0x0, 0x58c) msgctl$IPC_RMID(r0, 0x0) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:09 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:09 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:09 executing program 1: r0 = syz_open_dev$dri(0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r0, 0xc01064ac, &(0x7f0000001580)={0x0, 0x1000, &(0x7f0000000580)=""/4096}) 19:11:09 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000080)='asymmetric\x00', 0x0, &(0x7f00000005c0)="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", 0x400, r0) 19:11:09 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:09 executing program 1: r0 = syz_open_dev$dri(0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r0, 0xc01064ac, &(0x7f0000001580)={0x0, 0x1000, &(0x7f0000000580)=""/4096}) 19:11:09 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:09 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000080)='asymmetric\x00', 0x0, &(0x7f00000005c0)="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", 0x400, r0) 19:11:09 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:09 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:09 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:10 executing program 4: r0 = msgget$private(0x0, 0x58c) msgctl$IPC_RMID(r0, 0x0) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:10 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000400), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r0, 0xc01064ac, &(0x7f0000001580)={0x0, 0x1000, &(0x7f0000000580)=""/4096}) 19:11:10 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000080)='asymmetric\x00', 0x0, &(0x7f00000005c0)="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", 0x400, r0) 19:11:10 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:10 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:10 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:10 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:10 executing program 0: add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000080)='asymmetric\x00', 0x0, &(0x7f00000005c0)="4e0dc2e40618a77f5193b0abe02c58c3f3fc455f49b4015597a39d7a04d5c5eac22d8421b54fb0dfaacbc0e7d05de57dde87029b6c7f2b3008059aaee8a74d1f0034b36fb3bb5d4391ad97d63c30d06612cafcda39eec417a64085507b9e78f2f165ac46360272c4cc998973ff488f3ab7b94750f32e271f3d346b3019896a61dc63f8c3a9d82a397a9746f34f2a300604f682069c77371566ace633272de3a13748b92e28ebe0d741ad89d88239a8a4471b8ed6e5a997e27ded43620a5db4fd8787e3327aa142b5ddcc3a48ff66141b9dd49dde44e12223564bcb63b3e977515640dcb49498fec5286712d2ac09f545b01a5225b80b136407c809cf6aeee6bef275b3f5fa27c296003e5acb56f815366c531bc98f297913445a1a851971537948fc90ef97903c79210c2ec864a232f25a7ad74f3d346f6017e7d07ee54de29aafe7dc6ec57dc993088e5f08a5cbb136b92772c46e7799d59ce73c672e62df3972333b71df76bc87e3305192801ed2ce56eed0da4b50b8e2b22d8dbeb6ec7fba7042bd1422d82bb374a283fbcc684885f9b64b76443e9beed0eca99e754d029a3f2450cf5e10f92814d566c9fe6ad7bc08aabcb54fc7a3cd62eb89af460e73671d0c1b2559e62a734dc9bfbe7d85b6a289cd8fe09d5f36cc300e5beef87480cce0a5c1bf2d487ba7019a63cc1f4b080eb1a970e98776e7139945f392307ef535bd0a7db2a87e83db1561c743661ef368ac55224d467d821906922f4945fe666d0ae8496a82b6d89e6d0cbe4880e4b47153e7055e2c5ed1bdc9ab0e697e70b8d6ec4ed4de6a13e62dbedc06fd4abcbc8e1ce383119498749a5b28b2360c19c8ff447c0b79dd16f6eb694c921c948726d336b8928426e0cc532b80ab5667460995fbda0f862afc2f62ad73155d1c9c6a5e4273de29934e0933b80e516ba3198748baad25ff31a2822c9b67c2e5cf46b314653cfe89be2328a0699a26e268765dc821b5f0f2b7c28c6f66ec5f89f8d5492b20645c0f53810667a8b9fad847e7e79205829039b9c798b0647602ab19297b85c363ab5d36645de154e7cd8afa03ec40566bd899d5684d29c0221e75cbd9233c514ce0635b3f6101c958c4d2a01a1b7bef8f889cee883360e641db2eb05a1a0342a8c68d4ba5da2fea396f7131f7360bb1309b9af72a23fa25dc7ebb7274b669f03e738ce97e78edf6c7ab71eb307aae04cfd97e39562e74d9b6f3082f224f355260459ba256293b4684d1ac8ee8006ecfc6a72a146259ed605a480ff99939640fd2294cbb995c47497ef2faabff3619451fe1a4a75de111c11817f736544f406f2d729476cb781f14d8cff048af7f2648a0addd007aaa0bd1bb2ca7003b45b3b6f2903b436fa43f9df3ab1575788fb96dde787ee77f357a0a2bb4c640906de14851f8d57754b6699c0d1577f81bc4bba9", 0x401, 0x0) 19:11:10 executing program 1: syz_open_dev$dri(&(0x7f0000000400), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(0xffffffffffffffff, 0xc01064ac, &(0x7f0000001580)={0x0, 0x1000, &(0x7f0000000580)=""/4096}) 19:11:10 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:10 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:10 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:10 executing program 4: r0 = msgget$private(0x0, 0x58c) msgctl$IPC_RMID(r0, 0x0) (async, rerun: 32) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (rerun: 32) 19:11:10 executing program 1: syz_open_dev$dri(&(0x7f0000000400), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(0xffffffffffffffff, 0xc01064ac, &(0x7f0000001580)={0x0, 0x1000, &(0x7f0000000580)=""/4096}) 19:11:10 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:10 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:10 executing program 0: add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000080)='asymmetric\x00', 0x0, &(0x7f00000005c0)="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", 0x401, 0x0) 19:11:10 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2c, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:10 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2c, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:10 executing program 0: add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000080)='asymmetric\x00', 0x0, &(0x7f00000005c0)="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", 0x401, 0x0) 19:11:10 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:10 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x34, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:10 executing program 1: syz_open_dev$dri(&(0x7f0000000400), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(0xffffffffffffffff, 0xc01064ac, &(0x7f0000001580)={0x0, 0x1000, &(0x7f0000000580)=""/4096}) 19:11:10 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2c, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:11 executing program 4: r0 = getpgrp(0xffffffffffffffff) r1 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040)=0x0, &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r1, 0x0, 0x0], 0x9}, 0x58) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x88000, 0x0) r4 = getpgrp(r0) syz_clone3(&(0x7f0000000280)={0x812e2b80, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x3d}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, r2, 0xffffffffffffffff, 0x0, 0x0, r0, 0x0, r4], 0x9, {r3}}, 0x58) syz_clone3(&(0x7f0000000000)={0xe6004100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'wpan0\x00'}) 19:11:11 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:11 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x34, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:11 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x78, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_LEVEL={0x44, 0x2b, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x2}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x1}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x9}, @NL802154_SECLEVEL_ATTR_FRAME={0x8}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x1}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x3}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x9}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:11 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:11 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000400), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r0, 0xc01064ac, 0x0) 19:11:11 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:11 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x34, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:11 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x78, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_LEVEL={0x44, 0x2b, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x2}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x1}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x9}, @NL802154_SECLEVEL_ATTR_FRAME={0x8}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x1}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x3}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x9}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:11 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x34, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:11 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000400), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r0, 0xc01064ac, 0x0) 19:11:11 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:11 executing program 4: getpgrp(0xffffffffffffffff) (async) r0 = getpgrp(0xffffffffffffffff) r1 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r1, 0x0, 0x0], 0x9}, 0x58) (async) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040)=0x0, &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r1, 0x0, 0x0], 0x9}, 0x58) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x88000, 0x0) r4 = getpgrp(r0) syz_clone3(&(0x7f0000000280)={0x812e2b80, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x3d}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, r2, 0xffffffffffffffff, 0x0, 0x0, r0, 0x0, r4], 0x9, {r3}}, 0x58) syz_clone3(&(0x7f0000000000)={0xe6004100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'wpan0\x00'}) 19:11:11 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000400), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r0, 0xc01064ac, 0x0) 19:11:11 executing program 0: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2c, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:11 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x78, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_LEVEL={0x44, 0x2b, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x2}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x1}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x9}, @NL802154_SECLEVEL_ATTR_FRAME={0x8}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x1}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x3}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x9}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:11 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2c, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:11 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:12 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x78, r1, 0x0, 0x70bd29, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_LEVEL={0x44, 0x2b, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x2}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x1}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x9}, @NL802154_SECLEVEL_ATTR_FRAME={0x8}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x1}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x3}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x9}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:12 executing program 0: r0 = getpgrp(0xffffffffffffffff) r1 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040)=0x0, &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r1, 0x0, 0x0], 0x9}, 0x58) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x88000, 0x0) r4 = getpgrp(r0) syz_clone3(&(0x7f0000000280)={0x812e2b80, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x3d}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, r2, 0xffffffffffffffff, 0x0, 0x0, r0, 0x0, r4], 0x9, {r3}}, 0x58) syz_clone3(&(0x7f0000000000)={0xe6004100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'wpan0\x00'}) 19:11:12 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:12 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000400), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r0, 0xc01064ac, &(0x7f0000001580)={0x0, 0x0, 0x0}) 19:11:12 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2c, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:12 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:12 executing program 4: r0 = getpgrp(0xffffffffffffffff) (async) r1 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040)=0x0, &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r1, 0x0, 0x0], 0x9}, 0x58) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x88000, 0x0) r4 = getpgrp(r0) syz_clone3(&(0x7f0000000280)={0x812e2b80, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x3d}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, r2, 0xffffffffffffffff, 0x0, 0x0, r0, 0x0, r4], 0x9, {r3}}, 0x58) syz_clone3(&(0x7f0000000000)={0xe6004100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'wpan0\x00'}) 19:11:12 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x78, r1, 0x0, 0x70bd29, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_LEVEL={0x44, 0x2b, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x2}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x1}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x9}, @NL802154_SECLEVEL_ATTR_FRAME={0x8}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x1}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x3}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x9}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:12 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:12 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2c, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:12 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:12 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, 0x0, 0x800) 19:11:12 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x78, r1, 0x0, 0x70bd29, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_LEVEL={0x44, 0x2b, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x2}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x1}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x9}, @NL802154_SECLEVEL_ATTR_FRAME={0x8}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x1}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x3}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x9}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:12 executing program 0: r0 = msgget$private(0x0, 0x58c) msgctl$IPC_RMID(r0, 0x0) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:12 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x78, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_LEVEL={0x44, 0x2b, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x2}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x1}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x9}, @NL802154_SECLEVEL_ATTR_FRAME={0x8}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x1}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x3}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x9}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:12 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x800) 19:11:12 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, 0x0, 0x800) 19:11:12 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, 0x0, 0x800) 19:11:12 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6024000, 0x0, 0x0, 0x0, {0x3c}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = mq_open(&(0x7f0000000000)='\x00', 0x0, 0x150, &(0x7f0000000040)={0x6, 0xc000000, 0x2}) mq_timedsend(r0, &(0x7f0000000080)="0206aa183c2d9f2eeb105ab87cf5a5c2ed0594e992ff13f7ed463f08054d00ae8d45e0976a7fb9ab289ee40479110f25b3616165479efa49dbad724762f8e47492", 0x41, 0x1000, &(0x7f0000000100)={0x77359400}) 19:11:12 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x78, r1, 0x1, 0x0, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_LEVEL={0x44, 0x2b, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x2}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x1}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x9}, @NL802154_SECLEVEL_ATTR_FRAME={0x8}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x1}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x3}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x9}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:12 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x0) 19:11:12 executing program 1: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x3}, 0x48) 19:11:12 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, 0x0, 0x800) 19:11:13 executing program 5: syz_io_uring_setup(0x2238, &(0x7f0000000000)={0x0, 0x20da, 0x2000, 0x6, 0x1fe}, &(0x7f0000000080), &(0x7f0000000380)=0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) syz_io_uring_submit(0x0, r0, &(0x7f0000000340)=@IORING_OP_RECVMSG={0xa, 0x22, 0x1, r1, 0x0, &(0x7f0000000300)={&(0x7f0000000100)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000180)=""/125, 0x7d}, {&(0x7f0000000200)=""/67, 0x43}, {&(0x7f0000000280)=""/11, 0xb}], 0x3}, 0x0, 0x2000, 0x0, {0x1}}) syz_io_uring_submit(0x0, r0, &(0x7f0000000280)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x40, 0x2000, @fd_index=0x5, 0xb819, 0x0, 0x0, 0x8, 0x0, {0x3}}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, 0x0, 0x0) setsockopt$PNPIPE_ENCAP(r2, 0x113, 0x1, &(0x7f00000003c0)=0x1, 0x4) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) getegid() add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "0970deee64b6d7145ffea5bf7ef05c3b84e35def3dffff5a166347dd6c6d448053acb6e600735bb47bc528ac440bf31ad286b0761c2f861156756d7898835df0", 0x2b}, 0x48, r3) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000400), 0x101000, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r2, 0xc0287c02, &(0x7f0000000500)={0x80000000, &(0x7f0000000440), &(0x7f0000000480)=[{{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_ENTITIES(r4, 0xc1007c01, &(0x7f00000005c0)={r5}) r6 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r6) r7 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r6) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0x17, 0x7f, 0x68a0, 0x8000, 0x2010, 0xffffffffffffffff, 0x1ff, '\x00', 0x0, r2, 0x2, 0x1, 0x2}, 0x48) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000740)={0x0, 0x6, 0x10}, 0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) r11 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r12 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r11, 0x10000000) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x5, 0x1, 0x3f, 0x9, 0x10, r11, 0x61, '\x00', r10, r12, 0x0, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b40)={0x6, 0x2a, &(0x7f0000000780)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x99}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x8}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000900)='syzkaller\x00', 0xe2000000, 0xe5, &(0x7f0000000940)=""/229, 0x40f00, 0x24, '\x00', r10, 0x25, r4, 0x8, &(0x7f0000000a40)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000a80)={0x2, 0x3, 0xf13cd3e6, 0x7}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000ac0)=[{0x3, 0x2, 0x10}, {0x4, 0x1, 0x7, 0x7}, {0x4, 0x3, 0x2, 0x4}, {0x3, 0x2, 0xe}, {0x3, 0x4, 0x8, 0xc}], 0x10, 0xfffffffe}, 0x90) r13 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$search(0xa, r7, &(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={'syz', 0x3}, r13) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x3, r7) 19:11:13 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:13 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x78, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_LEVEL={0x44, 0x2b, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x2}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x1}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x9}, @NL802154_SECLEVEL_ATTR_FRAME={0x8}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x1}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x3}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x9}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:13 executing program 0: r0 = msgget$private(0x0, 0x58c) msgctl$IPC_RMID(r0, 0x0) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:13 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:13 executing program 5: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x200000, 0x0, 0x0}, 0x58) 19:11:13 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x34, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:13 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6024000, 0x0, 0x0, 0x0, {0x3c}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) syz_clone3(&(0x7f00000011c0)={0xf6024000, 0x0, 0x0, 0x0, {0x3c}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = mq_open(&(0x7f0000000000)='\x00', 0x0, 0x150, &(0x7f0000000040)={0x6, 0xc000000, 0x2}) mq_timedsend(r0, &(0x7f0000000080)="0206aa183c2d9f2eeb105ab87cf5a5c2ed0594e992ff13f7ed463f08054d00ae8d45e0976a7fb9ab289ee40479110f25b3616165479efa49dbad724762f8e47492", 0x41, 0x1000, &(0x7f0000000100)={0x77359400}) 19:11:13 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:13 executing program 5: r0 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r0, 0x0, 0x0], 0x9}, 0x58) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={'\x00', 0x5, 0x1, 0x4, 0x5, 0xd0, r0}) r1 = mq_open(&(0x7f0000000000)=')#(%\x00', 0xc2, 0x80, &(0x7f0000000040)={0x180000, 0x1, 0xffffffff, 0xda6}) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) mq_getsetattr(r1, &(0x7f0000000300)={0x2, 0x9, 0x608000000000000, 0x2}, &(0x7f0000000340)) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$unlink(0xa, r2, 0xfffffffffffffffa) 19:11:13 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:13 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r2 = semget(0x1, 0x4, 0x208) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_LLC_SDREQ(r5, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xb8, 0x0, 0x28, 0x70bd27, 0x25dfdbff, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_LLC_SDP={0x9c, 0x13, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [{0xc, 0x1, 'keyring\x00'}, {0xc, 0x1, 'keyring\x00'}, {0xc, 0x1, 'keyring\x00'}, {0x7, 0x1, 'syz'}, {0xc, 0x1, 'oe\x7fring\x00'}, {0x7, 0x1, 'syz'}, {0x7, 0x1, 'syz'}]}, {0xc, 0x0, 0x0, 0x1, [{0x7, 0x1, 'syz'}]}, {0xc, 0x0, 0x0, 0x1, [{0x7, 0x1, '*-$'}]}, {0x34, 0x0, 0x0, 0x1, [{0xc, 0x1, 'keyring\x00'}, {0xa, 0x1, '\\]&]]$'}, {0xc, 0x1, 'keyring\x00'}, {0xc, 0x1, '\xc8)}]::+,'}]}]}]}, 0xb8}}, 0x41) semtimedop(r2, &(0x7f0000000400)=[{0x0, 0x3, 0x800}], 0x1, &(0x7f0000000480)={r3, r4+10000000}) semctl$SETALL(r2, 0x0, 0x11, &(0x7f0000000080)=[0x5, 0x401, 0x27a, 0x5]) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x3, r1) 19:11:13 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:13 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:13 executing program 0: syz_clone3(&(0x7f00000011c0)={0xf6024000, 0x0, 0x0, 0x0, {0x3c}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = mq_open(&(0x7f0000000000)='\x00', 0x0, 0x150, &(0x7f0000000040)={0x6, 0xc000000, 0x2}) mq_timedsend(r0, &(0x7f0000000080)="0206aa183c2d9f2eeb105ab87cf5a5c2ed0594e992ff13f7ed463f08054d00ae8d45e0976a7fb9ab289ee40479110f25b3616165479efa49dbad724762f8e47492", 0x41, 0x1000, &(0x7f0000000100)={0x77359400}) 19:11:13 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000440)={&(0x7f0000000340), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x8c, r1, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_SEC_LEVEL={0x3c, 0x2b, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x5}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x1f}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x1f}, @NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x3}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}]}, @NL802154_ATTR_SEC_LEVEL={0x14, 0x2b, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x1}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}]}, 0x8c}, 0x1, 0x0, 0x0, 0x4000}, 0x4040000) keyctl$unlink(0xa, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x2, 0x80000000) 19:11:13 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:13 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) r4 = semget(0x0, 0x1, 0x4) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) r5 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$search(0xa, r3, &(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, r0) r6 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$negate(0xd, r0, 0x2, r2) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, r6) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r7) keyctl$KEYCTL_MOVE(0x1e, r5, r7, r0, 0x1) add_key$keyring(&(0x7f0000000440), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x3, r1) r8 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$unlink(0x9, 0x0, r8) r9 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r9) keyctl$clear(0x7, r9) r10 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="0d31c7a9a6602d63230da35467728c150e32f7a4708289ea287edd57a9e1a0efe023b1c729e42d6ed2ce963e0cfd03eb23921cb34ee035bc58e534573112c416bcc1075c15173df824f32864598f95aac5a05954ecbbc35722f8211689a2ecfefe7f", 0x62, r2) r11 = add_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)="3039a03009e7ee65a7026deb8b8ca7f096d9437cf4431505c13b00c643765cc518eda3a0e8bd6d878407bb9ae033856205ab8e90d5151cc0bf7927dd2d4ce43dd49775244494cd835456dfb15c06a9b59fa502", 0x53, r1) syz_io_uring_setup(0x5748, &(0x7f0000000300)={0x0, 0x0, 0x2}, &(0x7f0000000380), &(0x7f00000003c0)) keyctl$search(0xa, r10, &(0x7f0000000180)='cifs.spnego\x00', &(0x7f00000001c0)={'syz', 0x1}, r11) add_key(&(0x7f0000000380)='big_key\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, r11) socket$packet(0x11, 0x2, 0x300) 19:11:13 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:14 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:14 executing program 5: r0 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r0, 0x0, 0x0], 0x9}, 0x58) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={'\x00', 0x5, 0x1, 0x4, 0x5, 0xd0, r0}) r1 = mq_open(&(0x7f0000000000)=')#(%\x00', 0xc2, 0x80, &(0x7f0000000040)={0x180000, 0x1, 0xffffffff, 0xda6}) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) mq_getsetattr(r1, &(0x7f0000000300)={0x2, 0x9, 0x608000000000000, 0x2}, &(0x7f0000000340)) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$unlink(0xa, r2, 0xfffffffffffffffa) 19:11:14 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:14 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6024000, 0x0, 0x0, 0x0, {0x3c}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = mq_open(&(0x7f0000000000)='\x00', 0x0, 0x150, &(0x7f0000000040)={0x6, 0xc000000, 0x2}) mq_timedsend(r0, &(0x7f0000000080)="0206aa183c2d9f2eeb105ab87cf5a5c2ed0594e992ff13f7ed463f08054d00ae8d45e0976a7fb9ab289ee40479110f25b3616165479efa49dbad724762f8e47492", 0x41, 0x1000, &(0x7f0000000100)={0x77359400}) 19:11:14 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) r4 = semget(0x0, 0x1, 0x4) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) r5 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$search(0xa, r3, &(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, r0) r6 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$negate(0xd, r0, 0x2, r2) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, r6) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r7) keyctl$KEYCTL_MOVE(0x1e, r5, r7, r0, 0x1) add_key$keyring(&(0x7f0000000440), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x3, r1) r8 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$unlink(0x9, 0x0, r8) r9 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r9) keyctl$clear(0x7, r9) r10 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="0d31c7a9a6602d63230da35467728c150e32f7a4708289ea287edd57a9e1a0efe023b1c729e42d6ed2ce963e0cfd03eb23921cb34ee035bc58e534573112c416bcc1075c15173df824f32864598f95aac5a05954ecbbc35722f8211689a2ecfefe7f", 0x62, r2) r11 = add_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)="3039a03009e7ee65a7026deb8b8ca7f096d9437cf4431505c13b00c643765cc518eda3a0e8bd6d878407bb9ae033856205ab8e90d5151cc0bf7927dd2d4ce43dd49775244494cd835456dfb15c06a9b59fa502", 0x53, r1) syz_io_uring_setup(0x5748, &(0x7f0000000300)={0x0, 0x0, 0x2}, &(0x7f0000000380), &(0x7f00000003c0)) keyctl$search(0xa, r10, &(0x7f0000000180)='cifs.spnego\x00', &(0x7f00000001c0)={'syz', 0x1}, r11) add_key(&(0x7f0000000380)='big_key\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, r11) socket$packet(0x11, 0x2, 0x300) 19:11:14 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:14 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:14 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:14 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) r4 = semget(0x0, 0x1, 0x4) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) r5 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$search(0xa, r3, &(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, r0) r6 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$negate(0xd, r0, 0x2, r2) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, r6) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r7) keyctl$KEYCTL_MOVE(0x1e, r5, r7, r0, 0x1) add_key$keyring(&(0x7f0000000440), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x3, r1) r8 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$unlink(0x9, 0x0, r8) r9 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r9) keyctl$clear(0x7, r9) r10 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="0d31c7a9a6602d63230da35467728c150e32f7a4708289ea287edd57a9e1a0efe023b1c729e42d6ed2ce963e0cfd03eb23921cb34ee035bc58e534573112c416bcc1075c15173df824f32864598f95aac5a05954ecbbc35722f8211689a2ecfefe7f", 0x62, r2) r11 = add_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)="3039a03009e7ee65a7026deb8b8ca7f096d9437cf4431505c13b00c643765cc518eda3a0e8bd6d878407bb9ae033856205ab8e90d5151cc0bf7927dd2d4ce43dd49775244494cd835456dfb15c06a9b59fa502", 0x53, r1) syz_io_uring_setup(0x5748, &(0x7f0000000300)={0x0, 0x0, 0x2}, &(0x7f0000000380), &(0x7f00000003c0)) keyctl$search(0xa, r10, &(0x7f0000000180)='cifs.spnego\x00', &(0x7f00000001c0)={'syz', 0x1}, r11) add_key(&(0x7f0000000380)='big_key\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, r11) socket$packet(0x11, 0x2, 0x300) 19:11:14 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:14 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) r4 = semget(0x0, 0x1, 0x4) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) r5 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$search(0xa, r3, &(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, r0) r6 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$negate(0xd, r0, 0x2, r2) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, r6) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r7) keyctl$KEYCTL_MOVE(0x1e, r5, r7, r0, 0x1) add_key$keyring(&(0x7f0000000440), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x3, r1) r8 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$unlink(0x9, 0x0, r8) r9 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r9) keyctl$clear(0x7, r9) r10 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="0d31c7a9a6602d63230da35467728c150e32f7a4708289ea287edd57a9e1a0efe023b1c729e42d6ed2ce963e0cfd03eb23921cb34ee035bc58e534573112c416bcc1075c15173df824f32864598f95aac5a05954ecbbc35722f8211689a2ecfefe7f", 0x62, r2) r11 = add_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)="3039a03009e7ee65a7026deb8b8ca7f096d9437cf4431505c13b00c643765cc518eda3a0e8bd6d878407bb9ae033856205ab8e90d5151cc0bf7927dd2d4ce43dd49775244494cd835456dfb15c06a9b59fa502", 0x53, r1) syz_io_uring_setup(0x5748, &(0x7f0000000300)={0x0, 0x0, 0x2}, &(0x7f0000000380), &(0x7f00000003c0)) keyctl$search(0xa, r10, &(0x7f0000000180)='cifs.spnego\x00', &(0x7f00000001c0)={'syz', 0x1}, r11) add_key(&(0x7f0000000380)='big_key\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, r11) socket$packet(0x11, 0x2, 0x300) 19:11:14 executing program 5: r0 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r0, 0x0, 0x0], 0x9}, 0x58) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={'\x00', 0x5, 0x1, 0x4, 0x5, 0xd0, r0}) r1 = mq_open(&(0x7f0000000000)=')#(%\x00', 0xc2, 0x80, &(0x7f0000000040)={0x180000, 0x1, 0xffffffff, 0xda6}) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) mq_getsetattr(r1, &(0x7f0000000300)={0x2, 0x9, 0x608000000000000, 0x2}, &(0x7f0000000340)) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$unlink(0xa, r2, 0xfffffffffffffffa) 19:11:14 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) r4 = semget(0x0, 0x1, 0x4) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) r5 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$search(0xa, r3, &(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, r0) r6 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$negate(0xd, r0, 0x2, r2) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, r6) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r7) keyctl$KEYCTL_MOVE(0x1e, r5, r7, r0, 0x1) add_key$keyring(&(0x7f0000000440), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x3, r1) r8 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$unlink(0x9, 0x0, r8) r9 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r9) keyctl$clear(0x7, r9) r10 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="0d31c7a9a6602d63230da35467728c150e32f7a4708289ea287edd57a9e1a0efe023b1c729e42d6ed2ce963e0cfd03eb23921cb34ee035bc58e534573112c416bcc1075c15173df824f32864598f95aac5a05954ecbbc35722f8211689a2ecfefe7f", 0x62, r2) r11 = add_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)="3039a03009e7ee65a7026deb8b8ca7f096d9437cf4431505c13b00c643765cc518eda3a0e8bd6d878407bb9ae033856205ab8e90d5151cc0bf7927dd2d4ce43dd49775244494cd835456dfb15c06a9b59fa502", 0x53, r1) syz_io_uring_setup(0x5748, &(0x7f0000000300)={0x0, 0x0, 0x2}, &(0x7f0000000380), &(0x7f00000003c0)) keyctl$search(0xa, r10, &(0x7f0000000180)='cifs.spnego\x00', &(0x7f00000001c0)={'syz', 0x1}, r11) add_key(&(0x7f0000000380)='big_key\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, r11) socket$packet(0x11, 0x2, 0x300) 19:11:14 executing program 4: r0 = syz_clone3(&(0x7f00000011c0)={0xb6004400, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r1, 0x0, 0x0], 0x9}, 0x58) r2 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r2, 0x0, 0x0], 0x9}, 0x58) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)=ANY=[@ANYBLOB="010000000400000000000001", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00800000000000002e2f66696c653000"]) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x410100, 0x0) r7 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r6, 0x10000000) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x5, 0x1, 0x3f, 0x9, 0x10, r6, 0x61, '\x00', r5, r7, 0x0, 0x2}, 0x48) syz_io_uring_setup(0x77de, &(0x7f0000000380)={0x0, 0xf99a, 0x200, 0x3, 0x19c, 0x0, r7}, &(0x7f0000000400)=0x0, &(0x7f0000000440)) r9 = mmap$IORING_OFF_SQES(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x7, 0x8010, r4, 0x10000000) syz_io_uring_submit(r8, r9, 0xfffffffffffffffe) r10 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r10, 0x114, 0x7, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x9, 0x0, r4, 0x9, '\x00', r5, r10, 0x4, 0x0, 0x1}, 0x48) syz_clone3(&(0x7f0000000280)={0x4000000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x21}, &(0x7f00000000c0)=""/142, 0x8e, &(0x7f0000000180)=""/71, &(0x7f0000000200)=[0x0, r1, r0, r0, r0, r2], 0x6, {r3}}, 0x58) 19:11:14 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:14 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:14 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) r4 = semget(0x0, 0x1, 0x4) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) r5 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$search(0xa, r3, &(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, r0) r6 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$negate(0xd, r0, 0x2, r2) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, r6) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r7) keyctl$KEYCTL_MOVE(0x1e, r5, r7, r0, 0x1) add_key$keyring(&(0x7f0000000440), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x3, r1) r8 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$unlink(0x9, 0x0, r8) r9 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r9) keyctl$clear(0x7, r9) r10 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="0d31c7a9a6602d63230da35467728c150e32f7a4708289ea287edd57a9e1a0efe023b1c729e42d6ed2ce963e0cfd03eb23921cb34ee035bc58e534573112c416bcc1075c15173df824f32864598f95aac5a05954ecbbc35722f8211689a2ecfefe7f", 0x62, r2) r11 = add_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)="3039a03009e7ee65a7026deb8b8ca7f096d9437cf4431505c13b00c643765cc518eda3a0e8bd6d878407bb9ae033856205ab8e90d5151cc0bf7927dd2d4ce43dd49775244494cd835456dfb15c06a9b59fa502", 0x53, r1) syz_io_uring_setup(0x5748, &(0x7f0000000300)={0x0, 0x0, 0x2}, &(0x7f0000000380), &(0x7f00000003c0)) keyctl$search(0xa, r10, &(0x7f0000000180)='cifs.spnego\x00', &(0x7f00000001c0)={'syz', 0x1}, r11) add_key(&(0x7f0000000380)='big_key\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, r11) socket$packet(0x11, 0x2, 0x300) 19:11:14 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key(&(0x7f0000000080)='.dead\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="2f0679530d52f6f60b81eb2fa267048e02e21633c3b4cdc99de6c42f0dd274669e0e5bc7de6c69eede84ea6cad9f8fc2e13494d4b7d040c5605a33d339f55d6081744c1e9b27c2bd5d8d2715b2730045be5e7948666407810176238e2888fb9b98ef8fd7f445728721b0fe8b09bd6ab73431da4d63caa1713b99ca40823dd9aef0c6128b1884c1bc9293a18a6fb4d482a99244a973aea2d1455ff463301cb1f4a2ee0ad398c98f98b0700ec1f6c097215707e37ef086ab25ce51c8bcec166e11bb7647b6fa726f14f24c3793cc3a45cde44ef05c24b3bafb90e8da764fdc18630b3ccd1788041fa5a06c39f5a5bcc73d22", 0xf1, r0) keyctl$negate(0xd, r1, 0x5, r2) r3 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) keyctl$negate(0xd, r3, 0x8, r0) 19:11:14 executing program 5: r0 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r0, 0x0, 0x0], 0x9}, 0x58) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={'\x00', 0x5, 0x1, 0x4, 0x5, 0xd0, r0}) r1 = mq_open(&(0x7f0000000000)=')#(%\x00', 0xc2, 0x80, &(0x7f0000000040)={0x180000, 0x1, 0xffffffff, 0xda6}) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) mq_getsetattr(r1, &(0x7f0000000300)={0x2, 0x9, 0x608000000000000, 0x2}, &(0x7f0000000340)) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) 19:11:14 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key(&(0x7f0000000080)='.dead\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="2f0679530d52f6f60b81eb2fa267048e02e21633c3b4cdc99de6c42f0dd274669e0e5bc7de6c69eede84ea6cad9f8fc2e13494d4b7d040c5605a33d339f55d6081744c1e9b27c2bd5d8d2715b2730045be5e7948666407810176238e2888fb9b98ef8fd7f445728721b0fe8b09bd6ab73431da4d63caa1713b99ca40823dd9aef0c6128b1884c1bc9293a18a6fb4d482a99244a973aea2d1455ff463301cb1f4a2ee0ad398c98f98b0700ec1f6c097215707e37ef086ab25ce51c8bcec166e11bb7647b6fa726f14f24c3793cc3a45cde44ef05c24b3bafb90e8da764fdc18630b3ccd1788041fa5a06c39f5a5bcc73d22", 0xf1, r0) keyctl$negate(0xd, r1, 0x5, r2) r3 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) keyctl$negate(0xd, r3, 0x8, r0) 19:11:14 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) r4 = semget(0x0, 0x1, 0x4) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) r5 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$search(0xa, r3, &(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, r0) r6 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$negate(0xd, r0, 0x2, r2) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, r6) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r7) keyctl$KEYCTL_MOVE(0x1e, r5, r7, r0, 0x1) add_key$keyring(&(0x7f0000000440), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x3, r1) r8 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$unlink(0x9, 0x0, r8) r9 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r9) keyctl$clear(0x7, r9) r10 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="0d31c7a9a6602d63230da35467728c150e32f7a4708289ea287edd57a9e1a0efe023b1c729e42d6ed2ce963e0cfd03eb23921cb34ee035bc58e534573112c416bcc1075c15173df824f32864598f95aac5a05954ecbbc35722f8211689a2ecfefe7f", 0x62, r2) r11 = add_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)="3039a03009e7ee65a7026deb8b8ca7f096d9437cf4431505c13b00c643765cc518eda3a0e8bd6d878407bb9ae033856205ab8e90d5151cc0bf7927dd2d4ce43dd49775244494cd835456dfb15c06a9b59fa502", 0x53, r1) syz_io_uring_setup(0x5748, &(0x7f0000000300)={0x0, 0x0, 0x2}, &(0x7f0000000380), &(0x7f00000003c0)) keyctl$search(0xa, r10, &(0x7f0000000180)='cifs.spnego\x00', &(0x7f00000001c0)={'syz', 0x1}, r11) add_key(&(0x7f0000000380)='big_key\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, r11) socket$packet(0x11, 0x2, 0x300) 19:11:14 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2c, r1, 0x0, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:14 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x34, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:14 executing program 5: r0 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r0, 0x0, 0x0], 0x9}, 0x58) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={'\x00', 0x5, 0x1, 0x4, 0x5, 0xd0, r0}) r1 = mq_open(&(0x7f0000000000)=')#(%\x00', 0xc2, 0x80, &(0x7f0000000040)={0x180000, 0x1, 0xffffffff, 0xda6}) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) mq_getsetattr(r1, &(0x7f0000000300)={0x2, 0x9, 0x608000000000000, 0x2}, &(0x7f0000000340)) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) 19:11:14 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key(&(0x7f0000000080)='.dead\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="2f0679530d52f6f60b81eb2fa267048e02e21633c3b4cdc99de6c42f0dd274669e0e5bc7de6c69eede84ea6cad9f8fc2e13494d4b7d040c5605a33d339f55d6081744c1e9b27c2bd5d8d2715b2730045be5e7948666407810176238e2888fb9b98ef8fd7f445728721b0fe8b09bd6ab73431da4d63caa1713b99ca40823dd9aef0c6128b1884c1bc9293a18a6fb4d482a99244a973aea2d1455ff463301cb1f4a2ee0ad398c98f98b0700ec1f6c097215707e37ef086ab25ce51c8bcec166e11bb7647b6fa726f14f24c3793cc3a45cde44ef05c24b3bafb90e8da764fdc18630b3ccd1788041fa5a06c39f5a5bcc73d22", 0xf1, r0) keyctl$negate(0xd, r1, 0x5, r2) r3 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) keyctl$negate(0xd, r3, 0x8, r0) 19:11:14 executing program 4: r0 = syz_clone3(&(0x7f00000011c0)={0xb6004400, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) r1 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r1, 0x0, 0x0], 0x9}, 0x58) r2 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r2, 0x0, 0x0], 0x9}, 0x58) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)=ANY=[@ANYBLOB="010000000400000000000001", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00800000000000002e2f66696c653000"]) (async) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, 0x0, 0x0) (async) getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) (async) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x410100, 0x0) (async) r7 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r6, 0x10000000) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x5, 0x1, 0x3f, 0x9, 0x10, r6, 0x61, '\x00', r5, r7, 0x0, 0x2}, 0x48) (async) syz_io_uring_setup(0x77de, &(0x7f0000000380)={0x0, 0xf99a, 0x200, 0x3, 0x19c, 0x0, r7}, &(0x7f0000000400)=0x0, &(0x7f0000000440)) (async) r9 = mmap$IORING_OFF_SQES(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x7, 0x8010, r4, 0x10000000) syz_io_uring_submit(r8, r9, 0xfffffffffffffffe) (async) r10 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r10, 0x114, 0x7, 0x0, 0x0) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x9, 0x0, r4, 0x9, '\x00', r5, r10, 0x4, 0x0, 0x1}, 0x48) (async) syz_clone3(&(0x7f0000000280)={0x4000000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x21}, &(0x7f00000000c0)=""/142, 0x8e, &(0x7f0000000180)=""/71, &(0x7f0000000200)=[0x0, r1, r0, r0, r0, r2], 0x6, {r3}}, 0x58) 19:11:14 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2c, r1, 0x0, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:14 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x34, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:14 executing program 5: r0 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r0, 0x0, 0x0], 0x9}, 0x58) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={'\x00', 0x5, 0x1, 0x4, 0x5, 0xd0, r0}) r1 = mq_open(&(0x7f0000000000)=')#(%\x00', 0xc2, 0x80, &(0x7f0000000040)={0x180000, 0x1, 0xffffffff, 0xda6}) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) mq_getsetattr(r1, &(0x7f0000000300)={0x2, 0x9, 0x608000000000000, 0x2}, &(0x7f0000000340)) 19:11:14 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) r4 = semget(0x0, 0x1, 0x4) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) r5 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$search(0xa, r3, &(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, r0) r6 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$negate(0xd, r0, 0x2, r2) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, r6) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r7) keyctl$KEYCTL_MOVE(0x1e, r5, r7, r0, 0x1) add_key$keyring(&(0x7f0000000440), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x3, r1) r8 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$unlink(0x9, 0x0, r8) r9 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r9) keyctl$clear(0x7, r9) r10 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="0d31c7a9a6602d63230da35467728c150e32f7a4708289ea287edd57a9e1a0efe023b1c729e42d6ed2ce963e0cfd03eb23921cb34ee035bc58e534573112c416bcc1075c15173df824f32864598f95aac5a05954ecbbc35722f8211689a2ecfefe7f", 0x62, r2) r11 = add_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)="3039a03009e7ee65a7026deb8b8ca7f096d9437cf4431505c13b00c643765cc518eda3a0e8bd6d878407bb9ae033856205ab8e90d5151cc0bf7927dd2d4ce43dd49775244494cd835456dfb15c06a9b59fa502", 0x53, r1) syz_io_uring_setup(0x5748, &(0x7f0000000300)={0x0, 0x0, 0x2}, &(0x7f0000000380), &(0x7f00000003c0)) keyctl$search(0xa, r10, &(0x7f0000000180)='cifs.spnego\x00', &(0x7f00000001c0)={'syz', 0x1}, r11) add_key(&(0x7f0000000380)='big_key\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, r11) 19:11:14 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key(&(0x7f0000000080)='.dead\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="2f0679530d52f6f60b81eb2fa267048e02e21633c3b4cdc99de6c42f0dd274669e0e5bc7de6c69eede84ea6cad9f8fc2e13494d4b7d040c5605a33d339f55d6081744c1e9b27c2bd5d8d2715b2730045be5e7948666407810176238e2888fb9b98ef8fd7f445728721b0fe8b09bd6ab73431da4d63caa1713b99ca40823dd9aef0c6128b1884c1bc9293a18a6fb4d482a99244a973aea2d1455ff463301cb1f4a2ee0ad398c98f98b0700ec1f6c097215707e37ef086ab25ce51c8bcec166e11bb7647b6fa726f14f24c3793cc3a45cde44ef05c24b3bafb90e8da764fdc18630b3ccd1788041fa5a06c39f5a5bcc73d22", 0xf1, r0) keyctl$negate(0xd, r1, 0x5, r2) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) 19:11:14 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x34, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:14 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key(&(0x7f0000000080)='.dead\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="2f0679530d52f6f60b81eb2fa267048e02e21633c3b4cdc99de6c42f0dd274669e0e5bc7de6c69eede84ea6cad9f8fc2e13494d4b7d040c5605a33d339f55d6081744c1e9b27c2bd5d8d2715b2730045be5e7948666407810176238e2888fb9b98ef8fd7f445728721b0fe8b09bd6ab73431da4d63caa1713b99ca40823dd9aef0c6128b1884c1bc9293a18a6fb4d482a99244a973aea2d1455ff463301cb1f4a2ee0ad398c98f98b0700ec1f6c097215707e37ef086ab25ce51c8bcec166e11bb7647b6fa726f14f24c3793cc3a45cde44ef05c24b3bafb90e8da764fdc18630b3ccd1788041fa5a06c39f5a5bcc73d22", 0xf1, r0) keyctl$negate(0xd, r1, 0x5, r2) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) 19:11:14 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2c, r1, 0x0, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:14 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) r4 = semget(0x0, 0x1, 0x4) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) r5 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$search(0xa, r3, &(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, r0) r6 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$negate(0xd, r0, 0x2, r2) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, r6) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r7) keyctl$KEYCTL_MOVE(0x1e, r5, r7, r0, 0x1) add_key$keyring(&(0x7f0000000440), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x3, r1) r8 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$unlink(0x9, 0x0, r8) r9 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r9) keyctl$clear(0x7, r9) r10 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="0d31c7a9a6602d63230da35467728c150e32f7a4708289ea287edd57a9e1a0efe023b1c729e42d6ed2ce963e0cfd03eb23921cb34ee035bc58e534573112c416bcc1075c15173df824f32864598f95aac5a05954ecbbc35722f8211689a2ecfefe7f", 0x62, r2) r11 = add_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)="3039a03009e7ee65a7026deb8b8ca7f096d9437cf4431505c13b00c643765cc518eda3a0e8bd6d878407bb9ae033856205ab8e90d5151cc0bf7927dd2d4ce43dd49775244494cd835456dfb15c06a9b59fa502", 0x53, r1) syz_io_uring_setup(0x5748, &(0x7f0000000300)={0x0, 0x0, 0x2}, &(0x7f0000000380), &(0x7f00000003c0)) keyctl$search(0xa, r10, &(0x7f0000000180)='cifs.spnego\x00', &(0x7f00000001c0)={'syz', 0x1}, r11) 19:11:14 executing program 5: r0 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r0, 0x0, 0x0], 0x9}, 0x58) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={'\x00', 0x5, 0x1, 0x4, 0x5, 0xd0, r0}) mq_open(&(0x7f0000000000)=')#(%\x00', 0xc2, 0x80, &(0x7f0000000040)={0x180000, 0x1, 0xffffffff, 0xda6}) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) 19:11:14 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:15 executing program 4: r0 = syz_clone3(&(0x7f00000011c0)={0xb6004400, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r1, 0x0, 0x0], 0x9}, 0x58) r2 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r2, 0x0, 0x0], 0x9}, 0x58) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)=ANY=[@ANYBLOB="010000000400000000000001", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00800000000000002e2f66696c653000"]) (async) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, 0x0, 0x0) (async) getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) (async) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x410100, 0x0) r7 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r6, 0x10000000) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x5, 0x1, 0x3f, 0x9, 0x10, r6, 0x61, '\x00', r5, r7, 0x0, 0x2}, 0x48) syz_io_uring_setup(0x77de, &(0x7f0000000380)={0x0, 0xf99a, 0x200, 0x3, 0x19c, 0x0, r7}, &(0x7f0000000400)=0x0, &(0x7f0000000440)) r9 = mmap$IORING_OFF_SQES(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x7, 0x8010, r4, 0x10000000) syz_io_uring_submit(r8, r9, 0xfffffffffffffffe) (async) r10 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r10, 0x114, 0x7, 0x0, 0x0) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x9, 0x0, r4, 0x9, '\x00', r5, r10, 0x4, 0x0, 0x1}, 0x48) syz_clone3(&(0x7f0000000280)={0x4000000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x21}, &(0x7f00000000c0)=""/142, 0x8e, &(0x7f0000000180)=""/71, &(0x7f0000000200)=[0x0, r1, r0, r0, r0, r2], 0x6, {r3}}, 0x58) 19:11:15 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:15 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000080)='.dead\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="2f0679530d52f6f60b81eb2fa267048e02e21633c3b4cdc99de6c42f0dd274669e0e5bc7de6c69eede84ea6cad9f8fc2e13494d4b7d040c5605a33d339f55d6081744c1e9b27c2bd5d8d2715b2730045be5e7948666407810176238e2888fb9b98ef8fd7f445728721b0fe8b09bd6ab73431da4d63caa1713b99ca40823dd9aef0c6128b1884c1bc9293a18a6fb4d482a99244a973aea2d1455ff463301cb1f4a2ee0ad398c98f98b0700ec1f6c097215707e37ef086ab25ce51c8bcec166e11bb7647b6fa726f14f24c3793cc3a45cde44ef05c24b3bafb90e8da764fdc18630b3ccd1788041fa5a06c39f5a5bcc73d22", 0xf1, r0) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) 19:11:15 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) r4 = semget(0x0, 0x1, 0x4) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) r5 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$search(0xa, r3, &(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, r0) r6 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$negate(0xd, r0, 0x2, r2) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, r6) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r7) keyctl$KEYCTL_MOVE(0x1e, r5, r7, r0, 0x1) add_key$keyring(&(0x7f0000000440), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x3, r1) r8 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$unlink(0x9, 0x0, r8) r9 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r9) keyctl$clear(0x7, r9) add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="0d31c7a9a6602d63230da35467728c150e32f7a4708289ea287edd57a9e1a0efe023b1c729e42d6ed2ce963e0cfd03eb23921cb34ee035bc58e534573112c416bcc1075c15173df824f32864598f95aac5a05954ecbbc35722f8211689a2ecfefe7f", 0x62, r2) add_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)="3039a03009e7ee65a7026deb8b8ca7f096d9437cf4431505c13b00c643765cc518eda3a0e8bd6d878407bb9ae033856205ab8e90d5151cc0bf7927dd2d4ce43dd49775244494cd835456dfb15c06a9b59fa502", 0x53, r1) syz_io_uring_setup(0x5748, &(0x7f0000000300)={0x0, 0x0, 0x2}, &(0x7f0000000380), &(0x7f00000003c0)) 19:11:15 executing program 5: r0 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r0, 0x0, 0x0], 0x9}, 0x58) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={'\x00', 0x5, 0x1, 0x4, 0x5, 0xd0, r0}) mq_open(&(0x7f0000000000)=')#(%\x00', 0xc2, 0x80, &(0x7f0000000040)={0x180000, 0x1, 0xffffffff, 0xda6}) 19:11:15 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:15 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:15 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) 19:11:15 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) r4 = semget(0x0, 0x1, 0x4) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) r5 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$search(0xa, r3, &(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, r0) r6 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$negate(0xd, r0, 0x2, r2) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, r6) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r7) keyctl$KEYCTL_MOVE(0x1e, r5, r7, r0, 0x1) add_key$keyring(&(0x7f0000000440), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x3, r1) r8 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$unlink(0x9, 0x0, r8) r9 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r9) keyctl$clear(0x7, r9) add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="0d31c7a9a6602d63230da35467728c150e32f7a4708289ea287edd57a9e1a0efe023b1c729e42d6ed2ce963e0cfd03eb23921cb34ee035bc58e534573112c416bcc1075c15173df824f32864598f95aac5a05954ecbbc35722f8211689a2ecfefe7f", 0x62, r2) add_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)="3039a03009e7ee65a7026deb8b8ca7f096d9437cf4431505c13b00c643765cc518eda3a0e8bd6d878407bb9ae033856205ab8e90d5151cc0bf7927dd2d4ce43dd49775244494cd835456dfb15c06a9b59fa502", 0x53, r1) 19:11:15 executing program 5: r0 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r0, 0x0, 0x0], 0x9}, 0x58) mq_open(&(0x7f0000000000)=')#(%\x00', 0xc2, 0x80, &(0x7f0000000040)={0x180000, 0x1, 0xffffffff, 0xda6}) 19:11:15 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) 19:11:15 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) r4 = semget(0x0, 0x1, 0x4) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) r5 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$search(0xa, r3, &(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, r0) r6 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$negate(0xd, r0, 0x2, r2) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, r6) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r7) keyctl$KEYCTL_MOVE(0x1e, r5, r7, r0, 0x1) add_key$keyring(&(0x7f0000000440), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x3, r1) r8 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$unlink(0x9, 0x0, r8) r9 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r9) keyctl$clear(0x7, r9) add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="0d31c7a9a6602d63230da35467728c150e32f7a4708289ea287edd57a9e1a0efe023b1c729e42d6ed2ce963e0cfd03eb23921cb34ee035bc58e534573112c416bcc1075c15173df824f32864598f95aac5a05954ecbbc35722f8211689a2ecfefe7f", 0x62, r2) 19:11:15 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clock_gettime(0x1, &(0x7f0000000040)) 19:11:15 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:15 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:15 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) 19:11:15 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) r4 = semget(0x0, 0x1, 0x4) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) r5 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$search(0xa, r3, &(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, r0) r6 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$negate(0xd, r0, 0x2, r2) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, r6) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r7) keyctl$KEYCTL_MOVE(0x1e, r5, r7, r0, 0x1) add_key$keyring(&(0x7f0000000440), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x3, r1) r8 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$unlink(0x9, 0x0, r8) r9 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r9) keyctl$clear(0x7, r9) 19:11:15 executing program 5: getpgrp(0xffffffffffffffff) mq_open(&(0x7f0000000000)=')#(%\x00', 0xc2, 0x80, &(0x7f0000000040)={0x180000, 0x1, 0xffffffff, 0xda6}) 19:11:15 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:15 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:15 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) 19:11:15 executing program 5: mq_open(&(0x7f0000000000)=')#(%\x00', 0xc2, 0x80, &(0x7f0000000040)={0x180000, 0x1, 0xffffffff, 0xda6}) 19:11:15 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) r4 = semget(0x0, 0x1, 0x4) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) r5 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$search(0xa, r3, &(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, r0) r6 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$negate(0xd, r0, 0x2, r2) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, r6) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r7) keyctl$KEYCTL_MOVE(0x1e, r5, r7, r0, 0x1) add_key$keyring(&(0x7f0000000440), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x3, r1) r8 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$unlink(0x9, 0x0, r8) r9 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r9) 19:11:15 executing program 1: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) 19:11:15 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:15 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) r4 = semget(0x0, 0x1, 0x4) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) r5 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$search(0xa, r3, &(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, r0) r6 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$negate(0xd, r0, 0x2, r2) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, r6) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r7) keyctl$KEYCTL_MOVE(0x1e, r5, r7, r0, 0x1) add_key$keyring(&(0x7f0000000440), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x3, r1) r8 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$unlink(0x9, 0x0, r8) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) 19:11:15 executing program 5: mq_open(0x0, 0xc2, 0x80, &(0x7f0000000040)={0x180000, 0x1, 0xffffffff, 0xda6}) 19:11:15 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x800) 19:11:15 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clock_gettime(0x1, &(0x7f0000000040)) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) clock_gettime(0x1, &(0x7f0000000040)) (async) 19:11:15 executing program 1: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) 19:11:15 executing program 5: mq_open(0x0, 0xc2, 0x80, &(0x7f0000000040)={0x180000, 0x1, 0xffffffff, 0xda6}) 19:11:15 executing program 1: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) 19:11:15 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) r4 = semget(0x0, 0x1, 0x4) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) r5 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$search(0xa, r3, &(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, r0) r6 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$negate(0xd, r0, 0x2, r2) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, r6) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r7) keyctl$KEYCTL_MOVE(0x1e, r5, r7, r0, 0x1) add_key$keyring(&(0x7f0000000440), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x3, r1) r8 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$unlink(0x9, 0x0, r8) 19:11:16 executing program 5: mq_open(0x0, 0xc2, 0x80, &(0x7f0000000040)={0x180000, 0x1, 0xffffffff, 0xda6}) 19:11:16 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) r4 = semget(0x0, 0x1, 0x4) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) r5 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$search(0xa, r3, &(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, r0) r6 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$negate(0xd, r0, 0x2, r2) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, r6) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r7) keyctl$KEYCTL_MOVE(0x1e, r5, r7, r0, 0x1) add_key$keyring(&(0x7f0000000440), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x3, r1) add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r2) 19:11:16 executing program 1: r0 = add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) 19:11:16 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:16 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x0) 19:11:16 executing program 5: mq_open(&(0x7f0000000000)=')#(%\x00', 0x0, 0x80, &(0x7f0000000040)={0x180000, 0x1, 0xffffffff, 0xda6}) 19:11:16 executing program 1: r0 = add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) 19:11:16 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clock_gettime(0x1, &(0x7f0000000040)) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) clock_gettime(0x1, &(0x7f0000000040)) (async) 19:11:16 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) r4 = semget(0x0, 0x1, 0x4) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) r5 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$search(0xa, r3, &(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, r0) r6 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$negate(0xd, r0, 0x2, r2) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, r6) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r7) keyctl$KEYCTL_MOVE(0x1e, r5, r7, r0, 0x1) add_key$keyring(&(0x7f0000000440), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x3, r1) 19:11:16 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x800) 19:11:16 executing program 1: r0 = add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) 19:11:16 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:16 executing program 5: mq_open(&(0x7f0000000000)=')#(%\x00', 0x0, 0x80, &(0x7f0000000040)={0x180000, 0x1, 0xffffffff, 0xda6}) 19:11:16 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) 19:11:16 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r1) r3 = semget(0x0, 0x1, 0x4) semctl$SETALL(r3, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) r4 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$search(0xa, r2, &(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, r0) r5 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$negate(0xd, r0, 0x2, r1) r6 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, r5) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r6) keyctl$KEYCTL_MOVE(0x1e, r4, r6, r0, 0x1) add_key$keyring(&(0x7f0000000440), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) 19:11:16 executing program 5: mq_open(&(0x7f0000000000)=')#(%\x00', 0x0, 0x80, &(0x7f0000000040)={0x180000, 0x1, 0xffffffff, 0xda6}) 19:11:16 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:16 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:16 executing program 5: mq_open(&(0x7f0000000000)=')#(%\x00', 0xc2, 0x0, &(0x7f0000000040)={0x180000, 0x1, 0xffffffff, 0xda6}) 19:11:17 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000180)=@bpf_lsm={0x1d, 0x13, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x60c, 0x0, 0x0, 0x0, 0x5}, {}, {}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000000c0)='syzkaller\x00', 0x9, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, &(0x7f0000000140)=[{0x1, 0x5, 0x7, 0xb}, {0x3, 0x1, 0xf, 0x4}], 0x10, 0x6}, 0x90) syz_clone3(&(0x7f0000000240)={0xd6a4c000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc2}, &(0x7f0000000340)={0x0, "6039045a61ab9b6265d76d937f80d3f28da01b8deb36fbc5ab173a8480c1fdd854a1d64721762f3d369868acc4b569c51274b4a3b0afbad84dcebfda3e072212", 0x1b}, 0x48, 0xfffffffffffffffe) keyctl$unlink(0x9, 0x0, r0) 19:11:17 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r1) r3 = semget(0x0, 0x1, 0x4) semctl$SETALL(r3, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) r4 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$search(0xa, r2, &(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, r0) r5 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$negate(0xd, r0, 0x2, r1) r6 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, r5) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r6) keyctl$KEYCTL_MOVE(0x1e, r4, r6, r0, 0x1) 19:11:17 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) 19:11:17 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:17 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:17 executing program 5: mq_open(&(0x7f0000000000)=')#(%\x00', 0xc2, 0x0, 0x0) 19:11:17 executing program 5: mq_open(&(0x7f0000000000)=')#(%\x00', 0xc2, 0x0, 0x0) 19:11:17 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r1) r3 = semget(0x0, 0x1, 0x4) semctl$SETALL(r3, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$search(0xa, r2, &(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, r0) r4 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$negate(0xd, r0, 0x2, r1) r5 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, r4) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r5) 19:11:17 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) 19:11:17 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x4008008}, 0x800) 19:11:17 executing program 2: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) r4 = semget(0x0, 0x1, 0x4) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) r5 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$search(0xa, r3, &(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, r0) r6 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$negate(0xd, r0, 0x2, r2) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, r6) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r7) keyctl$KEYCTL_MOVE(0x1e, r5, r7, r0, 0x1) add_key$keyring(&(0x7f0000000440), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x3, r1) r8 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$unlink(0x9, 0x0, r8) r9 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r9) keyctl$clear(0x7, r9) add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="0d31c7a9a6602d63230da35467728c150e32f7a4708289ea287edd57a9e1a0efe023b1c729e42d6ed2ce963e0cfd03eb23921cb34ee035bc58e534573112c416bcc1075c15173df824f32864598f95aac5a05954ecbbc35722f8211689a2ecfefe7f", 0x62, r2) add_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)="3039a03009e7ee65a7026deb8b8ca7f096d9437cf4431505c13b00c643765cc518eda3a0e8bd6d878407bb9ae033856205ab8e90d5151cc0bf7927dd2d4ce43dd49775244494cd835456dfb15c06a9b59fa502", 0x53, r1) syz_io_uring_setup(0x5748, &(0x7f0000000300)={0x0, 0x0, 0x2}, &(0x7f0000000380), &(0x7f00000003c0)) 19:11:17 executing program 5: mq_open(&(0x7f0000000000)=')#(%\x00', 0xc2, 0x0, 0x0) 19:11:17 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000180)=@bpf_lsm={0x1d, 0x13, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x60c, 0x0, 0x0, 0x0, 0x5}, {}, {}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000000c0)='syzkaller\x00', 0x9, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, &(0x7f0000000140)=[{0x1, 0x5, 0x7, 0xb}, {0x3, 0x1, 0xf, 0x4}], 0x10, 0x6}, 0x90) (async) syz_clone3(&(0x7f0000000240)={0xd6a4c000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) r0 = add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc2}, &(0x7f0000000340)={0x0, "6039045a61ab9b6265d76d937f80d3f28da01b8deb36fbc5ab173a8480c1fdd854a1d64721762f3d369868acc4b569c51274b4a3b0afbad84dcebfda3e072212", 0x1b}, 0x48, 0xfffffffffffffffe) keyctl$unlink(0x9, 0x0, r0) 19:11:17 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) 19:11:17 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r1) r3 = semget(0x0, 0x1, 0x4) semctl$SETALL(r3, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$search(0xa, r2, &(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, r0) r4 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$negate(0xd, r0, 0x2, r1) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, r4) 19:11:17 executing program 2: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) r4 = semget(0x0, 0x1, 0x4) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) r5 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$search(0xa, r3, &(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, r0) r6 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$negate(0xd, r0, 0x2, r2) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x2}, 0x0, 0x0, r6) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r7) keyctl$KEYCTL_MOVE(0x1e, r5, r7, r0, 0x1) add_key$keyring(&(0x7f0000000440), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x3, r1) r8 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$unlink(0x9, 0x0, r8) r9 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r9) keyctl$clear(0x7, r9) r10 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="0d31c7a9a6602d63230da35467728c150e32f7a4708289ea287edd57a9e1a0efe023b1c729e42d6ed2ce963e0cfd03eb23921cb34ee035bc58e534573112c416bcc1075c15173df824f32864598f95aac5a05954ecbbc35722f8211689a2ecfefe7f", 0x62, r2) r11 = add_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)="3039a03009e7ee65a7026deb8b8ca7f096d9437cf4431505c13b00c643765cc518eda3a0e8bd6d878407bb9ae033856205ab8e90d5151cc0bf7927dd2d4ce43dd49775244494cd835456dfb15c06a9b59fa502", 0x53, r1) syz_io_uring_setup(0x5748, &(0x7f0000000300)={0x0, 0x0, 0x2}, &(0x7f0000000380), &(0x7f00000003c0)) keyctl$search(0xa, r10, &(0x7f0000000180)='cifs.spnego\x00', &(0x7f00000001c0)={'syz', 0x1}, r11) add_key(&(0x7f0000000380)='big_key\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, r11) 19:11:17 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}}, 0x800) 19:11:17 executing program 5: mq_open(&(0x7f0000000000)=')#(%\x00', 0xc2, 0x0, &(0x7f0000000040)={0x0, 0x1, 0xffffffff, 0xda6}) 19:11:17 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) 19:11:17 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r1) r3 = semget(0x0, 0x1, 0x4) semctl$SETALL(r3, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$search(0xa, r2, &(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, r0) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$negate(0xd, r0, 0x2, r1) 19:11:17 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}}, 0x0) 19:11:17 executing program 5: mq_open(&(0x7f0000000000)=')#(%\x00', 0xc2, 0x0, &(0x7f0000000040)={0x0, 0x0, 0xffffffff, 0xda6}) 19:11:17 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000180)=@bpf_lsm={0x1d, 0x13, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x60c, 0x0, 0x0, 0x0, 0x5}, {}, {}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000000c0)='syzkaller\x00', 0x9, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, &(0x7f0000000140)=[{0x1, 0x5, 0x7, 0xb}, {0x3, 0x1, 0xf, 0x4}], 0x10, 0x6}, 0x90) syz_clone3(&(0x7f0000000240)={0xd6a4c000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc2}, &(0x7f0000000340)={0x0, "6039045a61ab9b6265d76d937f80d3f28da01b8deb36fbc5ab173a8480c1fdd854a1d64721762f3d369868acc4b569c51274b4a3b0afbad84dcebfda3e072212", 0x1b}, 0x48, 0xfffffffffffffffe) keyctl$unlink(0x9, 0x0, r0) 19:11:17 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) 19:11:17 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000180)=@bpf_lsm={0x1d, 0x13, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x60c, 0x0, 0x0, 0x0, 0x5}, {}, {}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000000c0)='syzkaller\x00', 0x9, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, &(0x7f0000000140)=[{0x1, 0x5, 0x7, 0xb}, {0x3, 0x1, 0xf, 0x4}], 0x10, 0x6}, 0x90) syz_clone3(&(0x7f0000000240)={0xd6a4c000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) r0 = add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc2}, &(0x7f0000000340)={0x0, "6039045a61ab9b6265d76d937f80d3f28da01b8deb36fbc5ab173a8480c1fdd854a1d64721762f3d369868acc4b569c51274b4a3b0afbad84dcebfda3e072212", 0x1b}, 0x48, 0xfffffffffffffffe) keyctl$unlink(0x9, 0x0, r0) 19:11:17 executing program 3: r0 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r0, 0x0, 0x0], 0x9}, 0x58) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={'\x00', 0x5, 0x1, 0x4, 0x5, 0xd0, r0}) r1 = mq_open(&(0x7f0000000000)=')#(%\x00', 0xc2, 0x80, &(0x7f0000000040)={0x180000, 0x1, 0xffffffff, 0xda6}) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) mq_getsetattr(r1, &(0x7f0000000300)={0x2, 0x9, 0x608000000000000, 0x2}, &(0x7f0000000340)) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) 19:11:17 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r1) r3 = semget(0x0, 0x1, 0x4) semctl$SETALL(r3, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$search(0xa, r2, &(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, r0) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) 19:11:17 executing program 5: mq_open(&(0x7f0000000000)=')#(%\x00', 0xc2, 0x0, &(0x7f0000000040)={0x0, 0x0, 0xffffffff, 0xda6}) 19:11:17 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) 19:11:18 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r1) r3 = semget(0x0, 0x1, 0x4) semctl$SETALL(r3, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$search(0xa, r2, &(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, r0) 19:11:18 executing program 5: mq_open(&(0x7f0000000000)=')#(%\x00', 0xc2, 0x0, &(0x7f0000000040)={0x0, 0x0, 0xffffffff, 0xda6}) 19:11:18 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) 19:11:18 executing program 2: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) accept$phonet_pipe(r1, 0x0, &(0x7f0000000080)) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) r4 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$restrict_keyring(0x1d, r4, &(0x7f0000000140)='.request_key_auth\x00', &(0x7f0000000180)='keyring\x00') setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, 0x0, 0x0) ioctl$sock_ifreq(r3, 0x8922, &(0x7f0000000280)={'ip6_vti0\x00', @ifru_data=&(0x7f0000000240)="69a2ef9c26bf8fdabd57c48aabdaa1b83c41435c654911b3bedf1bddea555db5"}) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) semctl$GETVAL(0x0, 0x1, 0xc, &(0x7f00000014c0)=""/4096) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0), 0x1, 0x0) ioctl$KVM_CHECK_EXTENSION(r5, 0xae03, 0x101) shmget$private(0x0, 0x2000, 0x78001002, &(0x7f0000ffb000/0x2000)=nil) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_VENDOR(r6, &(0x7f0000002540)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000002500)={&(0x7f0000001480)={0x14}, 0x14}}, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000100)) sendmsg$NFC_CMD_LLC_SET_PARAMS(r6, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[], 0x5c}, 0x1, 0x0, 0x0, 0x40000}, 0x4) keyctl$link(0x8, r2, r0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r7) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r7, 0x1) keyctl$clear(0x3, r2) 19:11:18 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) 19:11:18 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r1) r3 = semget(0x0, 0x1, 0x4) semctl$SETALL(r3, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) 19:11:18 executing program 5: mq_open(&(0x7f0000000000)=')#(%\x00', 0xc2, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x0, 0xda6}) 19:11:18 executing program 4: syz_clone3(&(0x7f00000011c0)={0xfe026800, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) ioctl$SNDCTL_TMR_STOP(r0, 0x5403) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_FW_DOWNLOAD(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x54, 0x0, 0x2, 0x70bd27, 0x25dfdbfd, {}, [@NFC_ATTR_FIRMWARE_NAME={0xe, 0x14, '/dev/full\x00'}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_FIRMWARE_NAME={0xe, 0x14, '/dev/full\x00'}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_FIRMWARE_NAME={0xe, 0x14, '/%+{+!(][&'}]}, 0x54}, 0x1, 0x0, 0x0, 0x48080}, 0x20000000) 19:11:18 executing program 3: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) read$FUSE(0xffffffffffffffff, &(0x7f0000001340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) keyctl$get_persistent(0x16, r2, r0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r0) r3 = add_key(&(0x7f0000000080)='id_legacy\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="6eb900c13b3430cf2767094800b936f168c5817acd61bc13c7fe05693fff95d455d4984ded108486048dce1d7484079153ae794fc9aa6f88", 0x38, r1) add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @auto=[0x36, 0x32, 0x31, 0x34, 0x38, 0x0, 0x33, 0x31, 0x61, 0x39, 0x36, 0x50, 0x63, 0x63, 0x35, 0x66]}, &(0x7f0000000280)={0x0, "80429afea3d60f2d3d8152e52a770cee983d8ac15e3cfc233dacc182b324a0ee35959e898ef6cc9974212c8dda3ff160a7c4b658f4dfb880fe506deb54471b0c", 0x37}, 0x48, r0) r4 = getuid() r5 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$get_persistent(0x16, r4, r5) r6 = add_key(&(0x7f0000000140)='asymmetric\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='f^', 0x2, r3) keyctl$unlink(0xa, r6, 0xffffffffffffffff) 19:11:18 executing program 2: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) accept$phonet_pipe(r1, 0x0, &(0x7f0000000080)) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) r4 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$restrict_keyring(0x1d, r4, &(0x7f0000000140)='.request_key_auth\x00', &(0x7f0000000180)='keyring\x00') setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, 0x0, 0x0) ioctl$sock_ifreq(r3, 0x8922, &(0x7f0000000280)={'ip6_vti0\x00', @ifru_data=&(0x7f0000000240)="69a2ef9c26bf8fdabd57c48aabdaa1b83c41435c654911b3bedf1bddea555db5"}) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) semctl$GETVAL(0x0, 0x1, 0xc, &(0x7f00000014c0)=""/4096) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0), 0x1, 0x0) ioctl$KVM_CHECK_EXTENSION(r5, 0xae03, 0x101) shmget$private(0x0, 0x2000, 0x78001002, &(0x7f0000ffb000/0x2000)=nil) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_VENDOR(r6, &(0x7f0000002540)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000002500)={&(0x7f0000001480)={0x14}, 0x14}}, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000100)) sendmsg$NFC_CMD_LLC_SET_PARAMS(r6, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[], 0x5c}, 0x1, 0x0, 0x0, 0x40000}, 0x4) keyctl$link(0x8, r2, r0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r7) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r7, 0x1) keyctl$clear(0x3, r2) 19:11:18 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r1) r2 = semget(0x0, 0x1, 0x4) semctl$SETALL(r2, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) 19:11:18 executing program 5: mq_open(&(0x7f0000000000)=')#(%\x00', 0xc2, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x0, 0xda6}) 19:11:18 executing program 1: add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) 19:11:18 executing program 1: add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) 19:11:18 executing program 5: mq_open(&(0x7f0000000000)=')#(%\x00', 0xc2, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x0, 0xda6}) 19:11:18 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r1) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) 19:11:18 executing program 3: mq_open(&(0x7f0000000000)=')#(%\x00', 0xc2, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x0, 0xda6}) 19:11:18 executing program 2: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) accept$phonet_pipe(r1, 0x0, &(0x7f0000000080)) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) r4 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$restrict_keyring(0x1d, r4, &(0x7f0000000140)='.request_key_auth\x00', &(0x7f0000000180)='keyring\x00') setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, 0x0, 0x0) ioctl$sock_ifreq(r3, 0x8922, &(0x7f0000000280)={'ip6_vti0\x00', @ifru_data=&(0x7f0000000240)="69a2ef9c26bf8fdabd57c48aabdaa1b83c41435c654911b3bedf1bddea555db5"}) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) semctl$GETVAL(0x0, 0x1, 0xc, &(0x7f00000014c0)=""/4096) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0), 0x1, 0x0) ioctl$KVM_CHECK_EXTENSION(r5, 0xae03, 0x101) shmget$private(0x0, 0x2000, 0x78001002, &(0x7f0000ffb000/0x2000)=nil) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_VENDOR(r6, &(0x7f0000002540)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000002500)={&(0x7f0000001480)={0x14}, 0x14}}, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000100)) sendmsg$NFC_CMD_LLC_SET_PARAMS(r6, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[], 0x5c}, 0x1, 0x0, 0x0, 0x40000}, 0x4) keyctl$link(0x8, r2, r0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r7) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r7, 0x1) keyctl$clear(0x3, r2) 19:11:18 executing program 1: add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) 19:11:18 executing program 4: syz_clone3(&(0x7f00000011c0)={0xfe026800, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) (async) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) ioctl$SNDCTL_TMR_STOP(r0, 0x5403) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_FW_DOWNLOAD(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x54, 0x0, 0x2, 0x70bd27, 0x25dfdbfd, {}, [@NFC_ATTR_FIRMWARE_NAME={0xe, 0x14, '/dev/full\x00'}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_FIRMWARE_NAME={0xe, 0x14, '/dev/full\x00'}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_FIRMWARE_NAME={0xe, 0x14, '/%+{+!(][&'}]}, 0x54}, 0x1, 0x0, 0x0, 0x48080}, 0x20000000) 19:11:18 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r1) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) 19:11:18 executing program 3: mq_open(&(0x7f0000000000)=')#(%\x00', 0xc2, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x0, 0xda6}) 19:11:18 executing program 5: mq_open(&(0x7f0000000000)=')#(%\x00', 0xc2, 0x0, &(0x7f0000000040)={0x0, 0x1, 0xffffffff}) 19:11:18 executing program 2: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) accept$phonet_pipe(r1, 0x0, &(0x7f0000000080)) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) r4 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$restrict_keyring(0x1d, r4, &(0x7f0000000140)='.request_key_auth\x00', &(0x7f0000000180)='keyring\x00') setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, 0x0, 0x0) ioctl$sock_ifreq(r3, 0x8922, &(0x7f0000000280)={'ip6_vti0\x00', @ifru_data=&(0x7f0000000240)="69a2ef9c26bf8fdabd57c48aabdaa1b83c41435c654911b3bedf1bddea555db5"}) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) semctl$GETVAL(0x0, 0x1, 0xc, &(0x7f00000014c0)=""/4096) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0), 0x1, 0x0) ioctl$KVM_CHECK_EXTENSION(r5, 0xae03, 0x101) shmget$private(0x0, 0x2000, 0x78001002, &(0x7f0000ffb000/0x2000)=nil) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_VENDOR(r6, &(0x7f0000002540)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000002500)={&(0x7f0000001480)={0x14}, 0x14}}, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000100)) sendmsg$NFC_CMD_LLC_SET_PARAMS(r6, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[], 0x5c}, 0x1, 0x0, 0x0, 0x40000}, 0x4) keyctl$link(0x8, r2, r0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r7) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r7, 0x1) 19:11:18 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f00000000c0)={0x80000000, &(0x7f0000000000)=[{0x80000000}], &(0x7f0000000040)}) ioctl$MEDIA_IOC_ENUM_ENTITIES(r0, 0xc1007c01, &(0x7f0000000100)={r1}) shmget(0x1, 0x4000, 0x40, &(0x7f0000ffb000/0x4000)=nil) keyctl$unlink(0xa, 0x0, 0xffffffffffffffff) 19:11:18 executing program 4: syz_clone3(&(0x7f00000011c0)={0xfe026800, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) (async) ioctl$SNDCTL_TMR_STOP(r0, 0x5403) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_FW_DOWNLOAD(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x54, 0x0, 0x2, 0x70bd27, 0x25dfdbfd, {}, [@NFC_ATTR_FIRMWARE_NAME={0xe, 0x14, '/dev/full\x00'}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_FIRMWARE_NAME={0xe, 0x14, '/dev/full\x00'}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_FIRMWARE_NAME={0xe, 0x14, '/%+{+!(][&'}]}, 0x54}, 0x1, 0x0, 0x0, 0x48080}, 0x20000000) 19:11:18 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r1) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) 19:11:18 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x1e, r1) 19:11:18 executing program 3: mq_open(&(0x7f0000000000)=')#(%\x00', 0xc2, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x0, 0xda6}) 19:11:18 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = semget(0x0, 0x1, 0x4) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) 19:11:18 executing program 2: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) accept$phonet_pipe(r1, 0x0, &(0x7f0000000080)) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) r4 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$restrict_keyring(0x1d, r4, &(0x7f0000000140)='.request_key_auth\x00', &(0x7f0000000180)='keyring\x00') setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, 0x0, 0x0) ioctl$sock_ifreq(r3, 0x8922, &(0x7f0000000280)={'ip6_vti0\x00', @ifru_data=&(0x7f0000000240)="69a2ef9c26bf8fdabd57c48aabdaa1b83c41435c654911b3bedf1bddea555db5"}) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) semctl$GETVAL(0x0, 0x1, 0xc, &(0x7f00000014c0)=""/4096) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0), 0x1, 0x0) ioctl$KVM_CHECK_EXTENSION(r5, 0xae03, 0x101) shmget$private(0x0, 0x2000, 0x78001002, &(0x7f0000ffb000/0x2000)=nil) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_VENDOR(r6, &(0x7f0000002540)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000002500)={&(0x7f0000001480)={0x14}, 0x14}}, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000100)) sendmsg$NFC_CMD_LLC_SET_PARAMS(r6, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[], 0x5c}, 0x1, 0x0, 0x0, 0x40000}, 0x4) keyctl$link(0x8, r2, r0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r7) 19:11:18 executing program 1: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {0x11}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:18 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f00000000c0)={0x80000000, &(0x7f0000000000)=[{0x80000000}], &(0x7f0000000040)}) ioctl$MEDIA_IOC_ENUM_ENTITIES(r0, 0xc1007c01, &(0x7f0000000100)={r1}) shmget(0x1, 0x4000, 0x40, &(0x7f0000ffb000/0x4000)=nil) keyctl$unlink(0xa, 0x0, 0xffffffffffffffff) 19:11:18 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf0184000, 0x0, 0x0, 0x0, {0x100c}, 0x0, 0x15, 0x0, 0x0}, 0x58) 19:11:18 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = semget(0x0, 0x1, 0x4) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) 19:11:18 executing program 3: mq_open(0x0, 0xc2, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x0, 0xda6}) 19:11:19 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf0184000, 0x0, 0x0, 0x0, {0x100c}, 0x0, 0x15, 0x0, 0x0}, 0x58) 19:11:19 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f00000000c0)={0x80000000, &(0x7f0000000000)=[{0x80000000}], &(0x7f0000000040)}) ioctl$MEDIA_IOC_ENUM_ENTITIES(r0, 0xc1007c01, &(0x7f0000000100)={r1}) shmget(0x1, 0x4000, 0x40, &(0x7f0000ffb000/0x4000)=nil) keyctl$unlink(0xa, 0x0, 0xffffffffffffffff) 19:11:19 executing program 2: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) accept$phonet_pipe(r1, 0x0, &(0x7f0000000080)) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) r4 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$restrict_keyring(0x1d, r4, &(0x7f0000000140)='.request_key_auth\x00', &(0x7f0000000180)='keyring\x00') setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, 0x0, 0x0) ioctl$sock_ifreq(r3, 0x8922, &(0x7f0000000280)={'ip6_vti0\x00', @ifru_data=&(0x7f0000000240)="69a2ef9c26bf8fdabd57c48aabdaa1b83c41435c654911b3bedf1bddea555db5"}) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) semctl$GETVAL(0x0, 0x1, 0xc, &(0x7f00000014c0)=""/4096) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0), 0x1, 0x0) ioctl$KVM_CHECK_EXTENSION(r5, 0xae03, 0x101) shmget$private(0x0, 0x2000, 0x78001002, &(0x7f0000ffb000/0x2000)=nil) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_VENDOR(r6, &(0x7f0000002540)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000002500)={&(0x7f0000001480)={0x14}, 0x14}}, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000100)) sendmsg$NFC_CMD_LLC_SET_PARAMS(r6, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[], 0x5c}, 0x1, 0x0, 0x0, 0x40000}, 0x4) keyctl$link(0x8, r2, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) 19:11:19 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r1 = semget(0x0, 0x1, 0x4) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) 19:11:19 executing program 3: mq_open(0x0, 0xc2, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x0, 0xda6}) 19:11:19 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f00000000c0)={0x80000000, &(0x7f0000000000)=[{0x80000000}], &(0x7f0000000040)}) ioctl$MEDIA_IOC_ENUM_ENTITIES(r0, 0xc1007c01, &(0x7f0000000100)={r1}) shmget(0x1, 0x4000, 0x40, &(0x7f0000ffb000/0x4000)=nil) 19:11:19 executing program 3: mq_open(0x0, 0xc2, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x0, 0xda6}) 19:11:19 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) accept$phonet_pipe(r1, 0x0, &(0x7f0000000080)) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) r4 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$restrict_keyring(0x1d, r4, &(0x7f0000000140)='.request_key_auth\x00', &(0x7f0000000180)='keyring\x00') setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, 0x0, 0x0) ioctl$sock_ifreq(r3, 0x8922, &(0x7f0000000280)={'ip6_vti0\x00', @ifru_data=&(0x7f0000000240)="69a2ef9c26bf8fdabd57c48aabdaa1b83c41435c654911b3bedf1bddea555db5"}) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) semctl$GETVAL(0x0, 0x1, 0xc, &(0x7f00000014c0)=""/4096) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0), 0x1, 0x0) ioctl$KVM_CHECK_EXTENSION(r5, 0xae03, 0x101) shmget$private(0x0, 0x2000, 0x78001002, &(0x7f0000ffb000/0x2000)=nil) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_VENDOR(r6, &(0x7f0000002540)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000002500)={&(0x7f0000001480)={0x14}, 0x14}}, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000100)) sendmsg$NFC_CMD_LLC_SET_PARAMS(r6, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[], 0x5c}, 0x1, 0x0, 0x0, 0x40000}, 0x4) keyctl$link(0x8, r2, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) 19:11:19 executing program 2: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) accept$phonet_pipe(r1, 0x0, &(0x7f0000000080)) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) r4 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$restrict_keyring(0x1d, r4, &(0x7f0000000140)='.request_key_auth\x00', &(0x7f0000000180)='keyring\x00') setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, 0x0, 0x0) ioctl$sock_ifreq(r3, 0x8922, &(0x7f0000000280)={'ip6_vti0\x00', @ifru_data=&(0x7f0000000240)="69a2ef9c26bf8fdabd57c48aabdaa1b83c41435c654911b3bedf1bddea555db5"}) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) semctl$GETVAL(0x0, 0x1, 0xc, &(0x7f00000014c0)=""/4096) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0), 0x1, 0x0) ioctl$KVM_CHECK_EXTENSION(r5, 0xae03, 0x101) shmget$private(0x0, 0x2000, 0x78001002, &(0x7f0000ffb000/0x2000)=nil) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_VENDOR(r6, &(0x7f0000002540)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000002500)={&(0x7f0000001480)={0x14}, 0x14}}, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000100)) sendmsg$NFC_CMD_LLC_SET_PARAMS(r6, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[], 0x5c}, 0x1, 0x0, 0x0, 0x40000}, 0x4) keyctl$link(0x8, r2, r0) 19:11:19 executing program 0: add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r0 = semget(0x0, 0x1, 0x4) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) 19:11:19 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf0184000, 0x0, 0x0, 0x0, {0x100c}, 0x0, 0x15, 0x0, 0x0}, 0x58) syz_clone3(&(0x7f00000011c0)={0xf0184000, 0x0, 0x0, 0x0, {0x100c}, 0x0, 0x15, 0x0, 0x0}, 0x58) (async) 19:11:19 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f00000000c0)={0x80000000, &(0x7f0000000000), &(0x7f0000000040)}) shmget(0x1, 0x4000, 0x40, &(0x7f0000ffb000/0x4000)=nil) 19:11:19 executing program 3: mq_open(&(0x7f0000000000)=')#(%\x00', 0x0, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x0, 0xda6}) 19:11:19 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) shmget(0x1, 0x4000, 0x40, &(0x7f0000ffb000/0x4000)=nil) 19:11:19 executing program 2: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) accept$phonet_pipe(r1, 0x0, &(0x7f0000000080)) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000140)='.request_key_auth\x00', &(0x7f0000000180)='keyring\x00') setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, 0x0, 0x0) ioctl$sock_ifreq(r2, 0x8922, &(0x7f0000000280)={'ip6_vti0\x00', @ifru_data=&(0x7f0000000240)="69a2ef9c26bf8fdabd57c48aabdaa1b83c41435c654911b3bedf1bddea555db5"}) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) semctl$GETVAL(0x0, 0x1, 0xc, &(0x7f00000014c0)=""/4096) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0), 0x1, 0x0) ioctl$KVM_CHECK_EXTENSION(r4, 0xae03, 0x101) shmget$private(0x0, 0x2000, 0x78001002, &(0x7f0000ffb000/0x2000)=nil) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_VENDOR(r5, &(0x7f0000002540)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000002500)={&(0x7f0000001480)={0x14}, 0x14}}, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000100)) sendmsg$NFC_CMD_LLC_SET_PARAMS(r5, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[], 0x5c}, 0x1, 0x0, 0x0, 0x40000}, 0x4) 19:11:19 executing program 4: r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f00000004c0)={0x18080000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)=0x0, {0x2d}, &(0x7f0000000280)=""/201, 0xc9, &(0x7f0000000380)=""/254, &(0x7f0000000480)=[r0], 0x1}, 0x58) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000540)={0x5, 0x200, {r0}, {0xee01}, 0x2, 0xffffffff}) read$FUSE(0xffffffffffffffff, &(0x7f0000001240)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, 0x0, 0x0) syz_clone3(&(0x7f00000005c0)={0x10400, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x25}, &(0x7f00000000c0)=""/146, 0x92, &(0x7f0000000180)=""/3, &(0x7f0000000580)=[0x0, r1, r0, r2, r0, r3, r4, r0], 0x8, {r5}}, 0x58) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x7, 0x0, 0x0) setsockopt$inet_dccp_int(r6, 0x21, 0xcc89000a42a6bf5f, &(0x7f0000000640)=0x7ff, 0x4) 19:11:19 executing program 0: r0 = semget(0x0, 0x1, 0x4) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) 19:11:19 executing program 1: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {0x9}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:19 executing program 3: mq_open(&(0x7f0000000000)=')#(%\x00', 0x0, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x0, 0xda6}) 19:11:19 executing program 2: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) accept$phonet_pipe(r1, 0x0, &(0x7f0000000080)) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000140)='.request_key_auth\x00', &(0x7f0000000180)='keyring\x00') setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, 0x0, 0x0) ioctl$sock_ifreq(r2, 0x8922, &(0x7f0000000280)={'ip6_vti0\x00', @ifru_data=&(0x7f0000000240)="69a2ef9c26bf8fdabd57c48aabdaa1b83c41435c654911b3bedf1bddea555db5"}) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) semctl$GETVAL(0x0, 0x1, 0xc, &(0x7f00000014c0)=""/4096) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0), 0x1, 0x0) ioctl$KVM_CHECK_EXTENSION(r4, 0xae03, 0x101) shmget$private(0x0, 0x2000, 0x78001002, &(0x7f0000ffb000/0x2000)=nil) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_VENDOR(r5, &(0x7f0000002540)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000002500)={&(0x7f0000001480)={0x14}, 0x14}}, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000100)) 19:11:19 executing program 3: mq_open(&(0x7f0000000000)=')#(%\x00', 0x0, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x0, 0xda6}) 19:11:19 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) shmget(0x1, 0x4000, 0x40, &(0x7f0000ffb000/0x4000)=nil) 19:11:19 executing program 0: r0 = semget(0x0, 0x0, 0x4) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) 19:11:19 executing program 2: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) accept$phonet_pipe(r1, 0x0, &(0x7f0000000080)) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000140)='.request_key_auth\x00', &(0x7f0000000180)='keyring\x00') setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, 0x0, 0x0) ioctl$sock_ifreq(r2, 0x8922, &(0x7f0000000280)={'ip6_vti0\x00', @ifru_data=&(0x7f0000000240)="69a2ef9c26bf8fdabd57c48aabdaa1b83c41435c654911b3bedf1bddea555db5"}) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) semctl$GETVAL(0x0, 0x1, 0xc, &(0x7f00000014c0)=""/4096) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0), 0x1, 0x0) ioctl$KVM_CHECK_EXTENSION(r4, 0xae03, 0x101) shmget$private(0x0, 0x2000, 0x78001002, &(0x7f0000ffb000/0x2000)=nil) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_VENDOR(r5, &(0x7f0000002540)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000002500)={&(0x7f0000001480)={0x14}, 0x14}}, 0x0) 19:11:19 executing program 3: mq_open(&(0x7f0000000000)=')#(%\x00', 0xc2, 0x0, 0x0) 19:11:19 executing program 0: r0 = semget(0x0, 0x0, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) 19:11:19 executing program 5: shmget(0x1, 0x4000, 0x40, &(0x7f0000ffb000/0x4000)=nil) 19:11:19 executing program 4: r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = getpgrp(0xffffffffffffffff) (async) syz_clone3(&(0x7f00000004c0)={0x18080000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)=0x0, {0x2d}, &(0x7f0000000280)=""/201, 0xc9, &(0x7f0000000380)=""/254, &(0x7f0000000480)=[r0], 0x1}, 0x58) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000540)={0x5, 0x200, {r0}, {0xee01}, 0x2, 0xffffffff}) read$FUSE(0xffffffffffffffff, &(0x7f0000001240)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, 0x0, 0x0) (async) syz_clone3(&(0x7f00000005c0)={0x10400, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x25}, &(0x7f00000000c0)=""/146, 0x92, &(0x7f0000000180)=""/3, &(0x7f0000000580)=[0x0, r1, r0, r2, r0, r3, r4, r0], 0x8, {r5}}, 0x58) (async) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x7, 0x0, 0x0) setsockopt$inet_dccp_int(r6, 0x21, 0xcc89000a42a6bf5f, &(0x7f0000000640)=0x7ff, 0x4) 19:11:19 executing program 2: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) accept$phonet_pipe(r1, 0x0, &(0x7f0000000080)) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000140)='.request_key_auth\x00', &(0x7f0000000180)='keyring\x00') setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, 0x0, 0x0) ioctl$sock_ifreq(r2, 0x8922, &(0x7f0000000280)={'ip6_vti0\x00', @ifru_data=&(0x7f0000000240)="69a2ef9c26bf8fdabd57c48aabdaa1b83c41435c654911b3bedf1bddea555db5"}) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) semctl$GETVAL(0x0, 0x1, 0xc, &(0x7f00000014c0)=""/4096) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0), 0x1, 0x0) ioctl$KVM_CHECK_EXTENSION(r4, 0xae03, 0x101) shmget$private(0x0, 0x2000, 0x78001002, &(0x7f0000ffb000/0x2000)=nil) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 19:11:20 executing program 1: r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f00000004c0)={0x18080000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)=0x0, {0x2d}, &(0x7f0000000280)=""/201, 0xc9, &(0x7f0000000380)=""/254, &(0x7f0000000480)=[r0], 0x1}, 0x58) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000540)={0x5, 0x200, {r0}, {0xee01}, 0x2, 0xffffffff}) read$FUSE(0xffffffffffffffff, &(0x7f0000001240)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, 0x0, 0x0) syz_clone3(&(0x7f00000005c0)={0x10400, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x25}, &(0x7f00000000c0)=""/146, 0x92, &(0x7f0000000180)=""/3, &(0x7f0000000580)=[0x0, r1, r0, r2, r0, r3, r4, r0], 0x8, {r5}}, 0x58) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x7, 0x0, 0x0) setsockopt$inet_dccp_int(r6, 0x21, 0xcc89000a42a6bf5f, &(0x7f0000000640)=0x7ff, 0x4) 19:11:20 executing program 3: mq_open(&(0x7f0000000000)=')#(%\x00', 0xc2, 0x0, 0x0) 19:11:20 executing program 5: shmget(0x1, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) 19:11:20 executing program 0: semget(0x0, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) 19:11:20 executing program 2: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) accept$phonet_pipe(r1, 0x0, &(0x7f0000000080)) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000140)='.request_key_auth\x00', &(0x7f0000000180)='keyring\x00') setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, 0x0, 0x0) ioctl$sock_ifreq(r2, 0x8922, &(0x7f0000000280)={'ip6_vti0\x00', @ifru_data=&(0x7f0000000240)="69a2ef9c26bf8fdabd57c48aabdaa1b83c41435c654911b3bedf1bddea555db5"}) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) semctl$GETVAL(0x0, 0x1, 0xc, &(0x7f00000014c0)=""/4096) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0), 0x1, 0x0) ioctl$KVM_CHECK_EXTENSION(r4, 0xae03, 0x101) shmget$private(0x0, 0x2000, 0x78001002, &(0x7f0000ffb000/0x2000)=nil) 19:11:20 executing program 0: semget(0x0, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) 19:11:20 executing program 5: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {0x8}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:20 executing program 3: mq_open(&(0x7f0000000000)=')#(%\x00', 0xc2, 0x0, 0x0) 19:11:20 executing program 2: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) accept$phonet_pipe(r1, 0x0, &(0x7f0000000080)) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000140)='.request_key_auth\x00', &(0x7f0000000180)='keyring\x00') setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, 0x0, 0x0) ioctl$sock_ifreq(r2, 0x8922, &(0x7f0000000280)={'ip6_vti0\x00', @ifru_data=&(0x7f0000000240)="69a2ef9c26bf8fdabd57c48aabdaa1b83c41435c654911b3bedf1bddea555db5"}) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) semctl$GETVAL(0x0, 0x1, 0xc, &(0x7f00000014c0)=""/4096) openat$full(0xffffffffffffff9c, &(0x7f00000002c0), 0x1, 0x0) shmget$private(0x0, 0x2000, 0x78001002, &(0x7f0000ffb000/0x2000)=nil) 19:11:20 executing program 0: semget(0x0, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0, 0x45b6]) 19:11:20 executing program 4: r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) r1 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f00000004c0)={0x18080000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)=0x0, {0x2d}, &(0x7f0000000280)=""/201, 0xc9, &(0x7f0000000380)=""/254, &(0x7f0000000480)=[r0], 0x1}, 0x58) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000540)={0x5, 0x200, {r0}, {0xee01}, 0x2, 0xffffffff}) read$FUSE(0xffffffffffffffff, &(0x7f0000001240)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, 0x0, 0x0) syz_clone3(&(0x7f00000005c0)={0x10400, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x25}, &(0x7f00000000c0)=""/146, 0x92, &(0x7f0000000180)=""/3, &(0x7f0000000580)=[0x0, r1, r0, r2, r0, r3, r4, r0], 0x8, {r5}}, 0x58) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x7, 0x0, 0x0) (async) setsockopt$inet_dccp_int(r6, 0x21, 0xcc89000a42a6bf5f, &(0x7f0000000640)=0x7ff, 0x4) 19:11:20 executing program 3: mq_open(&(0x7f0000000000)=')#(%\x00', 0xc2, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xda6}) 19:11:20 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x15, r1) 19:11:20 executing program 0: r0 = semget(0x0, 0x0, 0x0) semctl$SETALL(r0, 0x0, 0x11, 0x0) 19:11:20 executing program 2: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) accept$phonet_pipe(r1, 0x0, &(0x7f0000000080)) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000140)='.request_key_auth\x00', &(0x7f0000000180)='keyring\x00') setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, 0x0, 0x0) ioctl$sock_ifreq(r2, 0x8922, &(0x7f0000000280)={'ip6_vti0\x00', @ifru_data=&(0x7f0000000240)="69a2ef9c26bf8fdabd57c48aabdaa1b83c41435c654911b3bedf1bddea555db5"}) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) semctl$GETVAL(0x0, 0x1, 0xc, &(0x7f00000014c0)=""/4096) shmget$private(0x0, 0x2000, 0x78001002, &(0x7f0000ffb000/0x2000)=nil) 19:11:20 executing program 3: mq_open(&(0x7f0000000000)=')#(%\x00', 0xc2, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xda6}) 19:11:20 executing program 0: r0 = semget(0x0, 0x0, 0x0) semctl$SETALL(r0, 0x0, 0x11, 0x0) 19:11:20 executing program 2: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) accept$phonet_pipe(r1, 0x0, &(0x7f0000000080)) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000140)='.request_key_auth\x00', &(0x7f0000000180)='keyring\x00') setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, 0x0, 0x0) ioctl$sock_ifreq(r2, 0x8922, &(0x7f0000000280)={'ip6_vti0\x00', @ifru_data=&(0x7f0000000240)="69a2ef9c26bf8fdabd57c48aabdaa1b83c41435c654911b3bedf1bddea555db5"}) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) shmget$private(0x0, 0x2000, 0x78001002, &(0x7f0000ffb000/0x2000)=nil) 19:11:21 executing program 5: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {0x8}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:21 executing program 3: mq_open(&(0x7f0000000000)=')#(%\x00', 0xc2, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xda6}) 19:11:21 executing program 0: r0 = semget(0x0, 0x0, 0x0) semctl$SETALL(r0, 0x0, 0x11, 0x0) 19:11:21 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x15, r1) 19:11:21 executing program 2: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) accept$phonet_pipe(r1, 0x0, &(0x7f0000000080)) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000140)='.request_key_auth\x00', &(0x7f0000000180)='keyring\x00') setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, 0x0, 0x0) ioctl$sock_ifreq(r2, 0x8922, &(0x7f0000000280)={'ip6_vti0\x00', @ifru_data=&(0x7f0000000240)="69a2ef9c26bf8fdabd57c48aabdaa1b83c41435c654911b3bedf1bddea555db5"}) shmget$private(0x0, 0x2000, 0x78001002, &(0x7f0000ffb000/0x2000)=nil) 19:11:21 executing program 4: r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r1, 0x0, 0x0], 0x9}, 0x58) r2 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r2, 0x0, 0x0], 0x9}, 0x58) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r3, 0x113, 0x2, &(0x7f00000004c0), &(0x7f00000003c0)=0x4) r4 = semget(0x0, 0x4, 0x208) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) clock_gettime(0x2, &(0x7f0000000380)) semtimedop(r4, &(0x7f0000000400)=[{0x0, 0x3, 0x800}], 0x1, &(0x7f0000000480)={r5, r6+10000000}) semctl$IPC_INFO(r4, 0x4, 0x3, &(0x7f0000000340)=""/5) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) syz_clone3(&(0x7f00000006c0)={0x1000, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600), {0x3d}, &(0x7f0000001240)=""/4096, 0x1000, &(0x7f0000000640)=""/38, &(0x7f0000000680), 0x0, {r3}}, 0x58) io_uring_setup(0x6426, &(0x7f0000000500)={0x0, 0x7e05, 0x10, 0x0, 0x346, 0x0, r3}) setsockopt$RDS_GET_MR_FOR_DEST(r7, 0x114, 0x7, 0x0, 0x0) syz_clone3(&(0x7f0000000200)={0x1000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x9}, &(0x7f00000000c0)=""/14, 0xe, &(0x7f0000000100)=""/142, &(0x7f00000001c0)=[r0, r0, r1, r0, r0, r2, r0], 0x7, {r7}}, 0x58) 19:11:22 executing program 3: mq_open(&(0x7f0000000000)=')#(%\x00', 0xc2, 0x0, &(0x7f0000000040)={0x0, 0x1}) 19:11:22 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x15, r1) 19:11:22 executing program 2: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) accept$phonet_pipe(r1, 0x0, &(0x7f0000000080)) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000140)='.request_key_auth\x00', &(0x7f0000000180)='keyring\x00') setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, 0x0, 0x0) shmget$private(0x0, 0x2000, 0x78001002, &(0x7f0000ffb000/0x2000)=nil) 19:11:22 executing program 0: r0 = semget(0x0, 0x0, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f, 0x0]) 19:11:22 executing program 3: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {0x7}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:22 executing program 2: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) accept$phonet_pipe(r1, 0x0, &(0x7f0000000080)) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000140)='.request_key_auth\x00', &(0x7f0000000180)='keyring\x00') shmget$private(0x0, 0x2000, 0x78001002, &(0x7f0000ffb000/0x2000)=nil) 19:11:23 executing program 5: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {0x8}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:23 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$clear(0x15, r1) 19:11:23 executing program 0: r0 = semget(0x0, 0x0, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4, 0x3f]) 19:11:23 executing program 2: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) accept$phonet_pipe(r1, 0x0, &(0x7f0000000080)) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) shmget$private(0x0, 0x2000, 0x78001002, &(0x7f0000ffb000/0x2000)=nil) 19:11:23 executing program 4: r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r1, 0x0, 0x0], 0x9}, 0x58) r2 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r2, 0x0, 0x0], 0x9}, 0x58) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r3, 0x113, 0x2, &(0x7f00000004c0), &(0x7f00000003c0)=0x4) r4 = semget(0x0, 0x4, 0x208) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) clock_gettime(0x2, &(0x7f0000000380)) semtimedop(r4, &(0x7f0000000400)=[{0x0, 0x3, 0x800}], 0x1, &(0x7f0000000480)={r5, r6+10000000}) semctl$IPC_INFO(r4, 0x4, 0x3, &(0x7f0000000340)=""/5) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) syz_clone3(&(0x7f00000006c0)={0x1000, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600), {0x3d}, &(0x7f0000001240)=""/4096, 0x1000, &(0x7f0000000640)=""/38, &(0x7f0000000680), 0x0, {r3}}, 0x58) io_uring_setup(0x6426, &(0x7f0000000500)={0x0, 0x7e05, 0x10, 0x0, 0x346, 0x0, r3}) setsockopt$RDS_GET_MR_FOR_DEST(r7, 0x114, 0x7, 0x0, 0x0) syz_clone3(&(0x7f0000000200)={0x1000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x9}, &(0x7f00000000c0)=""/14, 0xe, &(0x7f0000000100)=""/142, &(0x7f00000001c0)=[r0, r0, r1, r0, r0, r2, r0], 0x7, {r7}}, 0x58) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) getpgrp(0xffffffffffffffff) (async) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r1, 0x0, 0x0], 0x9}, 0x58) (async) getpgrp(0xffffffffffffffff) (async) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r2, 0x0, 0x0], 0x9}, 0x58) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (async) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, 0x0, 0x0) (async) getsockopt$PNPIPE_IFINDEX(r3, 0x113, 0x2, &(0x7f00000004c0), &(0x7f00000003c0)=0x4) (async) semget(0x0, 0x4, 0x208) (async) clock_gettime(0x0, &(0x7f0000000440)) (async) clock_gettime(0x2, &(0x7f0000000380)) (async) semtimedop(r4, &(0x7f0000000400)=[{0x0, 0x3, 0x800}], 0x1, &(0x7f0000000480)={r5, r6+10000000}) (async) semctl$IPC_INFO(r4, 0x4, 0x3, &(0x7f0000000340)=""/5) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (async) syz_clone3(&(0x7f00000006c0)={0x1000, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600), {0x3d}, &(0x7f0000001240)=""/4096, 0x1000, &(0x7f0000000640)=""/38, &(0x7f0000000680), 0x0, {r3}}, 0x58) (async) io_uring_setup(0x6426, &(0x7f0000000500)={0x0, 0x7e05, 0x10, 0x0, 0x346, 0x0, r3}) (async) setsockopt$RDS_GET_MR_FOR_DEST(r7, 0x114, 0x7, 0x0, 0x0) (async) syz_clone3(&(0x7f0000000200)={0x1000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x9}, &(0x7f00000000c0)=""/14, 0xe, &(0x7f0000000100)=""/142, &(0x7f00000001c0)=[r0, r0, r1, r0, r0, r2, r0], 0x7, {r7}}, 0x58) (async) 19:11:23 executing program 3: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {0x7}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:23 executing program 2: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) accept$phonet_pipe(r1, 0x0, &(0x7f0000000080)) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) shmget$private(0x0, 0x2000, 0x78001002, &(0x7f0000ffb000/0x2000)=nil) 19:11:23 executing program 0: r0 = semget(0x0, 0x0, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000400)=[0x8, 0x4]) 19:11:23 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$clear(0x15, r1) 19:11:23 executing program 0: r0 = semget(0x0, 0x0, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000400)=[0x8]) 19:11:23 executing program 2: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) accept$phonet_pipe(r1, 0x0, &(0x7f0000000080)) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) shmget$private(0x0, 0x2000, 0x78001002, &(0x7f0000ffb000/0x2000)=nil) 19:11:23 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$clear(0x15, r1) [ 2344.452684][ T1377] ieee802154 phy0 wpan0: encryption failed: -22 [ 2344.459028][ T1377] ieee802154 phy1 wpan1: encryption failed: -22 19:11:26 executing program 5: r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r1, 0x0, 0x0], 0x9}, 0x58) r2 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r2, 0x0, 0x0], 0x9}, 0x58) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r3, 0x113, 0x2, &(0x7f00000004c0), &(0x7f00000003c0)=0x4) r4 = semget(0x0, 0x4, 0x208) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) clock_gettime(0x2, &(0x7f0000000380)) semtimedop(r4, &(0x7f0000000400)=[{0x0, 0x3, 0x800}], 0x1, &(0x7f0000000480)={r5, r6+10000000}) semctl$IPC_INFO(r4, 0x4, 0x3, &(0x7f0000000340)=""/5) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) syz_clone3(&(0x7f00000006c0)={0x1000, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600), {0x3d}, &(0x7f0000001240)=""/4096, 0x1000, &(0x7f0000000640)=""/38, &(0x7f0000000680), 0x0, {r3}}, 0x58) io_uring_setup(0x6426, &(0x7f0000000500)={0x0, 0x7e05, 0x10, 0x0, 0x346, 0x0, r3}) setsockopt$RDS_GET_MR_FOR_DEST(r7, 0x114, 0x7, 0x0, 0x0) syz_clone3(&(0x7f0000000200)={0x1000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x9}, &(0x7f00000000c0)=""/14, 0xe, &(0x7f0000000100)=""/142, &(0x7f00000001c0)=[r0, r0, r1, r0, r0, r2, r0], 0x7, {r7}}, 0x58) 19:11:26 executing program 2: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) accept$phonet_pipe(r1, 0x0, &(0x7f0000000080)) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) shmget$private(0x0, 0x2000, 0x78001002, &(0x7f0000ffb000/0x2000)=nil) 19:11:26 executing program 1: add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x15, 0x0) 19:11:26 executing program 0: r0 = semget(0x0, 0x0, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000400)) 19:11:26 executing program 4: r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) r1 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r1, 0x0, 0x0], 0x9}, 0x58) r2 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r2, 0x0, 0x0], 0x9}, 0x58) (async, rerun: 32) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (rerun: 32) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, 0x0, 0x0) (async) getsockopt$PNPIPE_IFINDEX(r3, 0x113, 0x2, &(0x7f00000004c0), &(0x7f00000003c0)=0x4) r4 = semget(0x0, 0x4, 0x208) (async) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) clock_gettime(0x2, &(0x7f0000000380)) (async) semtimedop(r4, &(0x7f0000000400)=[{0x0, 0x3, 0x800}], 0x1, &(0x7f0000000480)={r5, r6+10000000}) (async, rerun: 64) semctl$IPC_INFO(r4, 0x4, 0x3, &(0x7f0000000340)=""/5) (async, rerun: 64) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) syz_clone3(&(0x7f00000006c0)={0x1000, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600), {0x3d}, &(0x7f0000001240)=""/4096, 0x1000, &(0x7f0000000640)=""/38, &(0x7f0000000680), 0x0, {r3}}, 0x58) (async) io_uring_setup(0x6426, &(0x7f0000000500)={0x0, 0x7e05, 0x10, 0x0, 0x346, 0x0, r3}) (async) setsockopt$RDS_GET_MR_FOR_DEST(r7, 0x114, 0x7, 0x0, 0x0) (async) syz_clone3(&(0x7f0000000200)={0x1000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x9}, &(0x7f00000000c0)=""/14, 0xe, &(0x7f0000000100)=""/142, &(0x7f00000001c0)=[r0, r0, r1, r0, r0, r2, r0], 0x7, {r7}}, 0x58) 19:11:26 executing program 3: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {0x7}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:26 executing program 2: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) accept$phonet_pipe(r1, 0x0, &(0x7f0000000080)) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) shmget$private(0x0, 0x2000, 0x78001002, &(0x7f0000ffb000/0x2000)=nil) 19:11:26 executing program 1: add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x15, 0x0) 19:11:26 executing program 0: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {0x4}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:27 executing program 1: add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x15, 0x0) 19:11:27 executing program 2: add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) accept$phonet_pipe(r0, 0x0, &(0x7f0000000080)) shmget$private(0x0, 0x2000, 0x78001002, &(0x7f0000ffb000/0x2000)=nil) 19:11:27 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x15, r0) 19:11:27 executing program 5: keyctl$unlink(0x12, 0x0, 0xffffffffffffffff) 19:11:27 executing program 2: add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) shmget$private(0x0, 0x2000, 0x78001002, &(0x7f0000ffb000/0x2000)=nil) 19:11:27 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x15, r0) 19:11:27 executing program 5: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0xf, r1) 19:11:27 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x15, r0) 19:11:27 executing program 2: add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) shmget$private(0x0, 0x2000, 0x78001002, &(0x7f0000ffb000/0x2000)=nil) 19:11:27 executing program 5: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0xf, r1) 19:11:27 executing program 3: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:28 executing program 0: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {0x4}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:28 executing program 5: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0xf, r1) 19:11:28 executing program 1: r0 = add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x15, r1) 19:11:28 executing program 4: r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) r3 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r3, 0x0, 0x0], 0x9}, 0x58) r4 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r4, 0x0, 0x0], 0x9}, 0x58) r5 = syz_clone3(&(0x7f00000005c0)={0x20000400, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400), {0x1e}, &(0x7f0000000440)=""/237, 0xed, &(0x7f0000000540)=""/42, &(0x7f0000000580)=[r0, r0, r0, 0xffffffffffffffff, r0], 0x5}, 0x58) syz_clone3(&(0x7f0000000680)={0x21000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0x37}, &(0x7f0000000280)=""/171, 0xab, &(0x7f0000000340)=""/42, &(0x7f0000000640)=[r0, r0, r3, r4, r5], 0x5}, 0x58) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x7, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r6, 0xc0286405, &(0x7f0000000700)={0x9, 0x6, {r5}, {0xffffffffffffffff}, 0x4}) 19:11:28 executing program 2: add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) shmget$private(0x0, 0x2000, 0x78001002, &(0x7f0000ffb000/0x2000)=nil) 19:11:28 executing program 3: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:29 executing program 5: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$clear(0xf, r1) 19:11:29 executing program 2: shmget$private(0x0, 0x2000, 0x78001002, &(0x7f0000ffb000/0x2000)=nil) 19:11:29 executing program 1: r0 = add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x15, r1) 19:11:29 executing program 2: shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) 19:11:29 executing program 5: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$clear(0xf, r1) 19:11:29 executing program 1: r0 = add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x15, r1) 19:11:31 executing program 0: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {0x4}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:31 executing program 2: shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) 19:11:31 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x15, r1) 19:11:31 executing program 5: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$clear(0xf, r1) 19:11:31 executing program 3: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x9, r1) 19:11:31 executing program 4: r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) (async) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) r3 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r3, 0x0, 0x0], 0x9}, 0x58) (async) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r3, 0x0, 0x0], 0x9}, 0x58) r4 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r4, 0x0, 0x0], 0x9}, 0x58) r5 = syz_clone3(&(0x7f00000005c0)={0x20000400, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400), {0x1e}, &(0x7f0000000440)=""/237, 0xed, &(0x7f0000000540)=""/42, &(0x7f0000000580)=[r0, r0, r0, 0xffffffffffffffff, r0], 0x5}, 0x58) syz_clone3(&(0x7f0000000680)={0x21000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0x37}, &(0x7f0000000280)=""/171, 0xab, &(0x7f0000000340)=""/42, &(0x7f0000000640)=[r0, r0, r3, r4, r5], 0x5}, 0x58) (async) syz_clone3(&(0x7f0000000680)={0x21000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0x37}, &(0x7f0000000280)=""/171, 0xab, &(0x7f0000000340)=""/42, &(0x7f0000000640)=[r0, r0, r3, r4, r5], 0x5}, 0x58) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (async) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x7, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r6, 0xc0286405, &(0x7f0000000700)={0x9, 0x6, {r5}, {0xffffffffffffffff}, 0x4}) 19:11:31 executing program 2: shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) 19:11:31 executing program 3: r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) r3 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r3, 0x0, 0x0], 0x9}, 0x58) r4 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r4, 0x0, 0x0], 0x9}, 0x58) r5 = syz_clone3(&(0x7f00000005c0)={0x20000400, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400), {0x1e}, &(0x7f0000000440)=""/237, 0xed, &(0x7f0000000540)=""/42, &(0x7f0000000580)=[r0, r0, r0, 0xffffffffffffffff, r0], 0x5}, 0x58) syz_clone3(&(0x7f0000000680)={0x21000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0x37}, &(0x7f0000000280)=""/171, 0xab, &(0x7f0000000340)=""/42, &(0x7f0000000640)=[r0, r0, r3, r4, r5], 0x5}, 0x58) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x7, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r6, 0xc0286405, &(0x7f0000000700)={0x9, 0x6, {r5}, {0xffffffffffffffff}, 0x4}) 19:11:31 executing program 5: add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0xf, 0x0) 19:11:31 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x15, r1) 19:11:31 executing program 2: r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) r3 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r3, 0x0, 0x0], 0x9}, 0x58) r4 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r4, 0x0, 0x0], 0x9}, 0x58) r5 = syz_clone3(&(0x7f00000005c0)={0x20000400, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400), {0x1e}, &(0x7f0000000440)=""/237, 0xed, &(0x7f0000000540)=""/42, &(0x7f0000000580)=[r0, r0, r0, 0xffffffffffffffff, r0], 0x5}, 0x58) syz_clone3(&(0x7f0000000680)={0x21000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0x37}, &(0x7f0000000280)=""/171, 0xab, &(0x7f0000000340)=""/42, &(0x7f0000000640)=[r0, r0, r3, r4, r5], 0x5}, 0x58) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x7, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r6, 0xc0286405, &(0x7f0000000700)={0x9, 0x6, {r5}, {0xffffffffffffffff}, 0x4}) 19:11:31 executing program 5: add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0xf, 0x0) 19:11:33 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x6, r1) 19:11:33 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x15, r1) 19:11:33 executing program 5: add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0xf, 0x0) 19:11:33 executing program 4: r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) r3 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r3, 0x0, 0x0], 0x9}, 0x58) r4 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r4, 0x0, 0x0], 0x9}, 0x58) r5 = syz_clone3(&(0x7f00000005c0)={0x20000400, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400), {0x1e}, &(0x7f0000000440)=""/237, 0xed, &(0x7f0000000540)=""/42, &(0x7f0000000580)=[r0, r0, r0, 0xffffffffffffffff, r0], 0x5}, 0x58) syz_clone3(&(0x7f0000000680)={0x21000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0x37}, &(0x7f0000000280)=""/171, 0xab, &(0x7f0000000340)=""/42, &(0x7f0000000640)=[r0, r0, r3, r4, r5], 0x5}, 0x58) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x7, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r6, 0xc0286405, &(0x7f0000000700)={0x9, 0x6, {r5}, {0xffffffffffffffff}, 0x4}) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080), &(0x7f00000000c0)) (async) socket$inet6_mptcp(0xa, 0x1, 0x106) (async) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) (async) getpgrp(0xffffffffffffffff) (async) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r3, 0x0, 0x0], 0x9}, 0x58) (async) getpgrp(0xffffffffffffffff) (async) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r4, 0x0, 0x0], 0x9}, 0x58) (async) syz_clone3(&(0x7f00000005c0)={0x20000400, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400), {0x1e}, &(0x7f0000000440)=""/237, 0xed, &(0x7f0000000540)=""/42, &(0x7f0000000580)=[r0, r0, r0, 0xffffffffffffffff, r0], 0x5}, 0x58) (async) syz_clone3(&(0x7f0000000680)={0x21000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0x37}, &(0x7f0000000280)=""/171, 0xab, &(0x7f0000000340)=""/42, &(0x7f0000000640)=[r0, r0, r3, r4, r5], 0x5}, 0x58) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (async) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x7, 0x0, 0x0) (async) ioctl$DRM_IOCTL_GET_CLIENT(r6, 0xc0286405, &(0x7f0000000700)={0x9, 0x6, {r5}, {0xffffffffffffffff}, 0x4}) (async) 19:11:33 executing program 3: r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) r3 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r3, 0x0, 0x0], 0x9}, 0x58) r4 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r4, 0x0, 0x0], 0x9}, 0x58) r5 = syz_clone3(&(0x7f00000005c0)={0x20000400, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400), {0x1e}, &(0x7f0000000440)=""/237, 0xed, &(0x7f0000000540)=""/42, &(0x7f0000000580)=[r0, r0, r0, 0xffffffffffffffff, r0], 0x5}, 0x58) syz_clone3(&(0x7f0000000680)={0x21000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0x37}, &(0x7f0000000280)=""/171, 0xab, &(0x7f0000000340)=""/42, &(0x7f0000000640)=[r0, r0, r3, r4, r5], 0x5}, 0x58) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x7, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r6, 0xc0286405, &(0x7f0000000700)={0x9, 0x6, {r5}, {0xffffffffffffffff}, 0x4}) 19:11:33 executing program 2: r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) r3 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r3, 0x0, 0x0], 0x9}, 0x58) r4 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r4, 0x0, 0x0], 0x9}, 0x58) r5 = syz_clone3(&(0x7f00000005c0)={0x20000400, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400), {0x1e}, &(0x7f0000000440)=""/237, 0xed, &(0x7f0000000540)=""/42, &(0x7f0000000580)=[r0, r0, r0, 0xffffffffffffffff, r0], 0x5}, 0x58) syz_clone3(&(0x7f0000000680)={0x21000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0x37}, &(0x7f0000000280)=""/171, 0xab, &(0x7f0000000340)=""/42, &(0x7f0000000640)=[r0, r0, r3, r4, r5], 0x5}, 0x58) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x7, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r6, 0xc0286405, &(0x7f0000000700)={0x9, 0x6, {r5}, {0xffffffffffffffff}, 0x4}) 19:11:33 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x15, r1) 19:11:33 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0xf, r0) 19:11:33 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x15, r1) 19:11:33 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0xf, r0) 19:11:33 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0xf, r0) 19:11:33 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x15, r1) 19:11:33 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x6, r1) 19:11:33 executing program 5: r0 = add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0xf, r1) 19:11:33 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x15, r1) 19:11:36 executing program 4: r0 = syz_genetlink_get_family_id$nfc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NFC_CMD_FW_DOWNLOAD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r0, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@NFC_ATTR_FIRMWARE_NAME={0xe, 0x14, '/dev/full\x00'}, @NFC_ATTR_FIRMWARE_NAME={0x4}, @NFC_ATTR_FIRMWARE_NAME={0x6, 0x14, '\xf1$'}]}, 0x30}, 0x1, 0x0, 0x0, 0x4004000}, 0x20004000) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_DROP(r1, 0x4143, 0x0) 19:11:36 executing program 5: r0 = add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0xf, r1) 19:11:36 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x15, r1) 19:11:36 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x6, r1) 19:11:36 executing program 2: r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) r3 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r3, 0x0, 0x0], 0x9}, 0x58) r4 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r4, 0x0, 0x0], 0x9}, 0x58) r5 = syz_clone3(&(0x7f00000005c0)={0x20000400, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400), {0x1e}, &(0x7f0000000440)=""/237, 0xed, &(0x7f0000000540)=""/42, &(0x7f0000000580)=[r0, r0, r0, 0xffffffffffffffff, r0], 0x5}, 0x58) syz_clone3(&(0x7f0000000680)={0x21000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0x37}, &(0x7f0000000280)=""/171, 0xab, &(0x7f0000000340)=""/42, &(0x7f0000000640)=[r0, r0, r3, r4, r5], 0x5}, 0x58) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x7, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r6, 0xc0286405, &(0x7f0000000700)={0x9, 0x6, {r5}, {0xffffffffffffffff}, 0x4}) 19:11:36 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) 19:11:36 executing program 5: r0 = add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0xf, r1) 19:11:36 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) 19:11:36 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x15, r1) 19:11:36 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$clear(0x6, r1) 19:11:36 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) 19:11:36 executing program 5: r0 = add_key$keyring(&(0x7f0000000540), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0xf, r1) 19:11:36 executing program 4: r0 = syz_genetlink_get_family_id$nfc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NFC_CMD_FW_DOWNLOAD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r0, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@NFC_ATTR_FIRMWARE_NAME={0xe, 0x14, '/dev/full\x00'}, @NFC_ATTR_FIRMWARE_NAME={0x4}, @NFC_ATTR_FIRMWARE_NAME={0x6, 0x14, '\xf1$'}]}, 0x30}, 0x1, 0x0, 0x0, 0x4004000}, 0x20004000) (async, rerun: 64) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async, rerun: 64) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) (async, rerun: 32) ioctl$SNDRV_PCM_IOCTL_DROP(r1, 0x4143, 0x0) (rerun: 32) 19:11:36 executing program 1: add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x15, r0) 19:11:36 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$clear(0x6, r1) 19:11:36 executing program 5: r0 = add_key$keyring(&(0x7f0000000540), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0xf, r1) 19:11:37 executing program 2: r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) r3 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r3, 0x0, 0x0], 0x9}, 0x58) r4 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r4, 0x0, 0x0], 0x9}, 0x58) r5 = syz_clone3(&(0x7f00000005c0)={0x20000400, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400), {0x1e}, &(0x7f0000000440)=""/237, 0xed, &(0x7f0000000540)=""/42, &(0x7f0000000580)=[r0, r0, r0, 0xffffffffffffffff, r0], 0x5}, 0x58) syz_clone3(&(0x7f0000000680)={0x21000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0x37}, &(0x7f0000000280)=""/171, 0xab, &(0x7f0000000340)=""/42, &(0x7f0000000640)=[r0, r0, r3, r4, r5], 0x5}, 0x58) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x7, 0x0, 0x0) 19:11:37 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (fail_nth: 1) 19:11:37 executing program 5: r0 = add_key$keyring(&(0x7f0000000540), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0xf, r1) 19:11:37 executing program 1: add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x15, r0) 19:11:37 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$clear(0x6, r1) 19:11:37 executing program 0: add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x6, 0x0) 19:11:37 executing program 1: add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x15, r0) 19:11:37 executing program 5: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0xf, r1) [ 2357.106684][ T4796] FAULT_INJECTION: forcing a failure. [ 2357.106684][ T4796] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2357.164673][ T4796] CPU: 0 PID: 4796 Comm: syz-executor.3 Not tainted 5.15.138-syzkaller #0 [ 2357.173220][ T4796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2357.183292][ T4796] Call Trace: [ 2357.186579][ T4796] [ 2357.189514][ T4796] dump_stack_lvl+0x1e3/0x2cb [ 2357.194211][ T4796] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2357.199870][ T4796] ? panic+0x84d/0x84d [ 2357.203978][ T4796] ? snprintf+0xd6/0x120 [ 2357.208328][ T4796] should_fail+0x38a/0x4c0 [ 2357.212778][ T4796] _copy_to_user+0x2d/0x130 [ 2357.217309][ T4796] simple_read_from_buffer+0xc6/0x150 [ 2357.222712][ T4796] proc_fail_nth_read+0x1a3/0x210 [ 2357.227763][ T4796] ? proc_fault_inject_write+0x390/0x390 [ 2357.233420][ T4796] ? fsnotify_perm+0x438/0x5a0 [ 2357.238207][ T4796] ? proc_fault_inject_write+0x390/0x390 [ 2357.243875][ T4796] vfs_read+0x300/0xe10 [ 2357.248057][ T4796] ? kernel_read+0x1f0/0x1f0 [ 2357.252671][ T4796] ? __fget_files+0x413/0x480 [ 2357.257392][ T4796] ? mutex_lock_nested+0x17/0x20 [ 2357.262359][ T4796] ? __fdget_pos+0x2cb/0x380 [ 2357.266969][ T4796] ? ksys_read+0x77/0x2c0 [ 2357.271321][ T4796] ksys_read+0x1a2/0x2c0 [ 2357.275587][ T4796] ? print_irqtrace_events+0x210/0x210 [ 2357.281076][ T4796] ? vfs_write+0xe50/0xe50 [ 2357.285507][ T4796] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2357.291497][ T4796] ? lockdep_hardirqs_on+0x94/0x130 [ 2357.296749][ T4796] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2357.302745][ T4796] do_syscall_64+0x3d/0xb0 [ 2357.307182][ T4796] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2357.313113][ T4796] RIP: 0033:0x7f433076078c [ 2357.317546][ T4796] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48 [ 2357.337253][ T4796] RSP: 002b:00007f432ece30c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2357.345688][ T4796] RAX: ffffffffffffffda RBX: 00007f4330880f80 RCX: 00007f433076078c [ 2357.353669][ T4796] RDX: 000000000000000f RSI: 00007f432ece3130 RDI: 0000000000000003 [ 2357.361656][ T4796] RBP: 00007f432ece3120 R08: 0000000000000000 R09: 0000000000000000 [ 2357.369649][ T4796] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2357.377700][ T4796] R13: 000000000000000b R14: 00007f4330880f80 R15: 00007ffdd4d34e78 [ 2357.385706][ T4796] 19:11:37 executing program 4: r0 = syz_genetlink_get_family_id$nfc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NFC_CMD_FW_DOWNLOAD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r0, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@NFC_ATTR_FIRMWARE_NAME={0xe, 0x14, '/dev/full\x00'}, @NFC_ATTR_FIRMWARE_NAME={0x4}, @NFC_ATTR_FIRMWARE_NAME={0x6, 0x14, '\xf1$'}]}, 0x30}, 0x1, 0x0, 0x0, 0x4004000}, 0x20004000) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_DROP(r1, 0x4143, 0x0) syz_genetlink_get_family_id$nfc(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$NFC_CMD_FW_DOWNLOAD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r0, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@NFC_ATTR_FIRMWARE_NAME={0xe, 0x14, '/dev/full\x00'}, @NFC_ATTR_FIRMWARE_NAME={0x4}, @NFC_ATTR_FIRMWARE_NAME={0x6, 0x14, '\xf1$'}]}, 0x30}, 0x1, 0x0, 0x0, 0x4004000}, 0x20004000) (async) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (async) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) (async) ioctl$SNDRV_PCM_IOCTL_DROP(r1, 0x4143, 0x0) (async) 19:11:37 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) 19:11:37 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x15, r1) 19:11:37 executing program 0: add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x6, 0x0) 19:11:37 executing program 5: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0xf, r1) 19:11:37 executing program 2: r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) r3 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r3, 0x0, 0x0], 0x9}, 0x58) r4 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r4, 0x0, 0x0], 0x9}, 0x58) r5 = syz_clone3(&(0x7f00000005c0)={0x20000400, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400), {0x1e}, &(0x7f0000000440)=""/237, 0xed, &(0x7f0000000540)=""/42, &(0x7f0000000580)=[r0, r0, r0, 0xffffffffffffffff, r0], 0x5}, 0x58) syz_clone3(&(0x7f0000000680)={0x21000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0x37}, &(0x7f0000000280)=""/171, 0xab, &(0x7f0000000340)=""/42, &(0x7f0000000640)=[r0, r0, r3, r4, r5], 0x5}, 0x58) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x7, 0x0, 0x0) 19:11:37 executing program 3: keyctl$unlink(0x2, 0x0, 0xffffffffffffffff) 19:11:37 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x15, r1) 19:11:37 executing program 5: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0xf, r1) 19:11:38 executing program 0: add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x6, 0x0) 19:11:38 executing program 3: keyctl$unlink(0x3, 0x0, 0xffffffffffffffff) 19:11:38 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x15, r1) 19:11:39 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {0x200000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:39 executing program 5: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0xf, r1) 19:11:39 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x6, r0) 19:11:39 executing program 3: keyctl$unlink(0x4, 0x0, 0xffffffffffffffff) 19:11:39 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x15, r1) 19:11:39 executing program 2: r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) r3 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r3, 0x0, 0x0], 0x9}, 0x58) r4 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r4, 0x0, 0x0], 0x9}, 0x58) r5 = syz_clone3(&(0x7f00000005c0)={0x20000400, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400), {0x1e}, &(0x7f0000000440)=""/237, 0xed, &(0x7f0000000540)=""/42, &(0x7f0000000580)=[r0, r0, r0, 0xffffffffffffffff, r0], 0x5}, 0x58) syz_clone3(&(0x7f0000000680)={0x21000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0x37}, &(0x7f0000000280)=""/171, 0xab, &(0x7f0000000340)=""/42, &(0x7f0000000640)=[r0, r0, r3, r4, r5], 0x5}, 0x58) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) 19:11:39 executing program 3: keyctl$unlink(0x5, 0x0, 0xffffffffffffffff) 19:11:39 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x6, r0) 19:11:39 executing program 5: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0xf, r1) 19:11:39 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x15, r1) 19:11:39 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {0x200000}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {0x200000}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) 19:11:39 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x6, r0) 19:11:39 executing program 3: keyctl$unlink(0x6, 0x0, 0xffffffffffffffff) 19:11:40 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x15, r1) 19:11:40 executing program 5: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0xf, r1) 19:11:40 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {0x200000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:40 executing program 0: r0 = add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x6, r1) 19:11:40 executing program 2: r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) r3 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r3, 0x0, 0x0], 0x9}, 0x58) r4 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r4, 0x0, 0x0], 0x9}, 0x58) r5 = syz_clone3(&(0x7f00000005c0)={0x20000400, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400), {0x1e}, &(0x7f0000000440)=""/237, 0xed, &(0x7f0000000540)=""/42, &(0x7f0000000580)=[r0, r0, r0, 0xffffffffffffffff, r0], 0x5}, 0x58) syz_clone3(&(0x7f0000000680)={0x21000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0x37}, &(0x7f0000000280)=""/171, 0xab, &(0x7f0000000340)=""/42, &(0x7f0000000640)=[r0, r0, r3, r4, r5], 0x5}, 0x58) 19:11:40 executing program 3: keyctl$unlink(0x7, 0x0, 0xffffffffffffffff) 19:11:40 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x15, 0x0) 19:11:40 executing program 5: add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0xf, r0) 19:11:40 executing program 0: r0 = add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x6, r1) 19:11:40 executing program 4: r0 = semget(0x1, 0x4, 0x208) clock_gettime(0x1, &(0x7f0000000ec0)={0x0, 0x0}) semtimedop(r0, &(0x7f0000000400)=[{0x0, 0x3, 0x800}], 0x1, &(0x7f0000000480)={r1, r2+10000000}) semctl$GETVAL(r0, 0x3, 0xc, &(0x7f0000000e80)=""/24) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000000)={0x0, @llc={0x1a, 0x2, 0xf7, 0x20, 0x8f, 0x7, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, @l2={0x1f, 0x20, @any, 0x3f, 0x2}, @nfc={0x27, 0x0, 0x0, 0x2}, 0xf9c4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x3, 0x1}) r4 = socket$inet6(0xa, 0x4, 0x33) bind(r4, &(0x7f0000000080)=@caif=@util={0x25, "763fca658a848e8c760ef622fceb08bf"}, 0x80) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000900)=0x0) setsockopt$PNPIPE_HANDLE(0xffffffffffffffff, 0x113, 0x3, &(0x7f0000000e40), 0x4) sendmmsg$nfc_llcp(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000100)={0x27, r3, 0xffffffffffffffff, 0x6, 0x2, 0x0, "83274ab1dd97db0512055a148ec53a2ba91f186630facae5702298ea4b5f76ef405d2174c068624d3e95f96a9e95e56c71f3906dd02fad94048a9beb7704d0", 0x30}, 0x60, &(0x7f0000000300)=[{&(0x7f0000000180)="ca7e6e34bd158863886c3b0b4b0f084fabbc98078f7a5a8a3b5dc8b4f7f13693a3a52b9bf63dac62a14b562027359f7b0fe3d95f206277ea66f92e15594c8dcf507845940a2e8d8e570889649e27f2f0ff74d7f0a7fd323c76409333a55790411adb397f5b81280487971feacebcc73f9edd56d2b6e4e99794304efea91718753b3eff13976597ef5aa5672c63ae1a837369d863ab05968a243b0cb3a294e7a824412dba4331bce21d4ed5e69919a435ffbf65", 0xb3}, {&(0x7f0000000240)="f64c8a718c1e47836fb3", 0xa}, {&(0x7f0000000280)="cea17c46a19ccbdc5a9ebaeca939ec46d8434e03ae529a91a98bc28bb817dfffd3ee50707def2f7e474c8f138a40009f7aadfa6c71c115214f830def209acd3802014cf5a4346718674b12aa939d7c5cd5", 0x51}], 0x3, 0x0, 0x0, 0x4000}, {&(0x7f0000000340)={0x27, r3, 0xffffffffffffffff, 0x2, 0xb9, 0x8, "ef7700eafb7e6bb06a572d7fa4c2ffeafe837f1773dc0625f6ec4f93a8313f0094b1742a79c9cbe24c44860acdfd0560645195ab89340a287665c77b61f452", 0x18}, 0x60, &(0x7f0000000500)=[{&(0x7f00000003c0)="cdeab49e35f358bc92792f93b6d3bfcfc0d227230daaba8ff635e1c8a753c0995b4fc7696bfd4d5d57b7ee5f78014c579045d9382e82b6ae9300c0ea23060bb74ecfa565f4abd9091196e4649ffd2d6595811809e04ad9ca81da607739fa9bc6c40f27744fbbae2724d31344f250c442c6c6c63ae43fd2b9fdaef23ba9211929fc93c95ab680add5f9c12bb8377484743f5512fff46c5e1804a82c429600d92c8f21cc7b34bd93d5f58a853a80db9c1485f01d1c94a9f540a42320823b31d28d73f9251e2594ee851a56276f271af0d74c1f8da72350e826a785942baa641b0cb9ac3b9ffd8432c975877b54d300655838", 0xf1}, {&(0x7f00000004c0)="4986e11cd8b054115c0528c3969ec227a1d96f24b779b55c", 0x18}], 0x2, &(0x7f0000000540)={0x38, 0x10c, 0x6, "0d0bbfc39de4604d26c95c8cc1359daa8e6a0cd26fa485fc109ce2fb0fc28e8f7833f06dbaf92951"}, 0x38, 0x8000}, {&(0x7f0000000580)={0x27, r3, 0x1, 0x6, 0x1, 0xff, "5d3debb2c3233e9025ea001bdb16e4a3574c6601ce87230ca65f159badd3fee308b9bc149f28b31766b46e1fe8a13aef610c7b12fa59b4ba26100b326d9daf", 0x34}, 0x60, &(0x7f00000007c0)=[{&(0x7f0000000600)="2ab37506f6494cecd48a5929d04c1a04b56e656824bd8080a4c29a30359e434f881b75a232840f20e78f29707410950cb337f4f235fa7cc423e2695bb7dbd6a83a1512c2afe1d303519167b08a65e2b5eb9584d0f3309b9ec5061972f6e8b4198516c3119c58dad421d0e2dcd753db69564a98e06c5f874e03f70e5745169f", 0x7f}, {&(0x7f0000000680)="d1b63bff688ddbaf93dc3da18b5c74ee77a698f799b8ee99b8e91cee7cbde5a10993ae92ded1498385f634fabd8e001d549767c856c874e24ccbbbd455efe75ef7ef271d5a931fb35917e3d8ec75b26986d96442fa0e3ac579cfd37b9dec394dca2f89ac770879a637a6346b65365ad314947b4301f7f1dfb1f786", 0x7b}, {&(0x7f0000000700)="291412b77779dbe1b16928fe21acc897a79e0231b51e6d1f00187ca9ed1213e0cbf053a53bdeba2e73e06cbb495f9bd619e2d2f54f077dd04c9fc69ef5e84fea1eb32c61504efe24f065786935e46af775b549d05684d65d898c11434d9fead3d307292ec634d5bfbe48414b45845bae3ea33b58ff227231fb90f7fdccafa0faf7fd6de8c992060de22ea1737252cf4c885a7855e90474f0082f82944295daee858d37fe88b5cf49", 0xa8}], 0x3, &(0x7f0000000800)={0xf8, 0x118, 0x0, "03d3495787a6b616d2b35183a7ca15d6188fd66187387f312b09fa1f4b73202d8cd1acc49ff123fe9cdfe88957ad794967f4ba2effa87f73f92559c551fd53b5797ffae85f0c464096d8b8e454fee22058ca89508de9dbb68ca3d98b926d80a01bd5b7c694758c678f4797c9b382b5e7d40c6ad321cea0a0b69472287c78c3518843977742120820d3b01409f602840ce5b114f9e346f97a591cf95a1d8b50dbbb589ff013f5eb5e6dbd6394aaebbc4019a271abe7e3b5e18f67a4a04139704eec46b47982597877e988d3e4c9b4456edc0f435ac025016c0d61bb5432ebf0a3e245"}, 0xf8, 0x10}, {&(0x7f0000000940)={0x27, r5, 0x0, 0x7, 0x80, 0x9, "4898da33ac155e051d97900bbbb3cf2d53e9f5851e6ee7ce095d71c17f5a1a57998134b71014a38b3e5276ed17442feb2b1a3faac3df35460218b603ab269f", 0x17}, 0x60, &(0x7f0000000cc0)=[{&(0x7f00000009c0)="e4401fd303389428f27c57b522d7aece1901976d1526d7976d2fe3974c8fc2907ab6ebecbe4a437136cf338e7f052a9d8b73cb3085889bc2fd7fec4834b9f4d84d2e8d1ba279157fe2e831dd5d78cb35a01072ab1a33222c7c8c4d331b0eeeaefadbc57ed161fe663fb3e95c8d1e246aed2c05825a3aabb88bdf9be1f5af3a0d9c0416c127cc6bd9fd8be524dc56a5447c9cbc6c542abe68f170dda1b002e2dd04f34645e65a24f79c3ea2dcdc0e574b5d788d", 0xb3}, {&(0x7f0000000f00)="716dd4b636c43f37ef376bf6b689559b18f3128db58fb2f82d185d8fc1a42fab76e867f06cba3344a949926a7ece4d9e428647209e276d643a15d6ce302aa524a7025c680d95544a1c213dab0acbfdd4a5264684", 0x54}, {&(0x7f0000000b00)="90c6ed3e0ac340ccfce2511661a9b68f044d507c0bfd0d0f79dea029d8f3bae1fefd3557ff7b2d95644dec653c3880fda9b4512260823f6508d11ef3541cca475f24c27a2459834219060d8c6264bb5e92dc7d1775bce8bb394ea618d83ce19545a6c6c0f5ebd42a450b7c0d49b70c3d6ce5d27a90ecba3e68c71f292092269c00b8ed7d7b52ffb5c7b9af8eddca7aec09e118594f4be1eb35cf9dfff66c0ba2c66de99b9feeeaeff6b7d9d10e987d16443cc2b770df4965ccbfb850a369d96daaed8c1257e1500090fe8280ddfcabafaa7c53e639b6924e240521ed9779d5f4f0b9febbf5", 0xe5}, {&(0x7f0000000c00)="bd692756787c1405cb76a6cbde3e1d996790765b5f91764ea18d45f88a295264d707523ca489e9e9769b81a10e38162ac18200bffd30b21301c6cdab9663978e4431efb4cd64310d57eb157a86eba748d40e11cc9a833a98b3ad5f78c2da2b94b834370c989c7c4eaf1309039af85cbcd741f889e41787930d61f67fafe3d20e92d1bcd6fb6f887057d5217dabe1aa1f6db7424b40d83611680a714545c07242da2ac49e1669c6df90d8061b0a96f579ca479b98c0bb27f2b73e8228cbfa6614", 0xc0}], 0x4, &(0x7f0000000d00)={0x30, 0x115, 0x3, "c04ced5df68cbb6b259b3bae29eebdf33a8311844a97eb845e88a8b889"}, 0x30, 0x8010}], 0x4, 0x0) 19:11:40 executing program 3: keyctl$unlink(0x8, 0x0, 0xffffffffffffffff) 19:11:40 executing program 5: add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0xf, r0) 19:11:40 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x15, 0x0) 19:11:40 executing program 0: r0 = add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x6, r1) 19:11:40 executing program 3: keyctl$unlink(0x9, 0x0, 0xffffffffffffffff) 19:11:40 executing program 5: add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0xf, r0) 19:11:41 executing program 4: r0 = semget(0x1, 0x4, 0x208) (async) clock_gettime(0x1, &(0x7f0000000ec0)={0x0, 0x0}) semtimedop(r0, &(0x7f0000000400)=[{0x0, 0x3, 0x800}], 0x1, &(0x7f0000000480)={r1, r2+10000000}) (async, rerun: 64) semctl$GETVAL(r0, 0x3, 0xc, &(0x7f0000000e80)=""/24) (async, rerun: 64) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000000)={0x0, @llc={0x1a, 0x2, 0xf7, 0x20, 0x8f, 0x7, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, @l2={0x1f, 0x20, @any, 0x3f, 0x2}, @nfc={0x27, 0x0, 0x0, 0x2}, 0xf9c4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x3, 0x1}) (async, rerun: 64) r4 = socket$inet6(0xa, 0x4, 0x33) (rerun: 64) bind(r4, &(0x7f0000000080)=@caif=@util={0x25, "763fca658a848e8c760ef622fceb08bf"}, 0x80) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000900)=0x0) setsockopt$PNPIPE_HANDLE(0xffffffffffffffff, 0x113, 0x3, &(0x7f0000000e40), 0x4) (async) sendmmsg$nfc_llcp(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000100)={0x27, r3, 0xffffffffffffffff, 0x6, 0x2, 0x0, "83274ab1dd97db0512055a148ec53a2ba91f186630facae5702298ea4b5f76ef405d2174c068624d3e95f96a9e95e56c71f3906dd02fad94048a9beb7704d0", 0x30}, 0x60, &(0x7f0000000300)=[{&(0x7f0000000180)="ca7e6e34bd158863886c3b0b4b0f084fabbc98078f7a5a8a3b5dc8b4f7f13693a3a52b9bf63dac62a14b562027359f7b0fe3d95f206277ea66f92e15594c8dcf507845940a2e8d8e570889649e27f2f0ff74d7f0a7fd323c76409333a55790411adb397f5b81280487971feacebcc73f9edd56d2b6e4e99794304efea91718753b3eff13976597ef5aa5672c63ae1a837369d863ab05968a243b0cb3a294e7a824412dba4331bce21d4ed5e69919a435ffbf65", 0xb3}, {&(0x7f0000000240)="f64c8a718c1e47836fb3", 0xa}, {&(0x7f0000000280)="cea17c46a19ccbdc5a9ebaeca939ec46d8434e03ae529a91a98bc28bb817dfffd3ee50707def2f7e474c8f138a40009f7aadfa6c71c115214f830def209acd3802014cf5a4346718674b12aa939d7c5cd5", 0x51}], 0x3, 0x0, 0x0, 0x4000}, {&(0x7f0000000340)={0x27, r3, 0xffffffffffffffff, 0x2, 0xb9, 0x8, "ef7700eafb7e6bb06a572d7fa4c2ffeafe837f1773dc0625f6ec4f93a8313f0094b1742a79c9cbe24c44860acdfd0560645195ab89340a287665c77b61f452", 0x18}, 0x60, &(0x7f0000000500)=[{&(0x7f00000003c0)="cdeab49e35f358bc92792f93b6d3bfcfc0d227230daaba8ff635e1c8a753c0995b4fc7696bfd4d5d57b7ee5f78014c579045d9382e82b6ae9300c0ea23060bb74ecfa565f4abd9091196e4649ffd2d6595811809e04ad9ca81da607739fa9bc6c40f27744fbbae2724d31344f250c442c6c6c63ae43fd2b9fdaef23ba9211929fc93c95ab680add5f9c12bb8377484743f5512fff46c5e1804a82c429600d92c8f21cc7b34bd93d5f58a853a80db9c1485f01d1c94a9f540a42320823b31d28d73f9251e2594ee851a56276f271af0d74c1f8da72350e826a785942baa641b0cb9ac3b9ffd8432c975877b54d300655838", 0xf1}, {&(0x7f00000004c0)="4986e11cd8b054115c0528c3969ec227a1d96f24b779b55c", 0x18}], 0x2, &(0x7f0000000540)={0x38, 0x10c, 0x6, "0d0bbfc39de4604d26c95c8cc1359daa8e6a0cd26fa485fc109ce2fb0fc28e8f7833f06dbaf92951"}, 0x38, 0x8000}, {&(0x7f0000000580)={0x27, r3, 0x1, 0x6, 0x1, 0xff, "5d3debb2c3233e9025ea001bdb16e4a3574c6601ce87230ca65f159badd3fee308b9bc149f28b31766b46e1fe8a13aef610c7b12fa59b4ba26100b326d9daf", 0x34}, 0x60, &(0x7f00000007c0)=[{&(0x7f0000000600)="2ab37506f6494cecd48a5929d04c1a04b56e656824bd8080a4c29a30359e434f881b75a232840f20e78f29707410950cb337f4f235fa7cc423e2695bb7dbd6a83a1512c2afe1d303519167b08a65e2b5eb9584d0f3309b9ec5061972f6e8b4198516c3119c58dad421d0e2dcd753db69564a98e06c5f874e03f70e5745169f", 0x7f}, {&(0x7f0000000680)="d1b63bff688ddbaf93dc3da18b5c74ee77a698f799b8ee99b8e91cee7cbde5a10993ae92ded1498385f634fabd8e001d549767c856c874e24ccbbbd455efe75ef7ef271d5a931fb35917e3d8ec75b26986d96442fa0e3ac579cfd37b9dec394dca2f89ac770879a637a6346b65365ad314947b4301f7f1dfb1f786", 0x7b}, {&(0x7f0000000700)="291412b77779dbe1b16928fe21acc897a79e0231b51e6d1f00187ca9ed1213e0cbf053a53bdeba2e73e06cbb495f9bd619e2d2f54f077dd04c9fc69ef5e84fea1eb32c61504efe24f065786935e46af775b549d05684d65d898c11434d9fead3d307292ec634d5bfbe48414b45845bae3ea33b58ff227231fb90f7fdccafa0faf7fd6de8c992060de22ea1737252cf4c885a7855e90474f0082f82944295daee858d37fe88b5cf49", 0xa8}], 0x3, &(0x7f0000000800)={0xf8, 0x118, 0x0, "03d3495787a6b616d2b35183a7ca15d6188fd66187387f312b09fa1f4b73202d8cd1acc49ff123fe9cdfe88957ad794967f4ba2effa87f73f92559c551fd53b5797ffae85f0c464096d8b8e454fee22058ca89508de9dbb68ca3d98b926d80a01bd5b7c694758c678f4797c9b382b5e7d40c6ad321cea0a0b69472287c78c3518843977742120820d3b01409f602840ce5b114f9e346f97a591cf95a1d8b50dbbb589ff013f5eb5e6dbd6394aaebbc4019a271abe7e3b5e18f67a4a04139704eec46b47982597877e988d3e4c9b4456edc0f435ac025016c0d61bb5432ebf0a3e245"}, 0xf8, 0x10}, {&(0x7f0000000940)={0x27, r5, 0x0, 0x7, 0x80, 0x9, "4898da33ac155e051d97900bbbb3cf2d53e9f5851e6ee7ce095d71c17f5a1a57998134b71014a38b3e5276ed17442feb2b1a3faac3df35460218b603ab269f", 0x17}, 0x60, &(0x7f0000000cc0)=[{&(0x7f00000009c0)="e4401fd303389428f27c57b522d7aece1901976d1526d7976d2fe3974c8fc2907ab6ebecbe4a437136cf338e7f052a9d8b73cb3085889bc2fd7fec4834b9f4d84d2e8d1ba279157fe2e831dd5d78cb35a01072ab1a33222c7c8c4d331b0eeeaefadbc57ed161fe663fb3e95c8d1e246aed2c05825a3aabb88bdf9be1f5af3a0d9c0416c127cc6bd9fd8be524dc56a5447c9cbc6c542abe68f170dda1b002e2dd04f34645e65a24f79c3ea2dcdc0e574b5d788d", 0xb3}, {&(0x7f0000000f00)="716dd4b636c43f37ef376bf6b689559b18f3128db58fb2f82d185d8fc1a42fab76e867f06cba3344a949926a7ece4d9e428647209e276d643a15d6ce302aa524a7025c680d95544a1c213dab0acbfdd4a5264684", 0x54}, {&(0x7f0000000b00)="90c6ed3e0ac340ccfce2511661a9b68f044d507c0bfd0d0f79dea029d8f3bae1fefd3557ff7b2d95644dec653c3880fda9b4512260823f6508d11ef3541cca475f24c27a2459834219060d8c6264bb5e92dc7d1775bce8bb394ea618d83ce19545a6c6c0f5ebd42a450b7c0d49b70c3d6ce5d27a90ecba3e68c71f292092269c00b8ed7d7b52ffb5c7b9af8eddca7aec09e118594f4be1eb35cf9dfff66c0ba2c66de99b9feeeaeff6b7d9d10e987d16443cc2b770df4965ccbfb850a369d96daaed8c1257e1500090fe8280ddfcabafaa7c53e639b6924e240521ed9779d5f4f0b9febbf5", 0xe5}, {&(0x7f0000000c00)="bd692756787c1405cb76a6cbde3e1d996790765b5f91764ea18d45f88a295264d707523ca489e9e9769b81a10e38162ac18200bffd30b21301c6cdab9663978e4431efb4cd64310d57eb157a86eba748d40e11cc9a833a98b3ad5f78c2da2b94b834370c989c7c4eaf1309039af85cbcd741f889e41787930d61f67fafe3d20e92d1bcd6fb6f887057d5217dabe1aa1f6db7424b40d83611680a714545c07242da2ac49e1669c6df90d8061b0a96f579ca479b98c0bb27f2b73e8228cbfa6614", 0xc0}], 0x4, &(0x7f0000000d00)={0x30, 0x115, 0x3, "c04ced5df68cbb6b259b3bae29eebdf33a8311844a97eb845e88a8b889"}, 0x30, 0x8010}], 0x4, 0x0) 19:11:41 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x6, r1) 19:11:41 executing program 5: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0xf, r1) 19:11:41 executing program 3: keyctl$unlink(0xa, 0x0, 0xffffffffffffffff) 19:11:41 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x15, 0x0) 19:11:41 executing program 2: r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) r3 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r3, 0x0, 0x0], 0x9}, 0x58) r4 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r4, 0x0, 0x0], 0x9}, 0x58) syz_clone3(&(0x7f00000005c0)={0x20000400, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400), {0x1e}, &(0x7f0000000440)=""/237, 0xed, &(0x7f0000000540)=""/42, &(0x7f0000000580)=[r0, r0, r0, 0xffffffffffffffff, r0], 0x5}, 0x58) 19:11:41 executing program 3: keyctl$unlink(0xb, 0x0, 0xffffffffffffffff) 19:11:41 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x6, r1) 19:11:41 executing program 1: r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) r3 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r3, 0x0, 0x0], 0x9}, 0x58) r4 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r4, 0x0, 0x0], 0x9}, 0x58) r5 = syz_clone3(&(0x7f00000005c0)={0x20000400, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400), {0x1e}, &(0x7f0000000440)=""/237, 0xed, &(0x7f0000000540)=""/42, &(0x7f0000000580)=[r0, r0, r0, 0xffffffffffffffff, r0], 0x5}, 0x58) syz_clone3(&(0x7f0000000680)={0x21000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0x37}, &(0x7f0000000280)=""/171, 0xab, &(0x7f0000000340)=""/42, &(0x7f0000000640)=[r0, r0, r3, r4, r5], 0x5}, 0x58) 19:11:41 executing program 5: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0xf, r1) 19:11:41 executing program 3: keyctl$unlink(0xc, 0x0, 0xffffffffffffffff) 19:11:41 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x6, r1) 19:11:41 executing program 4: r0 = semget(0x1, 0x4, 0x208) (async) clock_gettime(0x1, &(0x7f0000000ec0)={0x0, 0x0}) semtimedop(r0, &(0x7f0000000400)=[{0x0, 0x3, 0x800}], 0x1, &(0x7f0000000480)={r1, r2+10000000}) semctl$GETVAL(r0, 0x3, 0xc, &(0x7f0000000e80)=""/24) (async) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000000)={0x0, @llc={0x1a, 0x2, 0xf7, 0x20, 0x8f, 0x7, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, @l2={0x1f, 0x20, @any, 0x3f, 0x2}, @nfc={0x27, 0x0, 0x0, 0x2}, 0xf9c4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x3, 0x1}) (async) r4 = socket$inet6(0xa, 0x4, 0x33) bind(r4, &(0x7f0000000080)=@caif=@util={0x25, "763fca658a848e8c760ef622fceb08bf"}, 0x80) (async) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000900)=0x0) setsockopt$PNPIPE_HANDLE(0xffffffffffffffff, 0x113, 0x3, &(0x7f0000000e40), 0x4) sendmmsg$nfc_llcp(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000100)={0x27, r3, 0xffffffffffffffff, 0x6, 0x2, 0x0, "83274ab1dd97db0512055a148ec53a2ba91f186630facae5702298ea4b5f76ef405d2174c068624d3e95f96a9e95e56c71f3906dd02fad94048a9beb7704d0", 0x30}, 0x60, &(0x7f0000000300)=[{&(0x7f0000000180)="ca7e6e34bd158863886c3b0b4b0f084fabbc98078f7a5a8a3b5dc8b4f7f13693a3a52b9bf63dac62a14b562027359f7b0fe3d95f206277ea66f92e15594c8dcf507845940a2e8d8e570889649e27f2f0ff74d7f0a7fd323c76409333a55790411adb397f5b81280487971feacebcc73f9edd56d2b6e4e99794304efea91718753b3eff13976597ef5aa5672c63ae1a837369d863ab05968a243b0cb3a294e7a824412dba4331bce21d4ed5e69919a435ffbf65", 0xb3}, {&(0x7f0000000240)="f64c8a718c1e47836fb3", 0xa}, {&(0x7f0000000280)="cea17c46a19ccbdc5a9ebaeca939ec46d8434e03ae529a91a98bc28bb817dfffd3ee50707def2f7e474c8f138a40009f7aadfa6c71c115214f830def209acd3802014cf5a4346718674b12aa939d7c5cd5", 0x51}], 0x3, 0x0, 0x0, 0x4000}, {&(0x7f0000000340)={0x27, r3, 0xffffffffffffffff, 0x2, 0xb9, 0x8, "ef7700eafb7e6bb06a572d7fa4c2ffeafe837f1773dc0625f6ec4f93a8313f0094b1742a79c9cbe24c44860acdfd0560645195ab89340a287665c77b61f452", 0x18}, 0x60, &(0x7f0000000500)=[{&(0x7f00000003c0)="cdeab49e35f358bc92792f93b6d3bfcfc0d227230daaba8ff635e1c8a753c0995b4fc7696bfd4d5d57b7ee5f78014c579045d9382e82b6ae9300c0ea23060bb74ecfa565f4abd9091196e4649ffd2d6595811809e04ad9ca81da607739fa9bc6c40f27744fbbae2724d31344f250c442c6c6c63ae43fd2b9fdaef23ba9211929fc93c95ab680add5f9c12bb8377484743f5512fff46c5e1804a82c429600d92c8f21cc7b34bd93d5f58a853a80db9c1485f01d1c94a9f540a42320823b31d28d73f9251e2594ee851a56276f271af0d74c1f8da72350e826a785942baa641b0cb9ac3b9ffd8432c975877b54d300655838", 0xf1}, {&(0x7f00000004c0)="4986e11cd8b054115c0528c3969ec227a1d96f24b779b55c", 0x18}], 0x2, &(0x7f0000000540)={0x38, 0x10c, 0x6, "0d0bbfc39de4604d26c95c8cc1359daa8e6a0cd26fa485fc109ce2fb0fc28e8f7833f06dbaf92951"}, 0x38, 0x8000}, {&(0x7f0000000580)={0x27, r3, 0x1, 0x6, 0x1, 0xff, "5d3debb2c3233e9025ea001bdb16e4a3574c6601ce87230ca65f159badd3fee308b9bc149f28b31766b46e1fe8a13aef610c7b12fa59b4ba26100b326d9daf", 0x34}, 0x60, &(0x7f00000007c0)=[{&(0x7f0000000600)="2ab37506f6494cecd48a5929d04c1a04b56e656824bd8080a4c29a30359e434f881b75a232840f20e78f29707410950cb337f4f235fa7cc423e2695bb7dbd6a83a1512c2afe1d303519167b08a65e2b5eb9584d0f3309b9ec5061972f6e8b4198516c3119c58dad421d0e2dcd753db69564a98e06c5f874e03f70e5745169f", 0x7f}, {&(0x7f0000000680)="d1b63bff688ddbaf93dc3da18b5c74ee77a698f799b8ee99b8e91cee7cbde5a10993ae92ded1498385f634fabd8e001d549767c856c874e24ccbbbd455efe75ef7ef271d5a931fb35917e3d8ec75b26986d96442fa0e3ac579cfd37b9dec394dca2f89ac770879a637a6346b65365ad314947b4301f7f1dfb1f786", 0x7b}, {&(0x7f0000000700)="291412b77779dbe1b16928fe21acc897a79e0231b51e6d1f00187ca9ed1213e0cbf053a53bdeba2e73e06cbb495f9bd619e2d2f54f077dd04c9fc69ef5e84fea1eb32c61504efe24f065786935e46af775b549d05684d65d898c11434d9fead3d307292ec634d5bfbe48414b45845bae3ea33b58ff227231fb90f7fdccafa0faf7fd6de8c992060de22ea1737252cf4c885a7855e90474f0082f82944295daee858d37fe88b5cf49", 0xa8}], 0x3, &(0x7f0000000800)={0xf8, 0x118, 0x0, "03d3495787a6b616d2b35183a7ca15d6188fd66187387f312b09fa1f4b73202d8cd1acc49ff123fe9cdfe88957ad794967f4ba2effa87f73f92559c551fd53b5797ffae85f0c464096d8b8e454fee22058ca89508de9dbb68ca3d98b926d80a01bd5b7c694758c678f4797c9b382b5e7d40c6ad321cea0a0b69472287c78c3518843977742120820d3b01409f602840ce5b114f9e346f97a591cf95a1d8b50dbbb589ff013f5eb5e6dbd6394aaebbc4019a271abe7e3b5e18f67a4a04139704eec46b47982597877e988d3e4c9b4456edc0f435ac025016c0d61bb5432ebf0a3e245"}, 0xf8, 0x10}, {&(0x7f0000000940)={0x27, r5, 0x0, 0x7, 0x80, 0x9, "4898da33ac155e051d97900bbbb3cf2d53e9f5851e6ee7ce095d71c17f5a1a57998134b71014a38b3e5276ed17442feb2b1a3faac3df35460218b603ab269f", 0x17}, 0x60, &(0x7f0000000cc0)=[{&(0x7f00000009c0)="e4401fd303389428f27c57b522d7aece1901976d1526d7976d2fe3974c8fc2907ab6ebecbe4a437136cf338e7f052a9d8b73cb3085889bc2fd7fec4834b9f4d84d2e8d1ba279157fe2e831dd5d78cb35a01072ab1a33222c7c8c4d331b0eeeaefadbc57ed161fe663fb3e95c8d1e246aed2c05825a3aabb88bdf9be1f5af3a0d9c0416c127cc6bd9fd8be524dc56a5447c9cbc6c542abe68f170dda1b002e2dd04f34645e65a24f79c3ea2dcdc0e574b5d788d", 0xb3}, {&(0x7f0000000f00)="716dd4b636c43f37ef376bf6b689559b18f3128db58fb2f82d185d8fc1a42fab76e867f06cba3344a949926a7ece4d9e428647209e276d643a15d6ce302aa524a7025c680d95544a1c213dab0acbfdd4a5264684", 0x54}, {&(0x7f0000000b00)="90c6ed3e0ac340ccfce2511661a9b68f044d507c0bfd0d0f79dea029d8f3bae1fefd3557ff7b2d95644dec653c3880fda9b4512260823f6508d11ef3541cca475f24c27a2459834219060d8c6264bb5e92dc7d1775bce8bb394ea618d83ce19545a6c6c0f5ebd42a450b7c0d49b70c3d6ce5d27a90ecba3e68c71f292092269c00b8ed7d7b52ffb5c7b9af8eddca7aec09e118594f4be1eb35cf9dfff66c0ba2c66de99b9feeeaeff6b7d9d10e987d16443cc2b770df4965ccbfb850a369d96daaed8c1257e1500090fe8280ddfcabafaa7c53e639b6924e240521ed9779d5f4f0b9febbf5", 0xe5}, {&(0x7f0000000c00)="bd692756787c1405cb76a6cbde3e1d996790765b5f91764ea18d45f88a295264d707523ca489e9e9769b81a10e38162ac18200bffd30b21301c6cdab9663978e4431efb4cd64310d57eb157a86eba748d40e11cc9a833a98b3ad5f78c2da2b94b834370c989c7c4eaf1309039af85cbcd741f889e41787930d61f67fafe3d20e92d1bcd6fb6f887057d5217dabe1aa1f6db7424b40d83611680a714545c07242da2ac49e1669c6df90d8061b0a96f579ca479b98c0bb27f2b73e8228cbfa6614", 0xc0}], 0x4, &(0x7f0000000d00)={0x30, 0x115, 0x3, "c04ced5df68cbb6b259b3bae29eebdf33a8311844a97eb845e88a8b889"}, 0x30, 0x8010}], 0x4, 0x0) 19:11:41 executing program 5: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0xf, r1) 19:11:41 executing program 3: keyctl$unlink(0xd, 0x0, 0xffffffffffffffff) 19:11:41 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x6, r1) 19:11:41 executing program 2: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_io_uring_submit(r0, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) r2 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r2, 0x0, 0x0], 0x9}, 0x58) r3 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r3, 0x0, 0x0], 0x9}, 0x58) 19:11:41 executing program 1: r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) r3 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r3, 0x0, 0x0], 0x9}, 0x58) r4 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r4, 0x0, 0x0], 0x9}, 0x58) r5 = syz_clone3(&(0x7f00000005c0)={0x20000400, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400), {0x1e}, &(0x7f0000000440)=""/237, 0xed, &(0x7f0000000540)=""/42, &(0x7f0000000580)=[r0, r0, r0, 0xffffffffffffffff, r0], 0x5}, 0x58) syz_clone3(&(0x7f0000000680)={0x21000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0x37}, &(0x7f0000000280)=""/171, 0xab, &(0x7f0000000340)=""/42, &(0x7f0000000640)=[r0, r0, r3, r4, r5], 0x5}, 0x58) 19:11:41 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x6, r1) 19:11:41 executing program 3: keyctl$unlink(0xe, 0x0, 0xffffffffffffffff) 19:11:41 executing program 5: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0xf, r1) 19:11:42 executing program 5: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0xf, r1) 19:11:42 executing program 3: keyctl$unlink(0xf, 0x0, 0xffffffffffffffff) 19:11:42 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x6, r1) 19:11:42 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x3, 0x0) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f00000000c0)='big_key\x00', 0xfffffffffffffffd, r2) keyctl$reject(0x13, r0, 0x124ac10c, 0x2, r1) 19:11:42 executing program 5: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0xf, r1) 19:11:42 executing program 3: keyctl$unlink(0x10, 0x0, 0xffffffffffffffff) 19:11:42 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x6, r1) 19:11:42 executing program 2: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_io_uring_submit(r0, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) r2 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r2, 0x0, 0x0], 0x9}, 0x58) getpgrp(0xffffffffffffffff) 19:11:42 executing program 1: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x3, 0x0) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f00000000c0)='big_key\x00', 0xfffffffffffffffd, r2) keyctl$reject(0x13, r0, 0x124ac10c, 0x2, r1) 19:11:42 executing program 5: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0xf, 0x0) 19:11:42 executing program 3: keyctl$unlink(0x11, 0x0, 0xffffffffffffffff) 19:11:42 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x6, r1) 19:11:42 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x3, 0x0) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f00000000c0)='big_key\x00', 0xfffffffffffffffd, r2) (async) keyctl$reject(0x13, r0, 0x124ac10c, 0x2, r1) 19:11:42 executing program 3: keyctl$unlink(0x12, 0x0, 0xffffffffffffffff) 19:11:42 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x6, r1) 19:11:42 executing program 5: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0xf, 0x0) 19:11:42 executing program 3: keyctl$unlink(0x13, 0x0, 0xffffffffffffffff) 19:11:42 executing program 2: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_io_uring_submit(r0, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) r2 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r2, 0x0, 0x0], 0x9}, 0x58) 19:11:42 executing program 0: add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x6, r0) 19:11:43 executing program 5: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0xf, 0x0) 19:11:43 executing program 1: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x3, 0x0) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f00000000c0)='big_key\x00', 0xfffffffffffffffd, r2) keyctl$reject(0x13, r0, 0x124ac10c, 0x2, r1) 19:11:43 executing program 3: keyctl$unlink(0x14, 0x0, 0xffffffffffffffff) 19:11:43 executing program 5: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_io_uring_submit(r0, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) r2 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r2, 0x0, 0x0], 0x9}, 0x58) getpgrp(0xffffffffffffffff) 19:11:43 executing program 0: add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x6, r0) 19:11:43 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x3, 0x0) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f00000000c0)='big_key\x00', 0xfffffffffffffffd, r2) keyctl$reject(0x13, r0, 0x124ac10c, 0x2, r1) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x3, 0x0) (async) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) (async) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0x0) (async) add_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) (async) keyctl$search(0xa, r0, &(0x7f00000000c0)='big_key\x00', 0xfffffffffffffffd, r2) (async) keyctl$reject(0x13, r0, 0x124ac10c, 0x2, r1) (async) 19:11:43 executing program 3: keyctl$unlink(0x15, 0x0, 0xffffffffffffffff) 19:11:43 executing program 0: add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x6, r0) 19:11:43 executing program 2: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_io_uring_submit(r0, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:43 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x6, r1) 19:11:43 executing program 3: keyctl$unlink(0x16, 0x0, 0xffffffffffffffff) 19:11:43 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x6, r1) 19:11:43 executing program 3: keyctl$unlink(0x17, 0x0, 0xffffffffffffffff) 19:11:44 executing program 1: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x3, 0x0) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f00000000c0)='big_key\x00', 0xfffffffffffffffd, r2) keyctl$reject(0x13, r0, 0x124ac10c, 0x2, r1) 19:11:44 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x6, r1) 19:11:44 executing program 3: keyctl$unlink(0x19, 0x0, 0xffffffffffffffff) 19:11:44 executing program 5: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_io_uring_submit(r0, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) r2 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r2, 0x0, 0x0], 0x9}, 0x58) 19:11:46 executing program 3: keyctl$unlink(0x1a, 0x0, 0xffffffffffffffff) 19:11:46 executing program 2: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080), &(0x7f00000000c0)) socket$inet6_mptcp(0xa, 0x1, 0x106) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:46 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x6, r1) 19:11:46 executing program 1: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x3, 0x0) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f00000000c0)='big_key\x00', 0xfffffffffffffffd, r1) 19:11:46 executing program 5: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_io_uring_submit(r0, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:46 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008aec1, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) bind(r0, &(0x7f0000000540)=@rc={0x1f, @any, 0x1}, 0x80) r2 = syz_clone3(&(0x7f00000011c0)={0xe7226000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x24ea, &(0x7f0000000000)={0x0, 0xba4a, 0x2, 0x0, 0x245}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_setup(0x3e93, &(0x7f0000000100)={0x0, 0xe22d, 0x280, 0x1, 0x2de}, &(0x7f0000000180), &(0x7f00000001c0)=0x0) syz_io_uring_setup(0x72f4, &(0x7f00000005c0)={0x0, 0x7c6, 0x200, 0x3, 0x386}, &(0x7f0000000640)=0x0, &(0x7f0000000680)) r7 = socket$inet(0x2, 0x8, 0x400) syz_io_uring_submit(r6, r4, &(0x7f0000000700)=@IORING_OP_SEND={0x1a, 0xe, 0x0, r7, 0x0, &(0x7f00000006c0)="ad4b1594a38883f625d74af283b074b146b525feb11bb78fba2e1aaf977a7616aa67286757cbd0b0a4e8d2fd6601", 0x2e, 0x800}) syz_clone3(&(0x7f0000000480)={0x800000, &(0x7f0000000200)=0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280), {0x27}, &(0x7f00000002c0)=""/79, 0x4f, &(0x7f0000000340)=""/216, &(0x7f0000000440)=[r2], 0x1}, 0x58) socket$alg(0x26, 0x5, 0x0) syz_io_uring_submit(r3, r5, &(0x7f0000000500)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x7f, 0x4000, @fd=r8, 0x3, 0x0, 0x0, 0x1a, 0x1, {0x3}}) 19:11:46 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x6, r1) 19:11:46 executing program 3: keyctl$unlink(0x1b, 0x0, 0xffffffffffffffff) 19:11:46 executing program 3: keyctl$unlink(0x1c, 0x0, 0xffffffffffffffff) 19:11:46 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x6, r1) 19:11:46 executing program 3: keyctl$unlink(0x1d, 0x0, 0xffffffffffffffff) 19:11:46 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x6, 0x0) 19:11:46 executing program 3: keyctl$unlink(0x1e, 0x0, 0xffffffffffffffff) 19:11:46 executing program 2: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:46 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x6, 0x0) 19:11:46 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$link(0x8, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$get_persistent(0x16, 0xffffffffffffffff, r2) 19:11:46 executing program 5: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_io_uring_submit(r0, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:46 executing program 1: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x3, 0x0) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0x0) keyctl$search(0xa, r0, &(0x7f00000000c0)='big_key\x00', 0xfffffffffffffffd, 0x0) 19:11:46 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008aec1, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) (async) bind(r0, &(0x7f0000000540)=@rc={0x1f, @any, 0x1}, 0x80) r2 = syz_clone3(&(0x7f00000011c0)={0xe7226000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x24ea, &(0x7f0000000000)={0x0, 0xba4a, 0x2, 0x0, 0x245}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x0) (async) syz_io_uring_setup(0x3e93, &(0x7f0000000100)={0x0, 0xe22d, 0x280, 0x1, 0x2de}, &(0x7f0000000180), &(0x7f00000001c0)=0x0) syz_io_uring_setup(0x72f4, &(0x7f00000005c0)={0x0, 0x7c6, 0x200, 0x3, 0x386}, &(0x7f0000000640)=0x0, &(0x7f0000000680)) (async) r7 = socket$inet(0x2, 0x8, 0x400) syz_io_uring_submit(r6, r4, &(0x7f0000000700)=@IORING_OP_SEND={0x1a, 0xe, 0x0, r7, 0x0, &(0x7f00000006c0)="ad4b1594a38883f625d74af283b074b146b525feb11bb78fba2e1aaf977a7616aa67286757cbd0b0a4e8d2fd6601", 0x2e, 0x800}) (async) syz_clone3(&(0x7f0000000480)={0x800000, &(0x7f0000000200)=0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280), {0x27}, &(0x7f00000002c0)=""/79, 0x4f, &(0x7f0000000340)=""/216, &(0x7f0000000440)=[r2], 0x1}, 0x58) socket$alg(0x26, 0x5, 0x0) (async) syz_io_uring_submit(r3, r5, &(0x7f0000000500)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x7f, 0x4000, @fd=r8, 0x3, 0x0, 0x0, 0x1a, 0x1, {0x3}}) 19:11:46 executing program 0: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x6, 0x0) 19:11:46 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$link(0x8, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$get_persistent(0x16, 0xffffffffffffffff, r2) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0x0) (async) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) (async) keyctl$link(0x8, 0x0, r1) (async) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) (async) keyctl$get_persistent(0x16, 0xffffffffffffffff, r2) (async) 19:11:47 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008aec1, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) bind(r0, &(0x7f0000000540)=@rc={0x1f, @any, 0x1}, 0x80) r2 = syz_clone3(&(0x7f00000011c0)={0xe7226000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x24ea, &(0x7f0000000000)={0x0, 0xba4a, 0x2, 0x0, 0x245}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_setup(0x3e93, &(0x7f0000000100)={0x0, 0xe22d, 0x280, 0x1, 0x2de}, &(0x7f0000000180), &(0x7f00000001c0)=0x0) syz_io_uring_setup(0x72f4, &(0x7f00000005c0)={0x0, 0x7c6, 0x200, 0x3, 0x386}, &(0x7f0000000640)=0x0, &(0x7f0000000680)) r7 = socket$inet(0x2, 0x8, 0x400) syz_io_uring_submit(r6, r4, &(0x7f0000000700)=@IORING_OP_SEND={0x1a, 0xe, 0x0, r7, 0x0, &(0x7f00000006c0)="ad4b1594a38883f625d74af283b074b146b525feb11bb78fba2e1aaf977a7616aa67286757cbd0b0a4e8d2fd6601", 0x2e, 0x800}) syz_clone3(&(0x7f0000000480)={0x800000, &(0x7f0000000200)=0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280), {0x27}, &(0x7f00000002c0)=""/79, 0x4f, &(0x7f0000000340)=""/216, &(0x7f0000000440)=[r2], 0x1}, 0x58) socket$alg(0x26, 0x5, 0x0) syz_io_uring_submit(r3, r5, &(0x7f0000000500)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x7f, 0x4000, @fd=r8, 0x3, 0x0, 0x0, 0x1a, 0x1, {0x3}}) 19:11:47 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) (async) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$link(0x8, 0x0, r1) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$get_persistent(0x16, 0xffffffffffffffff, r2) 19:11:47 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "f54e4a697e3279ae8590799926fe81d89aa116f5559a0a90ff3e4c433aced7a150ffe0e07920a9888b96b23a5204538cebd1941dc3e7e5569a0d03f6e8021d71", 0x1b}, 0x48, 0xfffffffffffffffe) keyctl$get_persistent(0x16, 0xee01, r0) 19:11:47 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "f54e4a697e3279ae8590799926fe81d89aa116f5559a0a90ff3e4c433aced7a150ffe0e07920a9888b96b23a5204538cebd1941dc3e7e5569a0d03f6e8021d71", 0x1b}, 0x48, 0xfffffffffffffffe) keyctl$get_persistent(0x16, 0xee01, r0) 19:11:47 executing program 2: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:47 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "f54e4a697e3279ae8590799926fe81d89aa116f5559a0a90ff3e4c433aced7a150ffe0e07920a9888b96b23a5204538cebd1941dc3e7e5569a0d03f6e8021d71", 0x1b}, 0x48, 0xfffffffffffffffe) keyctl$get_persistent(0x16, 0xee01, r0) 19:11:47 executing program 1: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x3, 0x0) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$search(0xa, r0, &(0x7f00000000c0)='big_key\x00', 0xfffffffffffffffd, 0x0) 19:11:47 executing program 5: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_io_uring_submit(r0, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:47 executing program 3: getuid() keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) 19:11:47 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (async, rerun: 64) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (rerun: 64) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008aec1, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) bind(r0, &(0x7f0000000540)=@rc={0x1f, @any, 0x1}, 0x80) (async) r2 = syz_clone3(&(0x7f00000011c0)={0xe7226000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x24ea, &(0x7f0000000000)={0x0, 0xba4a, 0x2, 0x0, 0x245}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_setup(0x3e93, &(0x7f0000000100)={0x0, 0xe22d, 0x280, 0x1, 0x2de}, &(0x7f0000000180), &(0x7f00000001c0)=0x0) (async) syz_io_uring_setup(0x72f4, &(0x7f00000005c0)={0x0, 0x7c6, 0x200, 0x3, 0x386}, &(0x7f0000000640)=0x0, &(0x7f0000000680)) (async) r7 = socket$inet(0x2, 0x8, 0x400) syz_io_uring_submit(r6, r4, &(0x7f0000000700)=@IORING_OP_SEND={0x1a, 0xe, 0x0, r7, 0x0, &(0x7f00000006c0)="ad4b1594a38883f625d74af283b074b146b525feb11bb78fba2e1aaf977a7616aa67286757cbd0b0a4e8d2fd6601", 0x2e, 0x800}) (async) syz_clone3(&(0x7f0000000480)={0x800000, &(0x7f0000000200)=0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280), {0x27}, &(0x7f00000002c0)=""/79, 0x4f, &(0x7f0000000340)=""/216, &(0x7f0000000440)=[r2], 0x1}, 0x58) (async) socket$alg(0x26, 0x5, 0x0) syz_io_uring_submit(r3, r5, &(0x7f0000000500)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x7f, 0x4000, @fd=r8, 0x3, 0x0, 0x0, 0x1a, 0x1, {0x3}}) 19:11:47 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008aec1, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) bind(r0, &(0x7f0000000540)=@rc={0x1f, @any, 0x1}, 0x80) r2 = syz_clone3(&(0x7f00000011c0)={0xe7226000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x24ea, &(0x7f0000000000)={0x0, 0xba4a, 0x2, 0x0, 0x245}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_setup(0x3e93, &(0x7f0000000100)={0x0, 0xe22d, 0x280, 0x1, 0x2de}, &(0x7f0000000180), &(0x7f00000001c0)=0x0) syz_io_uring_setup(0x72f4, &(0x7f00000005c0)={0x0, 0x7c6, 0x200, 0x3, 0x386}, &(0x7f0000000640)=0x0, &(0x7f0000000680)) r7 = socket$inet(0x2, 0x8, 0x400) syz_io_uring_submit(r6, r4, &(0x7f0000000700)=@IORING_OP_SEND={0x1a, 0xe, 0x0, r7, 0x0, &(0x7f00000006c0)="ad4b1594a38883f625d74af283b074b146b525feb11bb78fba2e1aaf977a7616aa67286757cbd0b0a4e8d2fd6601", 0x2e, 0x800}) syz_clone3(&(0x7f0000000480)={0x800000, &(0x7f0000000200)=0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280), {0x27}, &(0x7f00000002c0)=""/79, 0x4f, &(0x7f0000000340)=""/216, &(0x7f0000000440)=[r2], 0x1}, 0x58) socket$alg(0x26, 0x5, 0x0) syz_io_uring_submit(r3, r5, &(0x7f0000000500)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x7f, 0x4000, @fd=r8, 0x3, 0x0, 0x0, 0x1a, 0x1, {0x3}}) 19:11:47 executing program 3: getuid() (async) getuid() keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) 19:11:47 executing program 1: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x3, 0x0) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$search(0xa, r0, &(0x7f00000000c0)='big_key\x00', 0xfffffffffffffffd, 0x0) 19:11:47 executing program 3: getuid() (async) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) 19:11:47 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000040), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_GET_DEVICE(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000300000000000100000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB], 0x24}}, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000040)=0x0) sendmsg$nfc_llcp(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000180)={0x27, r3, 0x0, 0x1, 0x1, 0x3, "60ffae6aca0c231aeaa0eed38234f3a6055a2d50505c282e44e88e5e2bd243185b351de932305f28990d4d72ff767960b9325d3154521655708fb8b6658f66", 0x31}, 0x60, &(0x7f0000000300)=[{&(0x7f0000000200)="6f62acf0be600d6a44d2bfa8e940f230076a8fb59ca071de2935726d0c82443ecc837fcaad642c8250ecfc490c96205696c3b74511c1c8a4ab25a66fae9913d352012e93eab0b43ece46ba60431cf48e47346fdcfdb8f65cb276d2e1226b7db0f1ac1ad84b2a476ce2d76d9e4527c42f9660fc6e34a35ab53e2aa8a5f5c4", 0x7e}, {&(0x7f00000003c0)="e79361f3e5bdfd08449c91c5b956f5e9abeff788536e96246ea99b64022452731e92492095b1cdf98df458595d65d13936b46f44834e8ff9216d528778a70ef410de424a2e25531156dc3977d8ede3ff887ffee8a4d82424dcc99b0810bff4b427499799a7b712be3b846e59bb5ddbd61877081cc2081b400b180cabcc9748748d19a233a2d89c08e5e4037efcd134fa34b39aec17813bb5", 0x98}, {&(0x7f0000000280)="4184accd6eaf04eeabdbc5c6065295a7bf7f4a0a79ad59adb85e6c8267abdf483e89", 0x22}, {&(0x7f0000000480)="561f983622246e8135c3269a0fec91c9454d0ec86f6cbe191c74c6727e2b27eb97f777db3721ad308ce78b01160101c2e49e36f79cdeba2db69d1ec72871e89bc110585ed195834dbb32d8f50ec3ed6dcf65ba67a9514d4816a40b500256fd64ef64a19eadff781714e3542535a7d46cc1b4c170450304e8b37058878337f59b7289", 0x82}], 0x4, &(0x7f0000000540)={0x70, 0x0, 0x6, "430f5bfcae4eacaea2de720dbe803177a383bc105515054a5f2955e2fc46ee70fc742163fd630d8149056512f0c6845f8bd2449295ec4c49b73292ddb7261acc19fb5f69790394a18606d2f2081d689cc0077c69a741f172af8c05541e"}, 0x70, 0x200000c4}, 0x44) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0x0) r5 = syz_genetlink_get_family_id$nfc(&(0x7f0000000600), r2) sendmsg$NFC_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r5, 0x300, 0x70bd29, 0x25dfdbff, {}, [@NFC_ATTR_DEVICE_INDEX={0xd}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r3}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r4}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x804) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) 19:11:47 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000040), r0) (async) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_GET_DEVICE(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000300000000000100000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB], 0x24}}, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000040)=0x0) sendmsg$nfc_llcp(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000180)={0x27, r3, 0x0, 0x1, 0x1, 0x3, "60ffae6aca0c231aeaa0eed38234f3a6055a2d50505c282e44e88e5e2bd243185b351de932305f28990d4d72ff767960b9325d3154521655708fb8b6658f66", 0x31}, 0x60, &(0x7f0000000300)=[{&(0x7f0000000200)="6f62acf0be600d6a44d2bfa8e940f230076a8fb59ca071de2935726d0c82443ecc837fcaad642c8250ecfc490c96205696c3b74511c1c8a4ab25a66fae9913d352012e93eab0b43ece46ba60431cf48e47346fdcfdb8f65cb276d2e1226b7db0f1ac1ad84b2a476ce2d76d9e4527c42f9660fc6e34a35ab53e2aa8a5f5c4", 0x7e}, {&(0x7f00000003c0)="e79361f3e5bdfd08449c91c5b956f5e9abeff788536e96246ea99b64022452731e92492095b1cdf98df458595d65d13936b46f44834e8ff9216d528778a70ef410de424a2e25531156dc3977d8ede3ff887ffee8a4d82424dcc99b0810bff4b427499799a7b712be3b846e59bb5ddbd61877081cc2081b400b180cabcc9748748d19a233a2d89c08e5e4037efcd134fa34b39aec17813bb5", 0x98}, {&(0x7f0000000280)="4184accd6eaf04eeabdbc5c6065295a7bf7f4a0a79ad59adb85e6c8267abdf483e89", 0x22}, {&(0x7f0000000480)="561f983622246e8135c3269a0fec91c9454d0ec86f6cbe191c74c6727e2b27eb97f777db3721ad308ce78b01160101c2e49e36f79cdeba2db69d1ec72871e89bc110585ed195834dbb32d8f50ec3ed6dcf65ba67a9514d4816a40b500256fd64ef64a19eadff781714e3542535a7d46cc1b4c170450304e8b37058878337f59b7289", 0x82}], 0x4, &(0x7f0000000540)={0x70, 0x0, 0x6, "430f5bfcae4eacaea2de720dbe803177a383bc105515054a5f2955e2fc46ee70fc742163fd630d8149056512f0c6845f8bd2449295ec4c49b73292ddb7261acc19fb5f69790394a18606d2f2081d689cc0077c69a741f172af8c05541e"}, 0x70, 0x200000c4}, 0x44) (async) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0x0) r5 = syz_genetlink_get_family_id$nfc(&(0x7f0000000600), r2) sendmsg$NFC_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r5, 0x300, 0x70bd29, 0x25dfdbff, {}, [@NFC_ATTR_DEVICE_INDEX={0xd}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r3}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r4}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x804) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) 19:11:48 executing program 2: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:48 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000040), r0) (async) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_GET_DEVICE(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000300000000000100000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB], 0x24}}, 0x0) (async, rerun: 32) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000040)=0x0) (rerun: 32) sendmsg$nfc_llcp(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000180)={0x27, r3, 0x0, 0x1, 0x1, 0x3, "60ffae6aca0c231aeaa0eed38234f3a6055a2d50505c282e44e88e5e2bd243185b351de932305f28990d4d72ff767960b9325d3154521655708fb8b6658f66", 0x31}, 0x60, &(0x7f0000000300)=[{&(0x7f0000000200)="6f62acf0be600d6a44d2bfa8e940f230076a8fb59ca071de2935726d0c82443ecc837fcaad642c8250ecfc490c96205696c3b74511c1c8a4ab25a66fae9913d352012e93eab0b43ece46ba60431cf48e47346fdcfdb8f65cb276d2e1226b7db0f1ac1ad84b2a476ce2d76d9e4527c42f9660fc6e34a35ab53e2aa8a5f5c4", 0x7e}, {&(0x7f00000003c0)="e79361f3e5bdfd08449c91c5b956f5e9abeff788536e96246ea99b64022452731e92492095b1cdf98df458595d65d13936b46f44834e8ff9216d528778a70ef410de424a2e25531156dc3977d8ede3ff887ffee8a4d82424dcc99b0810bff4b427499799a7b712be3b846e59bb5ddbd61877081cc2081b400b180cabcc9748748d19a233a2d89c08e5e4037efcd134fa34b39aec17813bb5", 0x98}, {&(0x7f0000000280)="4184accd6eaf04eeabdbc5c6065295a7bf7f4a0a79ad59adb85e6c8267abdf483e89", 0x22}, {&(0x7f0000000480)="561f983622246e8135c3269a0fec91c9454d0ec86f6cbe191c74c6727e2b27eb97f777db3721ad308ce78b01160101c2e49e36f79cdeba2db69d1ec72871e89bc110585ed195834dbb32d8f50ec3ed6dcf65ba67a9514d4816a40b500256fd64ef64a19eadff781714e3542535a7d46cc1b4c170450304e8b37058878337f59b7289", 0x82}], 0x4, &(0x7f0000000540)={0x70, 0x0, 0x6, "430f5bfcae4eacaea2de720dbe803177a383bc105515054a5f2955e2fc46ee70fc742163fd630d8149056512f0c6845f8bd2449295ec4c49b73292ddb7261acc19fb5f69790394a18606d2f2081d689cc0077c69a741f172af8c05541e"}, 0x70, 0x200000c4}, 0x44) (async) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0x0) (async) r5 = syz_genetlink_get_family_id$nfc(&(0x7f0000000600), r2) sendmsg$NFC_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r5, 0x300, 0x70bd29, 0x25dfdbff, {}, [@NFC_ATTR_DEVICE_INDEX={0xd}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r3}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r4}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x804) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) 19:11:48 executing program 5: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080), &(0x7f00000000c0)) socket$inet6_mptcp(0xa, 0x1, 0x106) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:48 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "1ce820930276e82744909e32d3cb615a9509b1efe9f506bfa3e59881869affebb7b1e6dc5552b6804bb2cd5597e1bebf199180a0638e77155e31f62ba2bcef94", 0x37}, 0x48, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$link(0x8, r0, r1) 19:11:48 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008aec1, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) bind(r0, &(0x7f0000000540)=@rc={0x1f, @any, 0x1}, 0x80) r2 = syz_clone3(&(0x7f00000011c0)={0xe7226000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x24ea, &(0x7f0000000000)={0x0, 0xba4a, 0x2, 0x0, 0x245}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_setup(0x3e93, &(0x7f0000000100)={0x0, 0xe22d, 0x280, 0x1, 0x2de}, &(0x7f0000000180), &(0x7f00000001c0)=0x0) syz_io_uring_setup(0x72f4, &(0x7f00000005c0)={0x0, 0x7c6, 0x200, 0x3, 0x386}, &(0x7f0000000640)=0x0, &(0x7f0000000680)) r7 = socket$inet(0x2, 0x8, 0x400) syz_io_uring_submit(r6, r4, &(0x7f0000000700)=@IORING_OP_SEND={0x1a, 0xe, 0x0, r7, 0x0, &(0x7f00000006c0)="ad4b1594a38883f625d74af283b074b146b525feb11bb78fba2e1aaf977a7616aa67286757cbd0b0a4e8d2fd6601", 0x2e, 0x800}) syz_clone3(&(0x7f0000000480)={0x800000, &(0x7f0000000200)=0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280), {0x27}, &(0x7f00000002c0)=""/79, 0x4f, &(0x7f0000000340)=""/216, &(0x7f0000000440)=[r2], 0x1}, 0x58) socket$alg(0x26, 0x5, 0x0) syz_io_uring_submit(r3, r5, &(0x7f0000000500)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x7f, 0x4000, @fd=r8, 0x3, 0x0, 0x0, 0x1a, 0x1, {0x3}}) 19:11:48 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @qipcrtr, @in={0x2, 0x0, @broadcast}, @in={0x2, 0x0, @remote}}) socketpair(0x5, 0x6, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_mptcp_buf(r1, 0x11c, 0x3, &(0x7f00000000c0)=""/228, &(0x7f0000000000)=0xe4) syz_clone3(&(0x7f00000011c0)={0xf720c080, 0x0, 0x0, 0x0, {0x40}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:48 executing program 1: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x3, 0x0) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='big_key\x00', 0xfffffffffffffffd, 0x0) 19:11:48 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "1ce820930276e82744909e32d3cb615a9509b1efe9f506bfa3e59881869affebb7b1e6dc5552b6804bb2cd5597e1bebf199180a0638e77155e31f62ba2bcef94", 0x37}, 0x48, 0xfffffffffffffffa) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "1ce820930276e82744909e32d3cb615a9509b1efe9f506bfa3e59881869affebb7b1e6dc5552b6804bb2cd5597e1bebf199180a0638e77155e31f62ba2bcef94", 0x37}, 0x48, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$link(0x8, r0, r1) 19:11:48 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "1ce820930276e82744909e32d3cb615a9509b1efe9f506bfa3e59881869affebb7b1e6dc5552b6804bb2cd5597e1bebf199180a0638e77155e31f62ba2bcef94", 0x37}, 0x48, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) (async) keyctl$link(0x8, r0, r1) 19:11:48 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @qipcrtr, @in={0x2, 0x0, @broadcast}, @in={0x2, 0x0, @remote}}) (async) socketpair(0x5, 0x6, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_mptcp_buf(r1, 0x11c, 0x3, &(0x7f00000000c0)=""/228, &(0x7f0000000000)=0xe4) (async) syz_clone3(&(0x7f00000011c0)={0xf720c080, 0x0, 0x0, 0x0, {0x40}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:48 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) 19:11:48 executing program 2: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:48 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @qipcrtr, @in={0x2, 0x0, @broadcast}, @in={0x2, 0x0, @remote}}) (async) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @qipcrtr, @in={0x2, 0x0, @broadcast}, @in={0x2, 0x0, @remote}}) socketpair(0x5, 0x6, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_mptcp_buf(r1, 0x11c, 0x3, &(0x7f00000000c0)=""/228, &(0x7f0000000000)=0xe4) syz_clone3(&(0x7f00000011c0)={0xf720c080, 0x0, 0x0, 0x0, {0x40}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:48 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) (async) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) 19:11:48 executing program 5: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:48 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) (async) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) 19:11:48 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008aec1, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) bind(r0, &(0x7f0000000540)=@rc={0x1f, @any, 0x1}, 0x80) r2 = syz_clone3(&(0x7f00000011c0)={0xe7226000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x24ea, &(0x7f0000000000)={0x0, 0xba4a, 0x2, 0x0, 0x245}, &(0x7f0000000080), &(0x7f00000000c0)=0x0) syz_io_uring_setup(0x3e93, &(0x7f0000000100)={0x0, 0xe22d, 0x280, 0x1, 0x2de}, &(0x7f0000000180), &(0x7f00000001c0)) syz_io_uring_setup(0x72f4, &(0x7f00000005c0)={0x0, 0x7c6, 0x200, 0x3, 0x386}, &(0x7f0000000640)=0x0, &(0x7f0000000680)) r5 = socket$inet(0x2, 0x8, 0x400) syz_io_uring_submit(r4, r3, &(0x7f0000000700)=@IORING_OP_SEND={0x1a, 0xe, 0x0, r5, 0x0, &(0x7f00000006c0)="ad4b1594a38883f625d74af283b074b146b525feb11bb78fba2e1aaf977a7616aa67286757cbd0b0a4e8d2fd6601", 0x2e, 0x800}) syz_clone3(&(0x7f0000000480)={0x800000, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), {0x27}, &(0x7f00000002c0)=""/79, 0x4f, &(0x7f0000000340)=""/216, &(0x7f0000000440)=[r2], 0x1}, 0x58) socket$alg(0x26, 0x5, 0x0) 19:11:49 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r3, 0x10000000) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x5, 0x1, 0x3f, 0x9, 0x10, r3, 0x61, '\x00', r2, r4, 0x0, 0x2}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1d, 0x2f, &(0x7f0000000040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_idx_val={0x18, 0x2, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}, @call={0x85, 0x0, 0x0, 0xb}, @map_fd={0x18, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe590}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @generic={0x80, 0x9, 0x1, 0x80, 0xcbf9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000001c0)='GPL\x00', 0x4, 0xef, &(0x7f0000000200)=""/239, 0x41000, 0x4, '\x00', r2, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x1, 0xe, 0x4, 0xfffffffd}, 0x10, 0xffffffffffffffff, 0x0, 0x2, 0x0, &(0x7f0000000380)=[{0x2, 0x1, 0x0, 0x4}, {0x0, 0x4, 0xd, 0x1}], 0x10, 0x2}, 0x90) 19:11:49 executing program 1: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='big_key\x00', 0xfffffffffffffffd, 0x0) 19:11:49 executing program 3: msgget(0x3, 0x222) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) socket$bt_bnep(0x1f, 0x3, 0x4) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_VENDOR(r2, &(0x7f0000002540)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000002500)={&(0x7f0000001480)={0x14}, 0x14}}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nfc(&(0x7f0000000040), r3) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_GET_DEVICE(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x24, r4, 0x1, 0x0, 0x0, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x24}}, 0x0) sendmsg$NFC_CMD_VENDOR(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x3c, r4, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_VENDOR_ID={0x8, 0x1d, 0x81}, @NFC_ATTR_VENDOR_ID={0x8, 0x1d, 0x9}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_VENDOR_ID={0x8, 0x1d, 0xc19}]}, 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0x20000080) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r1, &(0x7f0000000440)={&(0x7f0000000340), 0xc, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="280b005c06", @ANYRES16=r6, @ANYBLOB="01000000000000000000170000000c000600030000000300000008000300", @ANYRES32=0x0, @ANYBLOB], 0x28}}, 0x0) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r6, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}]}, 0x20}, 0x1, 0x0, 0x0, 0x44801}, 0x4) 19:11:49 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:49 executing program 3: msgget(0x3, 0x222) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) socket$bt_bnep(0x1f, 0x3, 0x4) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_VENDOR(r2, &(0x7f0000002540)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000002500)={&(0x7f0000001480)={0x14}, 0x14}}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nfc(&(0x7f0000000040), r3) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_GET_DEVICE(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x24, r4, 0x1, 0x0, 0x0, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x24}}, 0x0) sendmsg$NFC_CMD_VENDOR(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x3c, r4, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_VENDOR_ID={0x8, 0x1d, 0x81}, @NFC_ATTR_VENDOR_ID={0x8, 0x1d, 0x9}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_VENDOR_ID={0x8, 0x1d, 0xc19}]}, 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0x20000080) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r1, &(0x7f0000000440)={&(0x7f0000000340), 0xc, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="280b005c06", @ANYRES16=r6, @ANYBLOB="01000000000000000000170000000c000600030000000300000008000300", @ANYRES32=0x0, @ANYBLOB], 0x28}}, 0x0) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r6, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}]}, 0x20}, 0x1, 0x0, 0x0, 0x44801}, 0x4) msgget(0x3, 0x222) (async) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) socket$bt_bnep(0x1f, 0x3, 0x4) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$NFC_CMD_VENDOR(r2, &(0x7f0000002540)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000002500)={&(0x7f0000001480)={0x14}, 0x14}}, 0x0) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nfc(&(0x7f0000000040), r3) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$NFC_CMD_GET_DEVICE(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x24, r4, 0x1, 0x0, 0x0, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x24}}, 0x0) (async) sendmsg$NFC_CMD_VENDOR(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x3c, r4, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_VENDOR_ID={0x8, 0x1d, 0x81}, @NFC_ATTR_VENDOR_ID={0x8, 0x1d, 0x9}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_VENDOR_ID={0x8, 0x1d, 0xc19}]}, 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0x20000080) (async) syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) (async) sendmsg$NL802154_CMD_NEW_SEC_KEY(r1, &(0x7f0000000440)={&(0x7f0000000340), 0xc, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="280b005c06", @ANYRES16=r6, @ANYBLOB="01000000000000000000170000000c000600030000000300000008000300", @ANYRES32=0x0, @ANYBLOB], 0x28}}, 0x0) (async) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r6, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}]}, 0x20}, 0x1, 0x0, 0x0, 0x44801}, 0x4) (async) 19:11:49 executing program 2: syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:49 executing program 3: msgget(0x3, 0x222) (async) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) socket$bt_bnep(0x1f, 0x3, 0x4) (async) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_VENDOR(r2, &(0x7f0000002540)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000002500)={&(0x7f0000001480)={0x14}, 0x14}}, 0x0) (async) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nfc(&(0x7f0000000040), r3) (async) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_GET_DEVICE(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x24, r4, 0x1, 0x0, 0x0, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x24}}, 0x0) (async) sendmsg$NFC_CMD_VENDOR(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x3c, r4, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_VENDOR_ID={0x8, 0x1d, 0x81}, @NFC_ATTR_VENDOR_ID={0x8, 0x1d, 0x9}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_VENDOR_ID={0x8, 0x1d, 0xc19}]}, 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0x20000080) (async) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r1, &(0x7f0000000440)={&(0x7f0000000340), 0xc, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="280b005c06", @ANYRES16=r6, @ANYBLOB="01000000000000000000170000000c000600030000000300000008000300", @ANYRES32=0x0, @ANYBLOB], 0x28}}, 0x0) (async) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r6, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}]}, 0x20}, 0x1, 0x0, 0x0, 0x44801}, 0x4) 19:11:49 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$search(0xa, 0x0, &(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)={'syz', 0x2}, r0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x0) 19:11:49 executing program 2: syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:49 executing program 5: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:49 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$search(0xa, 0x0, &(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)={'syz', 0x2}, r0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x0) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) (async) keyctl$search(0xa, 0x0, &(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)={'syz', 0x2}, r0) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (async) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) (async) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x0) (async) 19:11:49 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008aec1, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) bind(r0, &(0x7f0000000540)=@rc={0x1f, @any, 0x1}, 0x80) r2 = syz_clone3(&(0x7f00000011c0)={0xe7226000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x24ea, &(0x7f0000000000)={0x0, 0xba4a, 0x2, 0x0, 0x245}, &(0x7f0000000080), &(0x7f00000000c0)=0x0) syz_io_uring_setup(0x3e93, &(0x7f0000000100)={0x0, 0xe22d, 0x280, 0x1, 0x2de}, &(0x7f0000000180), &(0x7f00000001c0)) syz_io_uring_setup(0x72f4, &(0x7f00000005c0)={0x0, 0x7c6, 0x200, 0x3, 0x386}, &(0x7f0000000640)=0x0, &(0x7f0000000680)) r5 = socket$inet(0x2, 0x8, 0x400) syz_io_uring_submit(r4, r3, &(0x7f0000000700)=@IORING_OP_SEND={0x1a, 0xe, 0x0, r5, 0x0, &(0x7f00000006c0)="ad4b1594a38883f625d74af283b074b146b525feb11bb78fba2e1aaf977a7616aa67286757cbd0b0a4e8d2fd6601", 0x2e, 0x800}) syz_clone3(&(0x7f0000000480)={0x800000, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), {0x27}, &(0x7f00000002c0)=""/79, 0x4f, &(0x7f0000000340)=""/216, &(0x7f0000000440)=[r2], 0x1}, 0x58) 19:11:49 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) (async) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) r4 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r3, 0x10000000) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x5, 0x1, 0x3f, 0x9, 0x10, r3, 0x61, '\x00', r2, r4, 0x0, 0x2}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x5, 0x1, 0x3f, 0x9, 0x10, r3, 0x61, '\x00', r2, r4, 0x0, 0x2}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1d, 0x2f, &(0x7f0000000040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_idx_val={0x18, 0x2, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}, @call={0x85, 0x0, 0x0, 0xb}, @map_fd={0x18, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe590}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @generic={0x80, 0x9, 0x1, 0x80, 0xcbf9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000001c0)='GPL\x00', 0x4, 0xef, &(0x7f0000000200)=""/239, 0x41000, 0x4, '\x00', r2, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x1, 0xe, 0x4, 0xfffffffd}, 0x10, 0xffffffffffffffff, 0x0, 0x2, 0x0, &(0x7f0000000380)=[{0x2, 0x1, 0x0, 0x4}, {0x0, 0x4, 0xd, 0x1}], 0x10, 0x2}, 0x90) 19:11:49 executing program 1: keyctl$search(0xa, 0x0, &(0x7f00000000c0)='big_key\x00', 0xfffffffffffffffd, 0x0) 19:11:49 executing program 2: syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:49 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$search(0xa, 0x0, &(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)={'syz', 0x2}, r0) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) (async) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x0) 19:11:49 executing program 1: keyctl$search(0xa, 0x0, 0x0, 0xfffffffffffffffd, 0x0) 19:11:49 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="ea4c88e5c65f959af375dda3e27a29308233c84cc00ba0f65f729002bd13df7b8a3d073a86fed5c0921c2b8d68d768", 0x2f, 0xfffffffffffffffc) r1 = add_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)="c9f6d9dc7acbb081631eaaa8e98f6ab6f29e758f9777cf81dad4c38d64174b6f3faa2b3178f6e90cd3045be4cd6ef392b7eb152c227d998334b09591c0c950b03ec32a1ad78b0786854e349cb50de6a1fda31b8cdf6fc31da4010927645fb4d445fbbe9535a20d398d6d48d4d9695f1f973ee6e089b58d62af43431039ca2a3ff87b56631222539af8cbbd91168be0dc7975f17314294859", 0x98, 0xfffffffffffffffb) keyctl$negate(0xd, r0, 0x6, r1) 19:11:49 executing program 2: syz_io_uring_setup(0x886, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:49 executing program 1: keyctl$search(0xa, 0x0, 0x0, 0xfffffffffffffffd, 0x0) 19:11:49 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="ea4c88e5c65f959af375dda3e27a29308233c84cc00ba0f65f729002bd13df7b8a3d073a86fed5c0921c2b8d68d768", 0x2f, 0xfffffffffffffffc) (async, rerun: 32) r1 = add_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)="c9f6d9dc7acbb081631eaaa8e98f6ab6f29e758f9777cf81dad4c38d64174b6f3faa2b3178f6e90cd3045be4cd6ef392b7eb152c227d998334b09591c0c950b03ec32a1ad78b0786854e349cb50de6a1fda31b8cdf6fc31da4010927645fb4d445fbbe9535a20d398d6d48d4d9695f1f973ee6e089b58d62af43431039ca2a3ff87b56631222539af8cbbd91168be0dc7975f17314294859", 0x98, 0xfffffffffffffffb) (rerun: 32) keyctl$negate(0xd, r0, 0x6, r1) 19:11:50 executing program 5: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:50 executing program 1: keyctl$search(0xa, 0x0, 0x0, 0xfffffffffffffffd, 0x0) 19:11:50 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) r0 = add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="ea4c88e5c65f959af375dda3e27a29308233c84cc00ba0f65f729002bd13df7b8a3d073a86fed5c0921c2b8d68d768", 0x2f, 0xfffffffffffffffc) (async) r1 = add_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)="c9f6d9dc7acbb081631eaaa8e98f6ab6f29e758f9777cf81dad4c38d64174b6f3faa2b3178f6e90cd3045be4cd6ef392b7eb152c227d998334b09591c0c950b03ec32a1ad78b0786854e349cb50de6a1fda31b8cdf6fc31da4010927645fb4d445fbbe9535a20d398d6d48d4d9695f1f973ee6e089b58d62af43431039ca2a3ff87b56631222539af8cbbd91168be0dc7975f17314294859", 0x98, 0xfffffffffffffffb) keyctl$negate(0xd, r0, 0x6, r1) 19:11:50 executing program 2: syz_io_uring_setup(0x886, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:50 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) (async) getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) (async) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r3, 0x10000000) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x5, 0x1, 0x3f, 0x9, 0x10, r3, 0x61, '\x00', r2, r4, 0x0, 0x2}, 0x48) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1d, 0x2f, &(0x7f0000000040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_idx_val={0x18, 0x2, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}, @call={0x85, 0x0, 0x0, 0xb}, @map_fd={0x18, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe590}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @generic={0x80, 0x9, 0x1, 0x80, 0xcbf9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000001c0)='GPL\x00', 0x4, 0xef, &(0x7f0000000200)=""/239, 0x41000, 0x4, '\x00', r2, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x1, 0xe, 0x4, 0xfffffffd}, 0x10, 0xffffffffffffffff, 0x0, 0x2, 0x0, &(0x7f0000000380)=[{0x2, 0x1, 0x0, 0x4}, {0x0, 0x4, 0xd, 0x1}], 0x10, 0x2}, 0x90) 19:11:50 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008aec1, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) bind(r0, &(0x7f0000000540)=@rc={0x1f, @any, 0x1}, 0x80) syz_clone3(&(0x7f00000011c0)={0xe7226000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x24ea, &(0x7f0000000000)={0x0, 0xba4a, 0x2, 0x0, 0x245}, &(0x7f0000000080), &(0x7f00000000c0)=0x0) syz_io_uring_setup(0x3e93, &(0x7f0000000100)={0x0, 0xe22d, 0x280, 0x1, 0x2de}, &(0x7f0000000180), &(0x7f00000001c0)) syz_io_uring_setup(0x72f4, &(0x7f00000005c0)={0x0, 0x7c6, 0x200, 0x3, 0x386}, &(0x7f0000000640)=0x0, &(0x7f0000000680)) r4 = socket$inet(0x2, 0x8, 0x400) syz_io_uring_submit(r3, r2, &(0x7f0000000700)=@IORING_OP_SEND={0x1a, 0xe, 0x0, r4, 0x0, &(0x7f00000006c0)="ad4b1594a38883f625d74af283b074b146b525feb11bb78fba2e1aaf977a7616aa67286757cbd0b0a4e8d2fd6601", 0x2e, 0x800}) 19:11:50 executing program 1: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:50 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffffb, 0x1) 19:11:50 executing program 2: syz_io_uring_setup(0x886, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:50 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffffb, 0x1) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async) add_key(0x0, &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r0) (async) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffffb, 0x1) (async) 19:11:50 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x0, 0x40, 0x2, 0x7e}, &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:50 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r0) (async, rerun: 32) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffffb, 0x1) (rerun: 32) 19:11:50 executing program 5: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:50 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2, 0x7e}, &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:50 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) 19:11:50 executing program 4: syz_clone3(&(0x7f00000011c0)={0x204189000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:50 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008aec1, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) bind(r0, &(0x7f0000000540)=@rc={0x1f, @any, 0x1}, 0x80) syz_clone3(&(0x7f00000011c0)={0xe7226000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x24ea, &(0x7f0000000000)={0x0, 0xba4a, 0x2, 0x0, 0x245}, &(0x7f0000000080), &(0x7f00000000c0)) syz_io_uring_setup(0x3e93, &(0x7f0000000100)={0x0, 0xe22d, 0x280, 0x1, 0x2de}, &(0x7f0000000180), &(0x7f00000001c0)) syz_io_uring_setup(0x72f4, &(0x7f00000005c0)={0x0, 0x7c6, 0x200, 0x3, 0x386}, &(0x7f0000000640), &(0x7f0000000680)) socket$inet(0x2, 0x8, 0x400) 19:11:50 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) 19:11:50 executing program 1: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:50 executing program 4: syz_clone3(&(0x7f00000011c0)={0x204189000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_clone3(&(0x7f00000011c0)={0x204189000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) 19:11:51 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) 19:11:51 executing program 4: syz_clone3(&(0x7f00000011c0)={0x204189000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_clone3(&(0x7f00000011c0)={0x204189000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) 19:11:51 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7e}, &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:51 executing program 4: ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {0x1}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="f0000007000000002e2f66696c6530005db985849819d286d6c5ceb55e2b54b0f6db8716f742cdf1fcc00969b7114faa714dcd79088e84ce125b440a6f623b653447ad884105f53749cd3ab3d85a8d4e3b9a72963cb557a2bbeecf153936cbf1474203cc4e61f757c6178de384be4b0f1e8b675d60f4777490cd9cce12f354c4318d1611841c92a31f"]) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={'\x00', 0x200, 0x82e, 0x5, 0x2, 0x59, r0}) 19:11:51 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:51 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$link(0x8, r0, r1) r2 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffffc, 0x0) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r4 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r4) epoll_create(0x4000) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) r5 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r6 = syz_clone3(&(0x7f0000000340)={0x1a16080, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180), {0x2}, &(0x7f00000001c0)=""/138, 0x8a, &(0x7f0000000280)=""/80, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0], 0x5}, 0x58) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f00000003c0)={0x6, 0x252, {r6}, {0xee00}, 0x1, 0x200}) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r5) keyctl$search(0xa, r2, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)={'syz', 0x3}, r5) 19:11:51 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:51 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008aec1, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) bind(r0, &(0x7f0000000540)=@rc={0x1f, @any, 0x1}, 0x80) syz_clone3(&(0x7f00000011c0)={0xe7226000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x24ea, &(0x7f0000000000)={0x0, 0xba4a, 0x2, 0x0, 0x245}, &(0x7f0000000080), &(0x7f00000000c0)) syz_io_uring_setup(0x3e93, &(0x7f0000000100)={0x0, 0xe22d, 0x280, 0x1, 0x2de}, &(0x7f0000000180), &(0x7f00000001c0)) syz_io_uring_setup(0x72f4, &(0x7f00000005c0)={0x0, 0x7c6, 0x200, 0x3, 0x386}, &(0x7f0000000640), &(0x7f0000000680)) 19:11:51 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:51 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) (async) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) (async) keyctl$link(0x8, r0, r1) (async) r2 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffffc, 0x0) (async) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r4 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r4) (async) epoll_create(0x4000) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) r5 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r6 = syz_clone3(&(0x7f0000000340)={0x1a16080, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180), {0x2}, &(0x7f00000001c0)=""/138, 0x8a, &(0x7f0000000280)=""/80, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0], 0x5}, 0x58) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f00000003c0)={0x6, 0x252, {r6}, {0xee00}, 0x1, 0x200}) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r5) keyctl$search(0xa, r2, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)={'syz', 0x3}, r5) 19:11:51 executing program 1: syz_io_uring_setup(0x886, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:51 executing program 4: ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {0x1}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="f0000007000000002e2f66696c6530005db985849819d286d6c5ceb55e2b54b0f6db8716f742cdf1fcc00969b7114faa714dcd79088e84ce125b440a6f623b653447ad884105f53749cd3ab3d85a8d4e3b9a72963cb557a2bbeecf153936cbf1474203cc4e61f757c6178de384be4b0f1e8b675d60f4777490cd9cce12f354c4318d1611841c92a31f"]) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={'\x00', 0x200, 0x82e, 0x5, 0x2, 0x59, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) (async) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {0x1}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="f0000007000000002e2f66696c6530005db985849819d286d6c5ceb55e2b54b0f6db8716f742cdf1fcc00969b7114faa714dcd79088e84ce125b440a6f623b653447ad884105f53749cd3ab3d85a8d4e3b9a72963cb557a2bbeecf153936cbf1474203cc4e61f757c6178de384be4b0f1e8b675d60f4777490cd9cce12f354c4318d1611841c92a31f"]) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (async) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) (async) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={'\x00', 0x200, 0x82e, 0x5, 0x2, 0x59, r0}) (async) 19:11:51 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) (async, rerun: 64) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (rerun: 64) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$link(0x8, r0, r1) (async, rerun: 64) r2 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) (rerun: 64) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffffc, 0x0) (async, rerun: 32) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async, rerun: 32) r4 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r4) (async) add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r4) epoll_create(0x4000) (async, rerun: 64) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) (rerun: 64) r5 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async, rerun: 64) r6 = syz_clone3(&(0x7f0000000340)={0x1a16080, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180), {0x2}, &(0x7f00000001c0)=""/138, 0x8a, &(0x7f0000000280)=""/80, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0], 0x5}, 0x58) (rerun: 64) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f00000003c0)={0x6, 0x252, {r6}, {0xee00}, 0x1, 0x200}) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r5) (async) keyctl$search(0xa, r2, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)={'syz', 0x3}, r5) 19:11:51 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:51 executing program 5: syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:51 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(0x0, 0x0) 19:11:51 executing program 1: syz_io_uring_setup(0x886, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:51 executing program 5: syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:51 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(0x0, 0x0) 19:11:51 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008aec1, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) bind(r0, &(0x7f0000000540)=@rc={0x1f, @any, 0x1}, 0x80) syz_clone3(&(0x7f00000011c0)={0xe7226000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x24ea, &(0x7f0000000000)={0x0, 0xba4a, 0x2, 0x0, 0x245}, &(0x7f0000000080), &(0x7f00000000c0)) syz_io_uring_setup(0x3e93, &(0x7f0000000100)={0x0, 0xe22d, 0x280, 0x1, 0x2de}, &(0x7f0000000180), &(0x7f00000001c0)) 19:11:51 executing program 3: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$unlink(0x18, r1, r3) 19:11:51 executing program 5: syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:51 executing program 1: syz_io_uring_setup(0x886, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:52 executing program 4: ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {0x1}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {0x1}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="f0000007000000002e2f66696c6530005db985849819d286d6c5ceb55e2b54b0f6db8716f742cdf1fcc00969b7114faa714dcd79088e84ce125b440a6f623b653447ad884105f53749cd3ab3d85a8d4e3b9a72963cb557a2bbeecf153936cbf1474203cc4e61f757c6178de384be4b0f1e8b675d60f4777490cd9cce12f354c4318d1611841c92a31f"]) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={'\x00', 0x200, 0x82e, 0x5, 0x2, 0x59, r0}) (async) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={'\x00', 0x200, 0x82e, 0x5, 0x2, 0x59, r0}) 19:11:52 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(0x0, 0x0) 19:11:52 executing program 3: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) (async) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) (async) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) (async) keyctl$unlink(0x18, r1, r3) 19:11:52 executing program 5: syz_io_uring_setup(0x886, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:52 executing program 1: syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:52 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:52 executing program 3: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) (async) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) (async, rerun: 64) keyctl$unlink(0x18, r1, r3) (rerun: 64) 19:11:52 executing program 5: syz_io_uring_setup(0x886, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:52 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008aec1, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) bind(r0, &(0x7f0000000540)=@rc={0x1f, @any, 0x1}, 0x80) syz_clone3(&(0x7f00000011c0)={0xe7226000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x24ea, &(0x7f0000000000)={0x0, 0xba4a, 0x2, 0x0, 0x245}, &(0x7f0000000080), &(0x7f00000000c0)) 19:11:52 executing program 3: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$unlink(0x18, 0x0, r2) 19:11:52 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:52 executing program 1: syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:52 executing program 4: ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000000)={0x80000001, 0x5, {0xffffffffffffffff}, {0xee00}, 0x3ff, 0x7}) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:52 executing program 5: syz_io_uring_setup(0x886, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:52 executing program 3: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) (async) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) (async) keyctl$unlink(0x18, 0x0, r2) 19:11:52 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:52 executing program 1: syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:52 executing program 3: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) (async) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) (async) keyctl$unlink(0x18, 0x0, r2) 19:11:52 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x0, 0x40, 0x2, 0x7e}, &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:52 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:53 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008aec1, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) bind(r0, &(0x7f0000000540)=@rc={0x1f, @any, 0x1}, 0x80) syz_clone3(&(0x7f00000011c0)={0xe7226000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:53 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2, 0x7e}, &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:53 executing program 3: r0 = msgget(0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) msgctl$IPC_RMID(r0, 0x0) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @auto=[0x34, 0x64, 0x38, 0x62, 0x39, 0x39, 0x66, 0x64, 0x39, 0x35, 0x65, 0x65, 0x35, 0x64, 0x38, 0x30]}, &(0x7f00000000c0)={0x0, "5abbcd006ce505916bf0e3fb8eca850947a0c9261ee8dc3927ddf8c789f97b31d2b9de91f3ce28d05889fc3b62be6c0b7c36a35402b16d7badae2929343d08b5", 0x3f}, 0x48, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) r3 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$unlink(0x18, r3, r2) r4 = msgget(0x0, 0x500) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)=[0x3, 0x9]) socket$bt_bnep(0x1f, 0x3, 0x4) msgctl$IPC_RMID(r4, 0x0) msgctl$IPC_RMID(r4, 0x0) 19:11:53 executing program 1: syz_io_uring_setup(0x0, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:53 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:53 executing program 4: ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000000)={0x80000001, 0x5, {0xffffffffffffffff}, {0xee00}, 0x3ff, 0x7}) (async) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:53 executing program 3: r0 = msgget(0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) (async, rerun: 32) msgctl$IPC_RMID(r0, 0x0) (async, rerun: 32) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @auto=[0x34, 0x64, 0x38, 0x62, 0x39, 0x39, 0x66, 0x64, 0x39, 0x35, 0x65, 0x65, 0x35, 0x64, 0x38, 0x30]}, &(0x7f00000000c0)={0x0, "5abbcd006ce505916bf0e3fb8eca850947a0c9261ee8dc3927ddf8c789f97b31d2b9de91f3ce28d05889fc3b62be6c0b7c36a35402b16d7badae2929343d08b5", 0x3f}, 0x48, 0xfffffffffffffffc) (async, rerun: 32) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (rerun: 32) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) (async) r3 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$unlink(0x18, r3, r2) (async) r4 = msgget(0x0, 0x500) (async) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)=[0x3, 0x9]) socket$bt_bnep(0x1f, 0x3, 0x4) msgctl$IPC_RMID(r4, 0x0) (async) msgctl$IPC_RMID(r4, 0x0) 19:11:53 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:53 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7e}, &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:53 executing program 1: syz_io_uring_setup(0x0, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:53 executing program 3: r0 = msgget(0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) (async) msgctl$IPC_RMID(r0, 0x0) (async) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @auto=[0x34, 0x64, 0x38, 0x62, 0x39, 0x39, 0x66, 0x64, 0x39, 0x35, 0x65, 0x65, 0x35, 0x64, 0x38, 0x30]}, &(0x7f00000000c0)={0x0, "5abbcd006ce505916bf0e3fb8eca850947a0c9261ee8dc3927ddf8c789f97b31d2b9de91f3ce28d05889fc3b62be6c0b7c36a35402b16d7badae2929343d08b5", 0x3f}, 0x48, 0xfffffffffffffffc) (async) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) r3 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$unlink(0x18, r3, r2) (async) r4 = msgget(0x0, 0x500) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)=[0x3, 0x9]) (async) socket$bt_bnep(0x1f, 0x3, 0x4) (async) msgctl$IPC_RMID(r4, 0x0) msgctl$IPC_RMID(r4, 0x0) 19:11:53 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:53 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008aec1, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) syz_clone3(&(0x7f00000011c0)={0xe7226000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:53 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:53 executing program 1: syz_io_uring_setup(0x0, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:53 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) 19:11:53 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:53 executing program 4: ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000000)={0x80000001, 0x5, {0xffffffffffffffff}, {0xee00}, 0x3ff, 0x7}) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:53 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) 19:11:53 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:53 executing program 1: syz_io_uring_setup(0x886, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:53 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) 19:11:53 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:53 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:54 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008aec1, 0x0) syz_clone3(&(0x7f00000011c0)={0xe7226000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:54 executing program 3: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$unlink(0x18, r1, r2) 19:11:54 executing program 1: syz_io_uring_setup(0x886, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:54 executing program 2: syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:54 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:54 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) keyctl$get_persistent(0x16, 0x0, 0xffffffffffffffff) 19:11:54 executing program 3: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$unlink(0x18, r1, r2) 19:11:54 executing program 2: syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:54 executing program 1: syz_io_uring_setup(0x886, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:54 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(0x0, 0x0) 19:11:54 executing program 3: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$unlink(0x18, r1, r2) (async) keyctl$unlink(0x18, r1, r2) 19:11:54 executing program 1: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:54 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f00000011c0)={0xe7226000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:54 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(0x0, 0x0) 19:11:54 executing program 2: syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:54 executing program 3: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$unlink(0x18, r0, 0xffffffffffffffff) 19:11:54 executing program 1: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:54 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async, rerun: 64) keyctl$get_persistent(0x16, 0x0, 0xffffffffffffffff) (rerun: 64) 19:11:54 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(0x0, 0x0) 19:11:54 executing program 3: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) (async) keyctl$unlink(0x18, r0, 0xffffffffffffffff) 19:11:54 executing program 2: syz_io_uring_setup(0x0, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:54 executing program 1: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(0x0, 0x0) 19:11:54 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:54 executing program 3: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$unlink(0x18, r0, 0xffffffffffffffff) 19:11:55 executing program 2: syz_io_uring_setup(0x0, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:55 executing program 1: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(0x0, 0x0) 19:11:55 executing program 3: ioctl$SIOCPNENABLEPIPE(0xffffffffffffffff, 0x89ed, 0x0) 19:11:55 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) syz_clone3(&(0x7f00000011c0)={0xe7226000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:55 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:55 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) keyctl$get_persistent(0x16, 0x0, 0xffffffffffffffff) 19:11:55 executing program 3: ioctl$SIOCPNENABLEPIPE(0xffffffffffffffff, 0x89ed, 0x0) 19:11:55 executing program 1: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(0x0, 0x0) 19:11:55 executing program 2: syz_io_uring_setup(0x0, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:55 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:55 executing program 0: syz_clone3(&(0x7f00000011c0)={0xe7226000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:55 executing program 3: ioctl$SIOCPNENABLEPIPE(0xffffffffffffffff, 0x89ed, 0x0) ioctl$SIOCPNENABLEPIPE(0xffffffffffffffff, 0x89ed, 0x0) (async) 19:11:55 executing program 2: syz_io_uring_setup(0x886, 0x0, 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:55 executing program 1: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:55 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:55 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffff}}, './file0\x00'}) r1 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r1, 0x0, 0x0], 0x9}, 0x58) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x800, 0x40, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000200)={0x3ff, 0x0, {r1}, {r2}, 0x7, 0x7}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, r4, {0x6}}, './file0\x00'}) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) socket$alg(0x26, 0x5, 0x0) accept$alg(r4, 0x0, 0x0) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) 19:11:55 executing program 2: syz_io_uring_setup(0x886, 0x0, 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:56 executing program 4: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5}}, './file0\x00'}) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)=ANY=[@ANYBLOB="01eedd372262e5fbc199ad5490c48f00cf22652eca603d75cf90d8be9ebe0d1400085e97823951c01383105811caf0aa3a165c056212e5f09b488a8a480a0d22c82eee34fae7b29967d3271529ed50e33085204bdf7315a4ad6f252635758a380a63fe05db95a30a8e010619d8a3734a0e03ad362e777856cab713764be05c4b12de729edf9a3cd232777d84d1cffdf829c6c0806123a475928cceac3bb8e4419ec8200c0d1f2a4be1b7834c5d973a11282e0b0e8e", @ANYRES32=0xffffffffffffffff, @ANYBLOB="01000000000000002e2f66696c653000"]) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0xfffffffffffffd15) 19:11:56 executing program 1: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:56 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:56 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffff}}, './file0\x00'}) (async) r1 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r1, 0x0, 0x0], 0x9}, 0x58) (async) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x800, 0x40, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000200)={0x3ff, 0x0, {r1}, {r2}, 0x7, 0x7}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, 0x0, 0x0) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, r4, {0x6}}, './file0\x00'}) (async, rerun: 32) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) socket$alg(0x26, 0x5, 0x0) accept$alg(r4, 0x0, 0x0) (async) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) 19:11:56 executing program 2: syz_io_uring_setup(0x886, 0x0, 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:56 executing program 0: syz_clone3(0x0, 0x0) 19:11:56 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(0x0, 0x0) 19:11:56 executing program 4: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5}}, './file0\x00'}) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)=ANY=[@ANYBLOB="01eedd372262e5fbc199ad5490c48f00cf22652eca603d75cf90d8be9ebe0d1400085e97823951c01383105811caf0aa3a165c056212e5f09b488a8a480a0d22c82eee34fae7b29967d3271529ed50e33085204bdf7315a4ad6f252635758a380a63fe05db95a30a8e010619d8a3734a0e03ad362e777856cab713764be05c4b12de729edf9a3cd232777d84d1cffdf829c6c0806123a475928cceac3bb8e4419ec8200c0d1f2a4be1b7834c5d973a11282e0b0e8e", @ANYRES32=0xffffffffffffffff, @ANYBLOB="01000000000000002e2f66696c653000"]) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0xfffffffffffffd15) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5}}, './file0\x00'}) (async) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000040)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)=ANY=[@ANYBLOB="01eedd372262e5fbc199ad5490c48f00cf22652eca603d75cf90d8be9ebe0d1400085e97823951c01383105811caf0aa3a165c056212e5f09b488a8a480a0d22c82eee34fae7b29967d3271529ed50e33085204bdf7315a4ad6f252635758a380a63fe05db95a30a8e010619d8a3734a0e03ad362e777856cab713764be05c4b12de729edf9a3cd232777d84d1cffdf829c6c0806123a475928cceac3bb8e4419ec8200c0d1f2a4be1b7834c5d973a11282e0b0e8e", @ANYRES32, @ANYBLOB="01000000000000002e2f66696c653000"]) (async) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0xfffffffffffffd15) (async) 19:11:56 executing program 1: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:56 executing program 0: syz_clone3(0x0, 0x0) 19:11:56 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:56 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffff}}, './file0\x00'}) r1 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r1, 0x0, 0x0], 0x9}, 0x58) (async) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x800, 0x40, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000200)={0x3ff, 0x0, {r1}, {r2}, 0x7, 0x7}) (async) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, 0x0, 0x0) (async) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, r4, {0x6}}, './file0\x00'}) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) socket$alg(0x26, 0x5, 0x0) accept$alg(r4, 0x0, 0x0) (async) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) 19:11:56 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(0x0, 0x0) 19:11:56 executing program 0: syz_clone3(0x0, 0x0) 19:11:56 executing program 4: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5}}, './file0\x00'}) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000040)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)=ANY=[@ANYBLOB="01eedd372262e5fbc199ad5490c48f00cf22652eca603d75cf90d8be9ebe0d1400085e97823951c01383105811caf0aa3a165c056212e5f09b488a8a480a0d22c82eee34fae7b29967d3271529ed50e33085204bdf7315a4ad6f252635758a380a63fe05db95a30a8e010619d8a3734a0e03ad362e777856cab713764be05c4b12de729edf9a3cd232777d84d1cffdf829c6c0806123a475928cceac3bb8e4419ec8200c0d1f2a4be1b7834c5d973a11282e0b0e8e", @ANYRES32=0xffffffffffffffff, @ANYBLOB="01000000000000002e2f66696c653000"]) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0xfffffffffffffd15) 19:11:56 executing program 1: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:56 executing program 4: syz_clone3(&(0x7f0000000000)={0x252004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) ioctl$SNDCTL_TMR_STOP(r1, 0x5403) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000080)={@multicast1}, &(0x7f00000000c0)=0xc) 19:11:56 executing program 3: r0 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, 0x0) keyctl$unlink(0x18, 0x0, r0) 19:11:56 executing program 0: syz_clone3(&(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:56 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(0x0, 0x0) 19:11:56 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:56 executing program 4: syz_clone3(&(0x7f0000000000)={0x252004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) ioctl$SNDCTL_TMR_STOP(r1, 0x5403) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000080)={@multicast1}, &(0x7f00000000c0)=0xc) syz_clone3(&(0x7f0000000000)={0x252004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (async) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (async) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) (async) ioctl$SNDCTL_TMR_STOP(r1, 0x5403) (async) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000080)={@multicast1}, &(0x7f00000000c0)=0xc) (async) 19:11:56 executing program 1: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:56 executing program 3: r0 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, 0x0) keyctl$unlink(0x18, 0x0, r0) (async) keyctl$unlink(0x18, 0x0, r0) 19:11:56 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:56 executing program 0: syz_clone3(&(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:56 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:56 executing program 4: syz_clone3(&(0x7f0000000000)={0x252004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) ioctl$SNDCTL_TMR_STOP(r1, 0x5403) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000080)={@multicast1}, &(0x7f00000000c0)=0xc) 19:11:56 executing program 3: r0 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, 0x0) keyctl$unlink(0x18, 0x0, r0) 19:11:56 executing program 1: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:56 executing program 0: syz_clone3(&(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:56 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:57 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x32, 0x64, 0x33, 0x36, 0x64, 0x4344bf496a78ca7c, 0x34, 0x37, 0x65, 0x39, 0x62, 0xfb9822c4deda8246, 0x31, 0x62, 0x38, 0x60]}, &(0x7f0000000080)={0x0, "caa3de9df0d4c9977c51db53dbb6efdc0fa1f57e534ff00e724e3e1a1b276b047d2f61cb55b5f2f328898b42a0a32bba761875bde1915dc0510a1b44bd2d0dfd", 0x21}, 0x48, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$unlink(0x18, r0, r1) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$unlink(0x9, 0x0, r2) 19:11:57 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:57 executing program 4: getpgrp(0xffffffffffffffff) r0 = syz_clone3(&(0x7f0000000000)={0xf6006000, 0x0, 0x0, 0x0, {0x39}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = getpgid(r0) r2 = getpgrp(r1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={'\x00', 0x2, 0xfffffffd, 0x2, 0x400, 0x0, r2}) 19:11:57 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x32, 0x64, 0x33, 0x36, 0x64, 0x4344bf496a78ca7c, 0x34, 0x37, 0x65, 0x39, 0x62, 0xfb9822c4deda8246, 0x31, 0x62, 0x38, 0x60]}, &(0x7f0000000080)={0x0, "caa3de9df0d4c9977c51db53dbb6efdc0fa1f57e534ff00e724e3e1a1b276b047d2f61cb55b5f2f328898b42a0a32bba761875bde1915dc0510a1b44bd2d0dfd", 0x21}, 0x48, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$unlink(0x18, r0, r1) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$unlink(0x9, 0x0, r2) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x32, 0x64, 0x33, 0x36, 0x64, 0x4344bf496a78ca7c, 0x34, 0x37, 0x65, 0x39, 0x62, 0xfb9822c4deda8246, 0x31, 0x62, 0x38, 0x60]}, &(0x7f0000000080)={0x0, "caa3de9df0d4c9977c51db53dbb6efdc0fa1f57e534ff00e724e3e1a1b276b047d2f61cb55b5f2f328898b42a0a32bba761875bde1915dc0510a1b44bd2d0dfd", 0x21}, 0x48, 0xfffffffffffffffd) (async) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) (async) keyctl$unlink(0x18, r0, r1) (async) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) (async) keyctl$unlink(0x9, 0x0, r2) (async) 19:11:57 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x58) 19:11:57 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:57 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x32, 0x64, 0x33, 0x36, 0x64, 0x4344bf496a78ca7c, 0x34, 0x37, 0x65, 0x39, 0x62, 0xfb9822c4deda8246, 0x31, 0x62, 0x38, 0x60]}, &(0x7f0000000080)={0x0, "caa3de9df0d4c9977c51db53dbb6efdc0fa1f57e534ff00e724e3e1a1b276b047d2f61cb55b5f2f328898b42a0a32bba761875bde1915dc0510a1b44bd2d0dfd", 0x21}, 0x48, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$unlink(0x18, r0, r1) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$unlink(0x9, 0x0, r2) 19:11:57 executing program 1: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:57 executing program 0: syz_clone3(&(0x7f00000011c0)={0xe7226000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:57 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="76065da411e8bcfd71327a61faea20e1252374591d4e27ca06d3ae63880b39f8c96bc356998c8eceb0033d5cb66e7cfebae1f1339d2dc63b41c9e354246bfb1d9a86402562106a7244590aca022c7b", 0x4f, 0xfffffffffffffffb) keyctl$reject(0x13, r0, 0x4, 0x8000, 0xfffffffffffffffe) 19:11:57 executing program 1: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:57 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0], 0x7}, 0x58) 19:11:57 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="76065da411e8bcfd71327a61faea20e1252374591d4e27ca06d3ae63880b39f8c96bc356998c8eceb0033d5cb66e7cfebae1f1339d2dc63b41c9e354246bfb1d9a86402562106a7244590aca022c7b", 0x4f, 0xfffffffffffffffb) keyctl$reject(0x13, r0, 0x4, 0x8000, 0xfffffffffffffffe) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="76065da411e8bcfd71327a61faea20e1252374591d4e27ca06d3ae63880b39f8c96bc356998c8eceb0033d5cb66e7cfebae1f1339d2dc63b41c9e354246bfb1d9a86402562106a7244590aca022c7b", 0x4f, 0xfffffffffffffffb) (async) keyctl$reject(0x13, r0, 0x4, 0x8000, 0xfffffffffffffffe) (async) 19:11:57 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:57 executing program 4: getpgrp(0xffffffffffffffff) r0 = syz_clone3(&(0x7f0000000000)={0xf6006000, 0x0, 0x0, 0x0, {0x39}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = getpgid(r0) r2 = getpgrp(r1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={'\x00', 0x2, 0xfffffffd, 0x2, 0x400, 0x0, r2}) getpgrp(0xffffffffffffffff) (async) syz_clone3(&(0x7f0000000000)={0xf6006000, 0x0, 0x0, 0x0, {0x39}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) getpgid(r0) (async) getpgrp(r1) (async) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={'\x00', 0x2, 0xfffffffd, 0x2, 0x400, 0x0, r2}) (async) 19:11:57 executing program 1: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:57 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="76065da411e8bcfd71327a61faea20e1252374591d4e27ca06d3ae63880b39f8c96bc356998c8eceb0033d5cb66e7cfebae1f1339d2dc63b41c9e354246bfb1d9a86402562106a7244590aca022c7b", 0x4f, 0xfffffffffffffffb) (async) r0 = add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="76065da411e8bcfd71327a61faea20e1252374591d4e27ca06d3ae63880b39f8c96bc356998c8eceb0033d5cb66e7cfebae1f1339d2dc63b41c9e354246bfb1d9a86402562106a7244590aca022c7b", 0x4f, 0xfffffffffffffffb) keyctl$reject(0x13, r0, 0x4, 0x8000, 0xfffffffffffffffe) 19:11:57 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0], 0x6}, 0x58) 19:11:57 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:57 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "e7f389aa63c95ebdbac650b65828ad9fe7b9907a786245a624c0c9bee0a089b06d3e0354fa8d486c53655b51a4115b8d1cc64ea31ef0190935fc2134361528c1", 0x36}, 0x48, 0xfffffffffffffffa) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "d2e61664a20f3e61cd66cb5e70096d0fb8cb8054339529ba57a97802707bfd7135c52879a6ea38535bead1a42eef5fe3fb88fd169e866109ef49d2c42c8502db", 0x3c}, 0x48, r0) keyctl$clear(0x7, r1) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$unlink(0x18, 0x0, r0) 19:11:57 executing program 0: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "e7f389aa63c95ebdbac650b65828ad9fe7b9907a786245a624c0c9bee0a089b06d3e0354fa8d486c53655b51a4115b8d1cc64ea31ef0190935fc2134361528c1", 0x36}, 0x48, 0xfffffffffffffffa) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "d2e61664a20f3e61cd66cb5e70096d0fb8cb8054339529ba57a97802707bfd7135c52879a6ea38535bead1a42eef5fe3fb88fd169e866109ef49d2c42c8502db", 0x3c}, 0x48, r0) keyctl$clear(0x7, r1) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$unlink(0x18, 0x0, r0) 19:11:57 executing program 1: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x58) 19:11:57 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0], 0x5}, 0x58) 19:11:57 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "e7f389aa63c95ebdbac650b65828ad9fe7b9907a786245a624c0c9bee0a089b06d3e0354fa8d486c53655b51a4115b8d1cc64ea31ef0190935fc2134361528c1", 0x36}, 0x48, 0xfffffffffffffffa) (async) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "d2e61664a20f3e61cd66cb5e70096d0fb8cb8054339529ba57a97802707bfd7135c52879a6ea38535bead1a42eef5fe3fb88fd169e866109ef49d2c42c8502db", 0x3c}, 0x48, r0) keyctl$clear(0x7, r1) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$unlink(0x18, 0x0, r0) 19:11:57 executing program 1: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0], 0x7}, 0x58) 19:11:57 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0], 0x6}, 0x58) 19:11:58 executing program 4: getpgrp(0xffffffffffffffff) r0 = syz_clone3(&(0x7f0000000000)={0xf6006000, 0x0, 0x0, 0x0, {0x39}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = getpgid(r0) r2 = getpgrp(r1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={'\x00', 0x2, 0xfffffffd, 0x2, 0x400, 0x0, r2}) 19:11:58 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "e7f389aa63c95ebdbac650b65828ad9fe7b9907a786245a624c0c9bee0a089b06d3e0354fa8d486c53655b51a4115b8d1cc64ea31ef0190935fc2134361528c1", 0x36}, 0x48, 0xfffffffffffffffa) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "d2e61664a20f3e61cd66cb5e70096d0fb8cb8054339529ba57a97802707bfd7135c52879a6ea38535bead1a42eef5fe3fb88fd169e866109ef49d2c42c8502db", 0x3c}, 0x48, r0) keyctl$clear(0x7, r1) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$unlink(0x18, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "e7f389aa63c95ebdbac650b65828ad9fe7b9907a786245a624c0c9bee0a089b06d3e0354fa8d486c53655b51a4115b8d1cc64ea31ef0190935fc2134361528c1", 0x36}, 0x48, 0xfffffffffffffffa) (async) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "d2e61664a20f3e61cd66cb5e70096d0fb8cb8054339529ba57a97802707bfd7135c52879a6ea38535bead1a42eef5fe3fb88fd169e866109ef49d2c42c8502db", 0x3c}, 0x48, r0) (async) keyctl$clear(0x7, r1) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) (async) keyctl$unlink(0x18, 0x0, r0) (async) 19:11:58 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) syz_clone3(&(0x7f00000011c0)={0xe7226000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:58 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 19:11:58 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f00000011c0)={0xe7226000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:58 executing program 1: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0], 0x6}, 0x58) 19:11:58 executing program 3: r0 = add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="ee828abe513d7a91087cc64ae184cfccb6ccc65a0004c9d4ffb37121c6aba49190b7baf7e6ac0828d5fd8f5659682171ae3ef8ba9a9317fca10d3702988e411e6dc9eb61e2c308ba3ed737dac2bf7959b5ebb76982399ac0a210aabfabb803b5c3516a2995113852e2caeff89f9837adfe558b147ac3f130b2183b24a98af604a2700730bdd38da0d1e1a972b6aeb83750faeb2b79ac61969fe997ace1bbab1871cdd66cef4886754fa16f3ae2cb884397d195f68c824ff626d527224365cb734c2355fe06fa39ae2264eac9e84d5e9c82546a45cd1da5ae940aedb04557b27c74275c669dadda861dfced22593006", 0xef, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000001340)="6e3e43a2fdbe25bf7d801e6a18dec45535c1f02804e3f7128966bf9a588a5ad549c553886d99566a8ccda925a7dd892fadaee05f1d729ebe8b8b8e30edf2b7548dddf766d054c817c3699a574352ec8ce49c2abd15b5aa43de92fcc54c58f863ba29732df7f6a95c40c302f6087ea64091c9722c31dcba76df07f38d3831c2dfdae36272fc893e5aa2c966bfdfab44f31fe8b18346098d57da234ca5b6119f3162e8a2b8d2b66d7af90f6a9d7912eec719d5a91120ca3dea602d38aa3a1c9116e9977fc5a997ee639be813a47d4cfbc48dcf068959f71f0e4627efa1d6bb72ac60720ffcdb1a547e2c79d33a0a8f81a60a2751b028a7629b59a76aad574bb1907a5d7e181c9f48defd4f616ad183427be09fafe72f15d1b57e61e9e4ef7fd9882b19b888f59c28909f3c40dc27e9e43035f1404a3674d7687bea4c1b21d8e0f5335e2d344c0576491a8f9ece77d9f6c5b2e60e026b615e9815d51daab580007e1789556360196a8556b7c1b9d42a250c63af725e5196b0bb89595b111dc8842cdb20e6fbc76b4dd91b47caf2350d3671722156d91ce811cf8c14a832f549ea5171f273dee10cee817c82118656c8d8bdec5e4c88537a455bcb4eb4866cb75f4ed6786cd82d1f2eef01ab71ce937c63ee1d729611b32741d2c0761854364bffff13190404b61893e045ccba88e0c1e5078cdd18fc215f5787d606a5634bb7147f651d970ff8b94dd092e6f5c40e378d13de47bdf4373ced849fc034210e8d532f6da5daf71c956fd1381cac3224c70b431189cec276637d0c65e57e8cd06bacb5de5c6305366aa474777780228cfad85cc27f9376bdb33d32482a0374622aaa6404f6880bc09021dc183440368879d5363f08b15947582cf3eb15521a432e006ed2b637e0f7a7003d89327f03eea7f831dbbc80036d6629d965a978b7e5ec61c44e6988272ee400d439266bec85e2d6ceee9bb089938b50cc1378485edf4f2c92e65f8c437ffcd6861fce44bd0512f8f11749a49db4e7950df6f539aaff555b3dd180e5929af182e49b2635f8ff7a3e1fe7c49c4a0d436f6d039272709980f348ef2e96ebb38ed9519640a31f763a7f2e550e2eb8d935a3adfdcb9130e0a04d76aa5d0d668b25a0886cb265b16e0951e1fe742e33ee3ba3b6f827bd82ee97736bb62085aaddcbe1a986381f881c5112b6dc2f0d8cad9805fd1ce124d76e3e8b53b94098af1606913b81a994d5f7a5a68b03b4deb72092469f3d01192fb562020150f790a7f66fe8cb302bf27a03285e356012006d54cf107c28d54ea0dbcf9c2c9008f0cd09e4af43680377f091dbb213aa5d6cf3888d7c15a956d1206c8661ee5743ff10a3fe11a683d5311c88045b8f4259beddda30b860e07adf6185893fd311fe456c0802c1b055c0e86eb736c6ce5e2859017babc10ef844592b41e9ccb0115ba37e57fcc5ebef1519c939713ee0a73cb7e965f8eaa5a04bc70fd6d68855a7c1e65bd70824a5596f9924ad448e6be9406fc18ecdf860ff85079bfc6e0965fa0378e54b811be982b3af9e44d39eff49ce1da60a3453b8af2b9c6b4031d177d4743f0545fa6998e412a6330ffb51699a7735cfec048b30fbb6caa3624bd41430deabfa4d90637ebce9333df6c0a5138b1eba070a737c4db1afb8c2e5b0dd3c92c31837d8f84487f3a9f8db9bb42b5fac237fae804617f86e6b77da1a3c40b70933682d84aa69944ae98c5a9a42bca0f6089d4669cff1fcbcd5ef754a88732e467939b685db6e42925f7dce097ebb1a8f9102b2d332db265acd78cd5b18fb1537e74f88e57b80fa356430de0e18b7ba4cc1e5370aa7c9d8633873f81865042440338037e63c7f0973e408cc22cec7a09f4c5f9b436d161b9a92199979088160ecced30ab211b19387357d06163b8df02a974e8629bbef1f7cf524491f371c8d2ddfbad035e486eaf9534a13a5c05f2686022d193ae9a86763754386d35c71fbc7a8dec0f58c8df8e3606738acb42cd3885f129936f1465ca67a6c22d46a2c5b3410c997d2ec1c0386d138d414f767ba6b9f50c5d0ddf66169188166192707e59f44d295b4118198a102406e7fc1c7446be7ea88bfca49a796631942bc9c430c9887b093b6519b2227af4ff29ea9bed34147e78e8695579618e100589da6ab4b227f5e0b9783764329d1bd0aa90e2ca572a3dbd8156291295106859d656f070efe4bd288351b4e4dae9554fcfc73f5467eff115a679e9c5f8353468e5562a1d89ee4b8689d041d6bdb8201d1d040d7e08945cf4eb57420aad8e160bfefe3eb9f4ccd15a583eea6df3595be5dba5d18c4cae4c820c91f892636c06221e92e1607e86c5e04215f8e02d6fd99f0cb62c85a3c37696c8eedec8c7deafc64a7b61926d601455e1b52dac9105618b0f6736a752a51b7d3cc26a5cc2e233c7806e66f3b2eaba596c03a75da730f4b90616a91a15dd413be9a3f427d4f6ca6a2b954d5f82216e2371923490591caa1100362b0ce2b528eba06339f4dd1e07135a27ce55097597fbf87ca1d4b3f10bc9b0cc905576ea12edf52ae7be4afa1acd846e9c535d8dad15f827ff7db13de611fdf2110fe179b923b5827170a239e0b9f856fa23cc0b8b59635d6e12fbe00224f0d117c316aa1978b9a792b773954505deacb550ec8d9ceb5ca366f550f08c06fd8a79d37613104204d4cc70a17a88dd6c3bf8258f74a1bae5c4829fd0b3e8d84efb0cfb5534807a171377a2995f09613f94cc3b42910411c7e408174c2faf1139f34a644bd24876e190b7257be349f38e812019755e422edb852109e1f7937e239650df53d5bc4e07f69a1d950b7961eedd36659493b95084a283726deb6a55256e5275d5734b018285f80f07ffdec757a30bde4dff5ea60a72336261e09b4862d093651efe71e4f9d7d2c8663c076d6c313afa59b4137e2f0d4471ce7ef102b990e2e311dc363902acb268d3f2d211dbc232ea885c72e488df3493fb97390a9484343e383a7463b2c8c6cf910be59c0f6b85c9fb0c9ad2f0f11bd5549f75ef96b1671c7b2a3b1e3185b60c05c94a625dedfb69b8333ba3a3b9b99769f6ca48a4ab806015709a4834df9a8ac5152cde3e691896e9a0cb1a5a68fa356ac96c26753d02d4cfaf95ef7909eeb595522bae1f68bd4f311d2ca0a5dbfeaa7ec7c915a9600d7cb7c1d04eb0d4279465f829a20114f6df6629b60e53f0e6b78d6e9a76181b52ea390b3a723f637b5b411da1b4c09700cfd5e9d93cc6a0328904698ade2e8e4a6e83697c9b6874cef654a5b82bb6c9c4565fc957ede8a1358a096ae51d84054b50c7aafffd221335196888d92c97f6f065147fffa7cb474d1b858e03d247f6cf259fb1382357c2d401b1f2ba833252e94da3c0367cd0649d7ac0acd5a6689fb0fcb41dea8ffdd8af56cf6f5d0a5e3314b49a2830333620f37739ebdb48646efddcd37156f126153a6bd14ab0c2afaecf5c6b90da0d9592e2966ad73a2dbf463c2f30f32984c1ed107ddabfcf3ac32a8dff525c8ae292dfff3fa621592928893c3352416f3175725c9024f7a53551a1958ce1598cc6134363f8585ec0689d1e005c03e693dd21dba3800696dfda1ae446a57b3d1cf256477ac77af03edba80afb4c922e60bacd7dd5be6c4e6d195f5ea7cfbcd5985810997eb0fde813dbb21799182c1c175fd472beca8572ccd3eaba7adff470fb84afa595a2f4d2de0e9afa7cc5e86f81823dc346451b54456b8553d51d24fe5742959b3535f25d4b2d53d5c8084c25a52044b32d03a6d80a31e7938a0aa0c79c199d325a6dc5c06216ab31162690c06142dff899d76a1bfdb70a975976295665efd06ab936030a554546d3ed0786eff49cc66c6273a2507339893500373bdbc61a75ddb2650d509f55ec2a3709298d7abc7848dc0508e083b70713f2f4669de502fb3f19b696ef4059d0e201ab0d8b91c195bdce391d752cfed1b5a4e9fcdef0fe362c111e4972bd45071db91645012c85fc34fd0029a69e4e44655a3c69cecf1696bc184476356406795ccb5f919d14492c382de4a9178a24e0b8e6ff31e22a6b40cb3a4c392ff8e4ef4d94a3db2ef33ae82af0e6b0a687ae959bba52bfb19c4832704c4aaea63273e9cfc258869189cfb7649189ebaa78f1e7182c17d194139dd18a3d366e9be59e4722f451b5a0c4ce3cd25bb2f6aeed0a1d9ba63a9690783c8a2d141f556dee45add9bcf9375189bda2a47c6b28cd8d87a8301180c7bd6cd4f163e723107806dbd94a31b455266bc3e3152471d46a5afd98f0eed13169b0a0ed6bb015e0d428e81604f0d675bd8f1b2825aaeb0147b1eff8a03e7d3bd7893764784439004792ec351dd4e5ed1653b2db4699ebce08ad807f951d0b72dff3bf65fb74933182cfb6d78098ac7dc8f04488f35c4d3c2b6ac5a81ee9bca91e53378c9030763379802732f104eae5d5bf4c46f44b40e318fa03c935e31fe0f811598262f26be6ef823fa990d85c71107c59b6082eb8991bbf81c2819f7f2e1ee99a5936158f61ff863b0980305833e8e3f8108044c2a93b6fd048b202e8c2b1257463c2755095c4ad88048a519e9a2812b5ffc0622f73aac963a982f6d1e79ea42f58d7ea6eb863eae16d70386db67cedb1882e779e0b2ab9ee7f6354e27bf13ff9064d72fa323680f63ebf278f9192ac90a977432a21ee8b338f7f7b1a2cdbad5f75d15bbde5569cf8c3d5a7b56d30645fa3c6fbe68983811c11455510c1b320c9908dbba73c6d6e99aaa69e3698fd9c6c0831f07d73b539d6daca750f4a62dbeb83a2a9e32c8c754ba7b9b9f7384aefe8e55ac94deb607861dce7eaf1b9e6c3f568580284b3a06e0121825c38111d8e1d9e7f731c12753dc69503cd321b40371315de4ca4ee0d1238ee9de1211c426815d2871acea6fc1476e3e08f723a5e4434b34adc8de292204f1ded65ee17c5fc0d9f64b936071d633313cedd1150266045264c1b10d5a61eb3336beb7d73615e5b83ea61c6193165d209999809f1da0abf3bb554d629e0b8f11163b50a8340bf7cdb51f079992f40ae81e4e9ce1019df36bdbd96a8980034390d3c68b27bb6995003f24c847b72ee4538e5667f72ca0565c39afa1c5e805f5a564309aa372d7713eec50f8011875af79a9977df9059ae79d7b857e151ac9d5fdbcba0faccd98e04113e9dbb2ade6c7debd636f5deb18244612983d9858e4cbd8fb1cdc8181da9af4c0233c09d6120dd963e9dcf0804cce4190302a49ed23c05473da04b0b1b84c006621b88c048c2ca47d84a8a4f6f89f4a602fd4e3827135767e8db6557f99a9b290e8bbf96eca5f984f0fd56e6391f7e6081d09025894d1cd3fc2b5e31dc70265d44f4b42c8537e144c2db199c6d0ba7819969c3c59f6c6f6239e1cbe2d5c21b4f70780e1199c101b3145c87bba8b5133f40b2863e46a75528e38373e632cfdf072fed0a435173ddbbf41e40411fd5e227ee5104f866545bb561432cec607b8d943b28f537187ecebdab25859b77167d5161bf41c6928d89b6c21919624cfa47f11ae279dfdcd01ccf56e5cdc66a28f3d57cec8301c7d73043939b94264311260b5d101d5d16aa6df2d4d28f7b48e73a3cf7a9702dfc0adb74246536bca460d52619808659c8a916dfcc3ceaade7071862b055480545847a83f1df82d52f586f4f6f40e8bea098f03f52ea954c2bef02e32b933f5004edc77bd1390e646456adede3ade315534fe210913e369e68ef95f499f9d2b14ebe267f35e3f75bf472de2e9c6810bfea06505fe1bc2c1", 0x1000, r2) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) r5 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) r6 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r4) r7 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r6, r3, r7, 0x0) keyctl$unlink(0x18, r5, r1) 19:11:58 executing program 1: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0], 0x5}, 0x58) 19:11:58 executing program 3: r0 = add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="ee828abe513d7a91087cc64ae184cfccb6ccc65a0004c9d4ffb37121c6aba49190b7baf7e6ac0828d5fd8f5659682171ae3ef8ba9a9317fca10d3702988e411e6dc9eb61e2c308ba3ed737dac2bf7959b5ebb76982399ac0a210aabfabb803b5c3516a2995113852e2caeff89f9837adfe558b147ac3f130b2183b24a98af604a2700730bdd38da0d1e1a972b6aeb83750faeb2b79ac61969fe997ace1bbab1871cdd66cef4886754fa16f3ae2cb884397d195f68c824ff626d527224365cb734c2355fe06fa39ae2264eac9e84d5e9c82546a45cd1da5ae940aedb04557b27c74275c669dadda861dfced22593006", 0xef, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) (async) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000001340)="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", 0x1000, r2) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) (async) r5 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) (async) r6 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r4) r7 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r6, r3, r7, 0x0) keyctl$unlink(0x18, r5, r1) 19:11:58 executing program 3: r0 = add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="ee828abe513d7a91087cc64ae184cfccb6ccc65a0004c9d4ffb37121c6aba49190b7baf7e6ac0828d5fd8f5659682171ae3ef8ba9a9317fca10d3702988e411e6dc9eb61e2c308ba3ed737dac2bf7959b5ebb76982399ac0a210aabfabb803b5c3516a2995113852e2caeff89f9837adfe558b147ac3f130b2183b24a98af604a2700730bdd38da0d1e1a972b6aeb83750faeb2b79ac61969fe997ace1bbab1871cdd66cef4886754fa16f3ae2cb884397d195f68c824ff626d527224365cb734c2355fe06fa39ae2264eac9e84d5e9c82546a45cd1da5ae940aedb04557b27c74275c669dadda861dfced22593006", 0xef, 0xfffffffffffffffe) (async, rerun: 64) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async, rerun: 64) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) (async) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000001340)="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", 0x1000, r2) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) r5 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) (async) r6 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r4) (async) r7 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r6, r3, r7, 0x0) (async) keyctl$unlink(0x18, r5, r1) 19:11:58 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) 19:11:58 executing program 1: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 19:11:59 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) 19:11:59 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) mq_timedsend(r0, &(0x7f0000000000)="3a0c509965d11b65d853fd42da39f18925e27dc4c5443068e23764c288621364cb3b13166c8f96866cfac2806cc23bc5d4a0cd480303252e5840c4648234f7ca759fc59567ccd8c69430d3e1f6e09038d93640aaa41bc1d7cb588bc2f870b2b05ce67186b2e2166e74ab1f4fe84ba8835be0465025c02e6a3a98a2def348333d42094b024b196f3cb17b359dc589ba96ed02f2f6852325577d27cbe99e7a3fefb3135000ddbb7b79ac2e81ac37da87", 0xaf, 0x5fe, &(0x7f00000000c0)={0x77359400}) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) clock_getres(0x5, &(0x7f0000000100)) keyctl$unlink(0x18, 0x0, r1) 19:11:59 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:59 executing program 1: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) 19:11:59 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 19:11:59 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) sendmsg$nfc_llcp(r0, &(0x7f00000004c0)={&(0x7f0000000140)={0x27, 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x9, "2b39e813f07835e07161d979b3998d34e6e64a4a48c4c1d44d5b2b029cb49cb79a2f470efad89222a5f01672e1564c311f83676b1c944d2f7a24a264b48d19", 0x30}, 0x60, &(0x7f0000000480)=[{&(0x7f00000001c0)="27a24c90a2c47499", 0x8}, {&(0x7f0000000200)="1d5a121e769d9b7c14a556ecb0c7b78e56ec654b979122684aa5561364553110aa18288b3bb889d58239a72f401ced0d53380c03abcc14fb3e7fa27009342601d6db6efc6f", 0x45}, {&(0x7f0000000280)="ea22dcbc39d4f9ffe46932199c8e908d2a4d264b5e310d356beab2389efc9c660cd57f977dc6dee63a8184222db44d1359fac895e5f1c7ec5e558eeaaa7c25e4a363dd46d2342e34aae888bab23b90cab1fd0bd492e4af42dbc0aea931a08c", 0x5f}, {&(0x7f0000000340)="9046d3893f3857228dd929e4941030544f4fa6ceb865eb19b66e6040fb082f4fdd5ea6cbcd4ba5c0069140c1ac2ee89b417d2dcc032d3bd51018ed0916e77124adc1d902e365c204b3e4783eebb51f522491cde4430ca16bc6ce36ca73e957336afb5a446495a53ee86273556f39df07e8a8b3df5e554dae065af6971f3bb95fc6a73d25d5a2f758f8fa3bd29542024dc860b2420c2503b0d139af9b6000427d14c10f193bedac0b20cf49d67f8e1473de2b2bda57a8c31d9ce59204f1870a890ee0d19512fd03", 0xc7}], 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x18, 0x44028}, 0x4000000) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) syz_clone3(&(0x7f0000000000)={0x2a2249480, 0x0, 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x50, {r1}}, 0x58) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000100)) 19:11:59 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) (async) mq_timedsend(r0, &(0x7f0000000000)="3a0c509965d11b65d853fd42da39f18925e27dc4c5443068e23764c288621364cb3b13166c8f96866cfac2806cc23bc5d4a0cd480303252e5840c4648234f7ca759fc59567ccd8c69430d3e1f6e09038d93640aaa41bc1d7cb588bc2f870b2b05ce67186b2e2166e74ab1f4fe84ba8835be0465025c02e6a3a98a2def348333d42094b024b196f3cb17b359dc589ba96ed02f2f6852325577d27cbe99e7a3fefb3135000ddbb7b79ac2e81ac37da87", 0xaf, 0x5fe, &(0x7f00000000c0)={0x77359400}) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) clock_getres(0x5, &(0x7f0000000100)) keyctl$unlink(0x18, 0x0, r1) 19:11:59 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:11:59 executing program 1: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) 19:11:59 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) sendmsg$nfc_llcp(r0, &(0x7f00000004c0)={&(0x7f0000000140)={0x27, 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x9, "2b39e813f07835e07161d979b3998d34e6e64a4a48c4c1d44d5b2b029cb49cb79a2f470efad89222a5f01672e1564c311f83676b1c944d2f7a24a264b48d19", 0x30}, 0x60, &(0x7f0000000480)=[{&(0x7f00000001c0)="27a24c90a2c47499", 0x8}, {&(0x7f0000000200)="1d5a121e769d9b7c14a556ecb0c7b78e56ec654b979122684aa5561364553110aa18288b3bb889d58239a72f401ced0d53380c03abcc14fb3e7fa27009342601d6db6efc6f", 0x45}, {&(0x7f0000000280)="ea22dcbc39d4f9ffe46932199c8e908d2a4d264b5e310d356beab2389efc9c660cd57f977dc6dee63a8184222db44d1359fac895e5f1c7ec5e558eeaaa7c25e4a363dd46d2342e34aae888bab23b90cab1fd0bd492e4af42dbc0aea931a08c", 0x5f}, {&(0x7f0000000340)="9046d3893f3857228dd929e4941030544f4fa6ceb865eb19b66e6040fb082f4fdd5ea6cbcd4ba5c0069140c1ac2ee89b417d2dcc032d3bd51018ed0916e77124adc1d902e365c204b3e4783eebb51f522491cde4430ca16bc6ce36ca73e957336afb5a446495a53ee86273556f39df07e8a8b3df5e554dae065af6971f3bb95fc6a73d25d5a2f758f8fa3bd29542024dc860b2420c2503b0d139af9b6000427d14c10f193bedac0b20cf49d67f8e1473de2b2bda57a8c31d9ce59204f1870a890ee0d19512fd03", 0xc7}], 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x18, 0x44028}, 0x4000000) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) syz_clone3(&(0x7f0000000000)={0x2a2249480, 0x0, 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x50, {r1}}, 0x58) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000100)) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (async) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) (async) sendmsg$nfc_llcp(r0, &(0x7f00000004c0)={&(0x7f0000000140)={0x27, 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x9, "2b39e813f07835e07161d979b3998d34e6e64a4a48c4c1d44d5b2b029cb49cb79a2f470efad89222a5f01672e1564c311f83676b1c944d2f7a24a264b48d19", 0x30}, 0x60, &(0x7f0000000480)=[{&(0x7f00000001c0)="27a24c90a2c47499", 0x8}, {&(0x7f0000000200)="1d5a121e769d9b7c14a556ecb0c7b78e56ec654b979122684aa5561364553110aa18288b3bb889d58239a72f401ced0d53380c03abcc14fb3e7fa27009342601d6db6efc6f", 0x45}, {&(0x7f0000000280)="ea22dcbc39d4f9ffe46932199c8e908d2a4d264b5e310d356beab2389efc9c660cd57f977dc6dee63a8184222db44d1359fac895e5f1c7ec5e558eeaaa7c25e4a363dd46d2342e34aae888bab23b90cab1fd0bd492e4af42dbc0aea931a08c", 0x5f}, {&(0x7f0000000340)="9046d3893f3857228dd929e4941030544f4fa6ceb865eb19b66e6040fb082f4fdd5ea6cbcd4ba5c0069140c1ac2ee89b417d2dcc032d3bd51018ed0916e77124adc1d902e365c204b3e4783eebb51f522491cde4430ca16bc6ce36ca73e957336afb5a446495a53ee86273556f39df07e8a8b3df5e554dae065af6971f3bb95fc6a73d25d5a2f758f8fa3bd29542024dc860b2420c2503b0d139af9b6000427d14c10f193bedac0b20cf49d67f8e1473de2b2bda57a8c31d9ce59204f1870a890ee0d19512fd03", 0xc7}], 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000000000000a010000760e0000288c2b000000000066a3513ec86a0d899edd8374d2fc088c976ebb097f114a295cafb69fcfe2164d2f3e257abbb82afb708f317bed2b4c7006e24a1d4f2befe177682ca9b123433b4fba46efb5d434cb2daa68453c15e46a13f2664d9fa48ac578793b137e5d79e0d4bb4181dd27a8af7e0c778c195046a48d2956798c448ed696a217efc1d936e76f53f67168787587ea7e490ea9426af027d31c9da086235b63c99859478cae707db4d96051e7f0a2061abf09c835ac71f9a4f3a3443aa1fdd7291096313bc2fc97634c8838ee10b3b16b16b95a21b097a77254a945276421601e152251b564635ed40501b851c347b9e30e086a17ee6eb6700721b93a0ac209b071c516f463252c3145c0d4f8f03d67a4b7ad5b54eabf1c13f032ea5d0acc053aa3150cf88741008750ea9a34ac58"], 0x18, 0x44028}, 0x4000000) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (async) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, 0x0, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) (async) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) (async) syz_clone3(&(0x7f0000000000)={0x2a2249480, 0x0, 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x50, {r1}}, 0x58) (async) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000100)) (async) 19:11:59 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) sendmsg$nfc_llcp(r0, &(0x7f00000004c0)={&(0x7f0000000140)={0x27, 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x9, "2b39e813f07835e07161d979b3998d34e6e64a4a48c4c1d44d5b2b029cb49cb79a2f470efad89222a5f01672e1564c311f83676b1c944d2f7a24a264b48d19", 0x30}, 0x60, &(0x7f0000000480)=[{&(0x7f00000001c0)="27a24c90a2c47499", 0x8}, {&(0x7f0000000200)="1d5a121e769d9b7c14a556ecb0c7b78e56ec654b979122684aa5561364553110aa18288b3bb889d58239a72f401ced0d53380c03abcc14fb3e7fa27009342601d6db6efc6f", 0x45}, {&(0x7f0000000280)="ea22dcbc39d4f9ffe46932199c8e908d2a4d264b5e310d356beab2389efc9c660cd57f977dc6dee63a8184222db44d1359fac895e5f1c7ec5e558eeaaa7c25e4a363dd46d2342e34aae888bab23b90cab1fd0bd492e4af42dbc0aea931a08c", 0x5f}, {&(0x7f0000000340)="9046d3893f3857228dd929e4941030544f4fa6ceb865eb19b66e6040fb082f4fdd5ea6cbcd4ba5c0069140c1ac2ee89b417d2dcc032d3bd51018ed0916e77124adc1d902e365c204b3e4783eebb51f522491cde4430ca16bc6ce36ca73e957336afb5a446495a53ee86273556f39df07e8a8b3df5e554dae065af6971f3bb95fc6a73d25d5a2f758f8fa3bd29542024dc860b2420c2503b0d139af9b6000427d14c10f193bedac0b20cf49d67f8e1473de2b2bda57a8c31d9ce59204f1870a890ee0d19512fd03", 0xc7}], 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x18, 0x44028}, 0x4000000) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) syz_clone3(&(0x7f0000000000)={0x2a2249480, 0x0, 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x50, {r1}}, 0x58) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000100)) 19:11:59 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) (async) mq_timedsend(r0, &(0x7f0000000000)="3a0c509965d11b65d853fd42da39f18925e27dc4c5443068e23764c288621364cb3b13166c8f96866cfac2806cc23bc5d4a0cd480303252e5840c4648234f7ca759fc59567ccd8c69430d3e1f6e09038d93640aaa41bc1d7cb588bc2f870b2b05ce67186b2e2166e74ab1f4fe84ba8835be0465025c02e6a3a98a2def348333d42094b024b196f3cb17b359dc589ba96ed02f2f6852325577d27cbe99e7a3fefb3135000ddbb7b79ac2e81ac37da87", 0xaf, 0x5fe, &(0x7f00000000c0)={0x77359400}) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) (async, rerun: 64) clock_getres(0x5, &(0x7f0000000100)) (async, rerun: 64) keyctl$unlink(0x18, 0x0, r1) 19:11:59 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008aec1, 0x0) syz_clone3(&(0x7f00000011c0)={0xe7226000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:59 executing program 2: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) keyctl$get_persistent(0x16, 0x0, 0xffffffffffffffff) 19:11:59 executing program 1: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:11:59 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)}, 0x58) 19:11:59 executing program 3: keyctl$unlink(0x18, 0x0, 0xfffffffffffffffd) 19:11:59 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) (async) sendmsg$nfc_llcp(r0, &(0x7f00000004c0)={&(0x7f0000000140)={0x27, 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x9, "2b39e813f07835e07161d979b3998d34e6e64a4a48c4c1d44d5b2b029cb49cb79a2f470efad89222a5f01672e1564c311f83676b1c944d2f7a24a264b48d19", 0x30}, 0x60, &(0x7f0000000480)=[{&(0x7f00000001c0)="27a24c90a2c47499", 0x8}, {&(0x7f0000000200)="1d5a121e769d9b7c14a556ecb0c7b78e56ec654b979122684aa5561364553110aa18288b3bb889d58239a72f401ced0d53380c03abcc14fb3e7fa27009342601d6db6efc6f", 0x45}, {&(0x7f0000000280)="ea22dcbc39d4f9ffe46932199c8e908d2a4d264b5e310d356beab2389efc9c660cd57f977dc6dee63a8184222db44d1359fac895e5f1c7ec5e558eeaaa7c25e4a363dd46d2342e34aae888bab23b90cab1fd0bd492e4af42dbc0aea931a08c", 0x5f}, {&(0x7f0000000340)="9046d3893f3857228dd929e4941030544f4fa6ceb865eb19b66e6040fb082f4fdd5ea6cbcd4ba5c0069140c1ac2ee89b417d2dcc032d3bd51018ed0916e77124adc1d902e365c204b3e4783eebb51f522491cde4430ca16bc6ce36ca73e957336afb5a446495a53ee86273556f39df07e8a8b3df5e554dae065af6971f3bb95fc6a73d25d5a2f758f8fa3bd29542024dc860b2420c2503b0d139af9b6000427d14c10f193bedac0b20cf49d67f8e1473de2b2bda57a8c31d9ce59204f1870a890ee0d19512fd03", 0xc7}], 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x18, 0x44028}, 0x4000000) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (async) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, 0x0, 0x0) (async) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) (async) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) (async) syz_clone3(&(0x7f0000000000)={0x2a2249480, 0x0, 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x50, {r1}}, 0x58) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000100)) 19:11:59 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)}, 0x58) 19:11:59 executing program 3: keyctl$unlink(0x18, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x18, 0x0, 0xfffffffffffffffd) (async) 19:11:59 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000000)={0x27, 0x0, 0x1, 0x1, 0x7f, 0x2d, "da980ba59d150e269b9a2f725e5d4c50b8bc74e871a80d6d3f72987811f2e01af2dd9a60e1372a2fe220ef8f797c8981764c9ef6e6a1425ad2b71c156019fe", 0x3c}, 0x60) 19:11:59 executing program 3: keyctl$unlink(0x18, 0x0, 0xfffffffffffffffd) 19:11:59 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)}, 0x58) 19:11:59 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x38, 0x61, 0x30, 0x57, 0x63, 0x64, 0x36, 0x64, 0x33, 0x65, 0x61, 0x0, 0x61, 0x39, 0x61, 0x32]}, &(0x7f0000000080)={0x0, "139666751e0d985de9f4128a91be114f51f5143bab051aedd875d021494d9d3961756c9ce30e85088319b4064de2e1691fb0e864fc96894f2ae42143560c178f", 0x32}, 0x48, 0xfffffffffffffff8) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$link(0x8, r2, r0) keyctl$link(0x8, r0, r1) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) 19:11:59 executing program 0: syz_io_uring_setup(0x886, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:59 executing program 2: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) keyctl$get_persistent(0x16, 0x0, 0xffffffffffffffff) 19:11:59 executing program 1: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)}, 0x58) 19:11:59 executing program 5: syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:59 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x38, 0x61, 0x30, 0x57, 0x63, 0x64, 0x36, 0x64, 0x33, 0x65, 0x61, 0x0, 0x61, 0x39, 0x61, 0x32]}, &(0x7f0000000080)={0x0, "139666751e0d985de9f4128a91be114f51f5143bab051aedd875d021494d9d3961756c9ce30e85088319b4064de2e1691fb0e864fc96894f2ae42143560c178f", 0x32}, 0x48, 0xfffffffffffffff8) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$link(0x8, r2, r0) keyctl$link(0x8, r0, r1) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x38, 0x61, 0x30, 0x57, 0x63, 0x64, 0x36, 0x64, 0x33, 0x65, 0x61, 0x0, 0x61, 0x39, 0x61, 0x32]}, &(0x7f0000000080)={0x0, "139666751e0d985de9f4128a91be114f51f5143bab051aedd875d021494d9d3961756c9ce30e85088319b4064de2e1691fb0e864fc96894f2ae42143560c178f", 0x32}, 0x48, 0xfffffffffffffff8) (async) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) (async) keyctl$link(0x8, r2, r0) (async) keyctl$link(0x8, r0, r1) (async) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) (async) 19:11:59 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:11:59 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000000)={0x27, 0x0, 0x1, 0x1, 0x7f, 0x2d, "da980ba59d150e269b9a2f725e5d4c50b8bc74e871a80d6d3f72987811f2e01af2dd9a60e1372a2fe220ef8f797c8981764c9ef6e6a1425ad2b71c156019fe", 0x3c}, 0x60) 19:11:59 executing program 1: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)}, 0x58) 19:11:59 executing program 5: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000000)={0x27, 0x0, 0x1, 0x1, 0x7f, 0x2d, "da980ba59d150e269b9a2f725e5d4c50b8bc74e871a80d6d3f72987811f2e01af2dd9a60e1372a2fe220ef8f797c8981764c9ef6e6a1425ad2b71c156019fe", 0x3c}, 0x60) 19:11:59 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) (async, rerun: 64) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x38, 0x61, 0x30, 0x57, 0x63, 0x64, 0x36, 0x64, 0x33, 0x65, 0x61, 0x0, 0x61, 0x39, 0x61, 0x32]}, &(0x7f0000000080)={0x0, "139666751e0d985de9f4128a91be114f51f5143bab051aedd875d021494d9d3961756c9ce30e85088319b4064de2e1691fb0e864fc96894f2ae42143560c178f", 0x32}, 0x48, 0xfffffffffffffff8) (async, rerun: 64) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$link(0x8, r2, r0) (async, rerun: 32) keyctl$link(0x8, r0, r1) (rerun: 32) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) 19:11:59 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008aec1, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) bind(r0, &(0x7f0000000540)=@rc={0x1f, @any, 0x1}, 0x80) syz_clone3(&(0x7f00000011c0)={0xe7226000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:59 executing program 1: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)}, 0x58) 19:12:00 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "983178ca337d387c9149c53cece1b1d0adbc6643d4b352e69b0caf0d68303d0b400ed5c750d893ac2a86278221fa8778baa7a4ebfdad7b3028ac2800", 0x17}, 0x48, r0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$get_persistent(0x16, 0xee01, r3) r4 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$KEYCTL_MOVE(0x1e, 0x0, r1, r2, 0x0) keyctl$unlink(0x9, r4, 0xfffffffffffffffe) r5 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x7, r1) r6 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r5) r7 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc2}, &(0x7f00000001c0)={0x0, "71d5388f316819df0523c6bc8707af689626a950901622002b38dad76161cef07b58b6a9a65976c711d013ea8a9242ceb92cfcb92b8a6d5fd530ea46b622e3d8", 0x30}, 0x48, 0x0) r8 = add_key(&(0x7f00000002c0)='blacklist\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="3913c91531237140d675ca8a52d3268ffa6aa1e92e0369f1eaafd0439ab242c48af95ce2c08cb406de755d582f15538539335538c948f759906eeaabd0dd1d6f46e2b94f503e083f2528717ee108efe676d2bce528aeeedbea65697750d1524bdeeb9024ac204c578d60468049aa4c07133335e0334af3c07ee34a5563a11c436cc06780479c26507b6db049923fb7b09f4dba039630559de3de93", 0x9b, r6) r9 = add_key$keyring(&(0x7f0000000400), &(0x7f0000000440)={'syz', 0x0}, 0x0, 0x0, r3) syz_io_uring_setup(0x1a3b, &(0x7f00000005c0)={0x0, 0x2f33, 0x200, 0x3, 0xe9}, &(0x7f0000000500)=0x0, &(0x7f0000000640)) syz_io_uring_setup(0x229f, &(0x7f0000000000)={0x0, 0x20dd, 0x200, 0x3, 0x4}, &(0x7f0000000080), &(0x7f00000000c0)=0x0) r12 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) syz_io_uring_submit(0x0, r11, &(0x7f0000000340)=@IORING_OP_RECVMSG={0xa, 0x22, 0x1, r12, 0x0, &(0x7f0000000300)={&(0x7f0000000100)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000180)=""/125, 0x7d}, {&(0x7f0000000200)=""/67, 0x43}, {&(0x7f0000000280)=""/11, 0xb}], 0x3}, 0x0, 0x2000, 0x0, {0x1}}) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x3}, 0x0, 0x0, r6) syz_io_uring_submit(r10, r11, &(0x7f0000000700)=@IORING_OP_CONNECT={0x10, 0x24, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000680)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x0, 0x0, 0x1}) keyctl$reject(0x13, r8, 0xff, 0x5, r9) keyctl$clear(0x7, r7) keyctl$unlink(0x9, 0x0, r5) read$FUSE(0xffffffffffffffff, &(0x7f0000001340)={0x2020}, 0x2020) 19:12:00 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:12:00 executing program 1: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)}, 0x58) 19:12:00 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) r0 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "983178ca337d387c9149c53cece1b1d0adbc6643d4b352e69b0caf0d68303d0b400ed5c750d893ac2a86278221fa8778baa7a4ebfdad7b3028ac2800", 0x17}, 0x48, r0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async) r3 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$get_persistent(0x16, 0xee01, r3) (async) r4 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$KEYCTL_MOVE(0x1e, 0x0, r1, r2, 0x0) (async) keyctl$unlink(0x9, r4, 0xfffffffffffffffe) (async) r5 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async, rerun: 64) keyctl$clear(0x7, r1) (rerun: 64) r6 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r5) r7 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc2}, &(0x7f00000001c0)={0x0, "71d5388f316819df0523c6bc8707af689626a950901622002b38dad76161cef07b58b6a9a65976c711d013ea8a9242ceb92cfcb92b8a6d5fd530ea46b622e3d8", 0x30}, 0x48, 0x0) (async) r8 = add_key(&(0x7f00000002c0)='blacklist\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="3913c91531237140d675ca8a52d3268ffa6aa1e92e0369f1eaafd0439ab242c48af95ce2c08cb406de755d582f15538539335538c948f759906eeaabd0dd1d6f46e2b94f503e083f2528717ee108efe676d2bce528aeeedbea65697750d1524bdeeb9024ac204c578d60468049aa4c07133335e0334af3c07ee34a5563a11c436cc06780479c26507b6db049923fb7b09f4dba039630559de3de93", 0x9b, r6) (async) r9 = add_key$keyring(&(0x7f0000000400), &(0x7f0000000440)={'syz', 0x0}, 0x0, 0x0, r3) (async) syz_io_uring_setup(0x1a3b, &(0x7f00000005c0)={0x0, 0x2f33, 0x200, 0x3, 0xe9}, &(0x7f0000000500)=0x0, &(0x7f0000000640)) (async) syz_io_uring_setup(0x229f, &(0x7f0000000000)={0x0, 0x20dd, 0x200, 0x3, 0x4}, &(0x7f0000000080), &(0x7f00000000c0)=0x0) (async) r12 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) syz_io_uring_submit(0x0, r11, &(0x7f0000000340)=@IORING_OP_RECVMSG={0xa, 0x22, 0x1, r12, 0x0, &(0x7f0000000300)={&(0x7f0000000100)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000180)=""/125, 0x7d}, {&(0x7f0000000200)=""/67, 0x43}, {&(0x7f0000000280)=""/11, 0xb}], 0x3}, 0x0, 0x2000, 0x0, {0x1}}) (async) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x3}, 0x0, 0x0, r6) (async) syz_io_uring_submit(r10, r11, &(0x7f0000000700)=@IORING_OP_CONNECT={0x10, 0x24, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000680)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x0, 0x0, 0x1}) (async, rerun: 64) keyctl$reject(0x13, r8, 0xff, 0x5, r9) (async, rerun: 64) keyctl$clear(0x7, r7) (async, rerun: 32) keyctl$unlink(0x9, 0x0, r5) (async, rerun: 32) read$FUSE(0xffffffffffffffff, &(0x7f0000001340)={0x2020}, 0x2020) 19:12:00 executing program 1: r0 = msgget(0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) msgctl$IPC_RMID(r0, 0x0) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @auto=[0x34, 0x64, 0x38, 0x62, 0x39, 0x39, 0x66, 0x64, 0x39, 0x35, 0x65, 0x65, 0x35, 0x64, 0x38, 0x30]}, &(0x7f00000000c0)={0x0, "5abbcd006ce505916bf0e3fb8eca850947a0c9261ee8dc3927ddf8c789f97b31d2b9de91f3ce28d05889fc3b62be6c0b7c36a35402b16d7badae2929343d08b5", 0x3f}, 0x48, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) r3 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$unlink(0x18, r3, r2) r4 = msgget(0x0, 0x500) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)=[0x3, 0x9]) socket$bt_bnep(0x1f, 0x3, 0x4) msgctl$IPC_RMID(r4, 0x0) msgctl$IPC_RMID(r4, 0x0) 19:12:00 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000000)={0x27, 0x0, 0x1, 0x1, 0x7f, 0x2d, "da980ba59d150e269b9a2f725e5d4c50b8bc74e871a80d6d3f72987811f2e01af2dd9a60e1372a2fe220ef8f797c8981764c9ef6e6a1425ad2b71c156019fe", 0x3c}, 0x60) 19:12:00 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) r0 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "983178ca337d387c9149c53cece1b1d0adbc6643d4b352e69b0caf0d68303d0b400ed5c750d893ac2a86278221fa8778baa7a4ebfdad7b3028ac2800", 0x17}, 0x48, r0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async) r3 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$get_persistent(0x16, 0xee01, r3) r4 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$KEYCTL_MOVE(0x1e, 0x0, r1, r2, 0x0) (async) keyctl$unlink(0x9, r4, 0xfffffffffffffffe) (async) r5 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async) keyctl$clear(0x7, r1) r6 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r5) r7 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc2}, &(0x7f00000001c0)={0x0, "71d5388f316819df0523c6bc8707af689626a950901622002b38dad76161cef07b58b6a9a65976c711d013ea8a9242ceb92cfcb92b8a6d5fd530ea46b622e3d8", 0x30}, 0x48, 0x0) (async) r8 = add_key(&(0x7f00000002c0)='blacklist\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="3913c91531237140d675ca8a52d3268ffa6aa1e92e0369f1eaafd0439ab242c48af95ce2c08cb406de755d582f15538539335538c948f759906eeaabd0dd1d6f46e2b94f503e083f2528717ee108efe676d2bce528aeeedbea65697750d1524bdeeb9024ac204c578d60468049aa4c07133335e0334af3c07ee34a5563a11c436cc06780479c26507b6db049923fb7b09f4dba039630559de3de93", 0x9b, r6) (async) r9 = add_key$keyring(&(0x7f0000000400), &(0x7f0000000440)={'syz', 0x0}, 0x0, 0x0, r3) syz_io_uring_setup(0x1a3b, &(0x7f00000005c0)={0x0, 0x2f33, 0x200, 0x3, 0xe9}, &(0x7f0000000500)=0x0, &(0x7f0000000640)) (async) syz_io_uring_setup(0x229f, &(0x7f0000000000)={0x0, 0x20dd, 0x200, 0x3, 0x4}, &(0x7f0000000080), &(0x7f00000000c0)=0x0) (async) r12 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) syz_io_uring_submit(0x0, r11, &(0x7f0000000340)=@IORING_OP_RECVMSG={0xa, 0x22, 0x1, r12, 0x0, &(0x7f0000000300)={&(0x7f0000000100)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000180)=""/125, 0x7d}, {&(0x7f0000000200)=""/67, 0x43}, {&(0x7f0000000280)=""/11, 0xb}], 0x3}, 0x0, 0x2000, 0x0, {0x1}}) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x3}, 0x0, 0x0, r6) (async) syz_io_uring_submit(r10, r11, &(0x7f0000000700)=@IORING_OP_CONNECT={0x10, 0x24, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000680)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x0, 0x0, 0x1}) (async) keyctl$reject(0x13, r8, 0xff, 0x5, r9) keyctl$clear(0x7, r7) (async) keyctl$unlink(0x9, 0x0, r5) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000001340)={0x2020}, 0x2020) 19:12:00 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008aec1, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) bind(r0, &(0x7f0000000540)=@rc={0x1f, @any, 0x1}, 0x80) syz_clone3(&(0x7f00000011c0)={0xe7226000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x24ea, &(0x7f0000000000)={0x0, 0xba4a, 0x2, 0x0, 0x245}, &(0x7f0000000080), &(0x7f00000000c0)) 19:12:00 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008aec1, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) bind(r0, &(0x7f0000000540)=@rc={0x1f, @any, 0x1}, 0x80) syz_clone3(&(0x7f00000011c0)={0xe7226000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x24ea, &(0x7f0000000000)={0x0, 0xba4a, 0x2, 0x0, 0x245}, &(0x7f0000000080), &(0x7f00000000c0)) syz_io_uring_setup(0x3e93, &(0x7f0000000100)={0x0, 0xe22d, 0x280, 0x1, 0x2de}, &(0x7f0000000180), &(0x7f00000001c0)) 19:12:00 executing program 0: syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:12:00 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008aec1, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) bind(r0, &(0x7f0000000540)=@rc={0x1f, @any, 0x1}, 0x80) syz_clone3(&(0x7f00000011c0)={0xe7226000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x24ea, &(0x7f0000000000)={0x0, 0xba4a, 0x2, 0x0, 0x245}, &(0x7f0000000080), &(0x7f00000000c0)) syz_io_uring_setup(0x3e93, &(0x7f0000000100)={0x0, 0xe22d, 0x280, 0x1, 0x2de}, &(0x7f0000000180), &(0x7f00000001c0)) syz_io_uring_setup(0x72f4, &(0x7f00000005c0)={0x0, 0x7c6, 0x200, 0x3, 0x386}, &(0x7f0000000640), &(0x7f0000000680)) 19:12:00 executing program 3: getpgrp(0xffffffffffffffff) r0 = add_key(&(0x7f0000002040)='user\x00', &(0x7f0000002080)={'syz', 0x3}, &(0x7f00000020c0), 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f00000020c0), &(0x7f0000002100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x18, r1, r0) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0}, 0x2020) keyctl$get_persistent(0x16, r2, 0x0) 19:12:00 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008aec1, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) bind(r0, &(0x7f0000000540)=@rc={0x1f, @any, 0x1}, 0x80) syz_clone3(&(0x7f00000011c0)={0xe7226000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x24ea, &(0x7f0000000000)={0x0, 0xba4a, 0x2, 0x0, 0x245}, &(0x7f0000000080), &(0x7f00000000c0)) syz_io_uring_setup(0x3e93, &(0x7f0000000100)={0x0, 0xe22d, 0x280, 0x1, 0x2de}, &(0x7f0000000180), &(0x7f00000001c0)) syz_io_uring_setup(0x72f4, &(0x7f00000005c0)={0x0, 0x7c6, 0x200, 0x3, 0x386}, &(0x7f0000000640), &(0x7f0000000680)) 19:12:00 executing program 3: getpgrp(0xffffffffffffffff) (async) r0 = add_key(&(0x7f0000002040)='user\x00', &(0x7f0000002080)={'syz', 0x3}, &(0x7f00000020c0), 0x0, 0xfffffffffffffffc) (async) r1 = add_key$keyring(&(0x7f00000020c0), &(0x7f0000002100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x18, r1, r0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0}, 0x2020) keyctl$get_persistent(0x16, r2, 0x0) 19:12:00 executing program 3: getpgrp(0xffffffffffffffff) (async) r0 = add_key(&(0x7f0000002040)='user\x00', &(0x7f0000002080)={'syz', 0x3}, &(0x7f00000020c0), 0x0, 0xfffffffffffffffc) (async) r1 = add_key$keyring(&(0x7f00000020c0), &(0x7f0000002100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x18, r1, r0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0}, 0x2020) keyctl$get_persistent(0x16, r2, 0x0) 19:12:00 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffb, 0xfffffffffffffffc, 0x1) 19:12:00 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffb, 0xfffffffffffffffc, 0x1) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) (async) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffb, 0xfffffffffffffffc, 0x1) (async) 19:12:00 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001240)={0x2020}, 0x2020) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)) 19:12:00 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffb, 0xfffffffffffffffc, 0x1) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) (async) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffb, 0xfffffffffffffffc, 0x1) (async) 19:12:00 executing program 1: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:12:01 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffb) 19:12:01 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:12:01 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008aec1, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) bind(r0, &(0x7f0000000540)=@rc={0x1f, @any, 0x1}, 0x80) syz_clone3(&(0x7f00000011c0)={0xe7226000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x24ea, &(0x7f0000000000)={0x0, 0xba4a, 0x2, 0x0, 0x245}, &(0x7f0000000080), &(0x7f00000000c0)) syz_io_uring_setup(0x3e93, &(0x7f0000000100)={0x0, 0xe22d, 0x280, 0x1, 0x2de}, &(0x7f0000000180), &(0x7f00000001c0)) syz_io_uring_setup(0x72f4, &(0x7f00000005c0)={0x0, 0x7c6, 0x200, 0x3, 0x386}, &(0x7f0000000640), &(0x7f0000000680)) socket$inet(0x2, 0x8, 0x400) 19:12:01 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffb) 19:12:01 executing program 1: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:12:01 executing program 5: ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {0x1}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="f0000007000000002e2f66696c6530005db985849819d286d6c5ceb55e2b54b0f6db8716f742cdf1fcc00969b7114faa714dcd79088e84ce125b440a6f623b653447ad884105f53749cd3ab3d85a8d4e3b9a72963cb557a2bbeecf153936cbf1474203cc4e61f757c6178de384be4b0f1e8b675d60f4777490cd9cce12f354c4318d1611841c92a31f"]) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={'\x00', 0x200, 0x82e, 0x5, 0x2, 0x59, r0}) 19:12:01 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008aec1, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) bind(r0, &(0x7f0000000540)=@rc={0x1f, @any, 0x1}, 0x80) syz_clone3(&(0x7f00000011c0)={0xe7226000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x24ea, &(0x7f0000000000)={0x0, 0xba4a, 0x2, 0x0, 0x245}, &(0x7f0000000080), &(0x7f00000000c0)) syz_io_uring_setup(0x3e93, &(0x7f0000000100)={0x0, 0xe22d, 0x280, 0x1, 0x2de}, &(0x7f0000000180), &(0x7f00000001c0)) syz_io_uring_setup(0x72f4, &(0x7f00000005c0)={0x0, 0x7c6, 0x200, 0x3, 0x386}, &(0x7f0000000640), &(0x7f0000000680)) 19:12:01 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffb) 19:12:01 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) (async) read$FUSE(r0, &(0x7f0000001240)={0x2020}, 0x2020) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)) 19:12:01 executing program 1: syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2, 0x7e}, &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:12:01 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) add_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="0bbbf72dadccbbb658004b3cc7d4dbbbe740c23799db6d62e8cd346038fa3f21eec12d91f98ea419b1f3f3149486ecdde437100aadbbd8fc08b72b8aba656fd89b2baa979c8fa895b090da7cb6646891102635ba04bd5c76ec42a63754fa5beeba79a3a0ccd494a3205d6ef6a4b95cb3ec89204ba1ccede3653a", 0x7a, r1) sendmsg$NFC_CMD_DEV_DOWN(r2, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={0x0}, 0x1, 0x0, 0x300}, 0x0) keyctl$reject(0x13, r0, 0x5, 0xd78c, 0xfffffffffffffffb) 19:12:01 executing program 1: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:12:01 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) (async) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) add_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="0bbbf72dadccbbb658004b3cc7d4dbbbe740c23799db6d62e8cd346038fa3f21eec12d91f98ea419b1f3f3149486ecdde437100aadbbd8fc08b72b8aba656fd89b2baa979c8fa895b090da7cb6646891102635ba04bd5c76ec42a63754fa5beeba79a3a0ccd494a3205d6ef6a4b95cb3ec89204ba1ccede3653a", 0x7a, r1) sendmsg$NFC_CMD_DEV_DOWN(r2, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={0x0}, 0x1, 0x0, 0x300}, 0x0) keyctl$reject(0x13, r0, 0x5, 0xd78c, 0xfffffffffffffffb) 19:12:01 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) add_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="0bbbf72dadccbbb658004b3cc7d4dbbbe740c23799db6d62e8cd346038fa3f21eec12d91f98ea419b1f3f3149486ecdde437100aadbbd8fc08b72b8aba656fd89b2baa979c8fa895b090da7cb6646891102635ba04bd5c76ec42a63754fa5beeba79a3a0ccd494a3205d6ef6a4b95cb3ec89204ba1ccede3653a", 0x7a, r1) (async) sendmsg$NFC_CMD_DEV_DOWN(r2, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={0x0}, 0x1, 0x0, 0x300}, 0x0) keyctl$reject(0x13, r0, 0x5, 0xd78c, 0xfffffffffffffffb) 19:12:02 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008aec1, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) bind(r0, &(0x7f0000000540)=@rc={0x1f, @any, 0x1}, 0x80) syz_clone3(&(0x7f00000011c0)={0xe7226000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x24ea, &(0x7f0000000000)={0x0, 0xba4a, 0x2, 0x0, 0x245}, &(0x7f0000000080), &(0x7f00000000c0)) syz_io_uring_setup(0x3e93, &(0x7f0000000100)={0x0, 0xe22d, 0x280, 0x1, 0x2de}, &(0x7f0000000180), &(0x7f00000001c0)) syz_io_uring_setup(0x72f4, &(0x7f00000005c0)={0x0, 0x7c6, 0x200, 0x3, 0x386}, &(0x7f0000000640), &(0x7f0000000680)) socket$inet(0x2, 0x8, 0x400) 19:12:02 executing program 3: setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1, &(0x7f0000000040)=0x3f, 0x4) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$unlink(0x9, r1, r2) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) add_key(&(0x7f0000000140)='trusted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="2c08ea5bf9147c324dd1b6b905ed7e6740907064e1a3b20ece82b353e95120f5e8a3d726edbf80e8513e785408f75e4eac6f25b40cf8ec", 0x37, r3) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, r3) keyctl$unlink(0x18, r0, 0xffffffffffffffff) syz_open_dev$dri(&(0x7f0000000080), 0x6, 0x30000) 19:12:02 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001240)={0x2020}, 0x2020) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (async) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) (async) read$FUSE(r0, &(0x7f0000001240)={0x2020}, 0x2020) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (async) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) (async) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)) (async) 19:12:02 executing program 5: ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {0x1}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="f0000007000000002e2f66696c6530005db985849819d286d6c5ceb55e2b54b0f6db8716f742cdf1fcc00969b7114faa714dcd79088e84ce125b440a6f623b653447ad884105f53749cd3ab3d85a8d4e3b9a72963cb557a2bbeecf153936cbf1474203cc4e61f757c6178de384be4b0f1e8b675d60f4777490cd9cce12f354c4318d1611841c92a31f"]) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={'\x00', 0x200, 0x82e, 0x5, 0x2, 0x59, r0}) 19:12:02 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008aec1, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) bind(r0, &(0x7f0000000540)=@rc={0x1f, @any, 0x1}, 0x80) r2 = syz_clone3(&(0x7f00000011c0)={0xe7226000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x24ea, &(0x7f0000000000)={0x0, 0xba4a, 0x2, 0x0, 0x245}, &(0x7f0000000080), &(0x7f00000000c0)=0x0) syz_io_uring_setup(0x3e93, &(0x7f0000000100)={0x0, 0xe22d, 0x280, 0x1, 0x2de}, &(0x7f0000000180), &(0x7f00000001c0)) syz_io_uring_setup(0x72f4, &(0x7f00000005c0)={0x0, 0x7c6, 0x200, 0x3, 0x386}, &(0x7f0000000640)=0x0, &(0x7f0000000680)) r5 = socket$inet(0x2, 0x8, 0x400) syz_io_uring_submit(r4, r3, &(0x7f0000000700)=@IORING_OP_SEND={0x1a, 0xe, 0x0, r5, 0x0, &(0x7f00000006c0)="ad4b1594a38883f625d74af283b074b146b525feb11bb78fba2e1aaf977a7616aa67286757cbd0b0a4e8d2fd6601", 0x2e, 0x800}) syz_clone3(&(0x7f0000000480)={0x800000, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), {0x27}, &(0x7f00000002c0)=""/79, 0x4f, &(0x7f0000000340)=""/216, &(0x7f0000000440)=[r2], 0x1}, 0x58) 19:12:02 executing program 3: setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1, &(0x7f0000000040)=0x3f, 0x4) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) (async) r1 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$unlink(0x9, r1, r2) (async) keyctl$unlink(0x9, r1, r2) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) add_key(&(0x7f0000000140)='trusted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="2c08ea5bf9147c324dd1b6b905ed7e6740907064e1a3b20ece82b353e95120f5e8a3d726edbf80e8513e785408f75e4eac6f25b40cf8ec", 0x37, r3) (async) add_key(&(0x7f0000000140)='trusted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="2c08ea5bf9147c324dd1b6b905ed7e6740907064e1a3b20ece82b353e95120f5e8a3d726edbf80e8513e785408f75e4eac6f25b40cf8ec", 0x37, r3) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, r3) keyctl$unlink(0x18, r0, 0xffffffffffffffff) syz_open_dev$dri(&(0x7f0000000080), 0x6, 0x30000) 19:12:02 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008aec1, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) bind(r0, &(0x7f0000000540)=@rc={0x1f, @any, 0x1}, 0x80) r2 = syz_clone3(&(0x7f00000011c0)={0xe7226000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x24ea, &(0x7f0000000000)={0x0, 0xba4a, 0x2, 0x0, 0x245}, &(0x7f0000000080), &(0x7f00000000c0)=0x0) syz_io_uring_setup(0x3e93, &(0x7f0000000100)={0x0, 0xe22d, 0x280, 0x1, 0x2de}, &(0x7f0000000180), &(0x7f00000001c0)) syz_io_uring_setup(0x72f4, &(0x7f00000005c0)={0x0, 0x7c6, 0x200, 0x3, 0x386}, &(0x7f0000000640)=0x0, &(0x7f0000000680)) r5 = socket$inet(0x2, 0x8, 0x400) syz_io_uring_submit(r4, r3, &(0x7f0000000700)=@IORING_OP_SEND={0x1a, 0xe, 0x0, r5, 0x0, &(0x7f00000006c0)="ad4b1594a38883f625d74af283b074b146b525feb11bb78fba2e1aaf977a7616aa67286757cbd0b0a4e8d2fd6601", 0x2e, 0x800}) syz_clone3(&(0x7f0000000480)={0x800000, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), {0x27}, &(0x7f00000002c0)=""/79, 0x4f, &(0x7f0000000340)=""/216, &(0x7f0000000440)=[r2], 0x1}, 0x58) socket$alg(0x26, 0x5, 0x0) 19:12:02 executing program 3: setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1, &(0x7f0000000040)=0x3f, 0x4) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$unlink(0x9, r1, r2) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) add_key(&(0x7f0000000140)='trusted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="2c08ea5bf9147c324dd1b6b905ed7e6740907064e1a3b20ece82b353e95120f5e8a3d726edbf80e8513e785408f75e4eac6f25b40cf8ec", 0x37, r3) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, r3) keyctl$unlink(0x18, r0, 0xffffffffffffffff) syz_open_dev$dri(&(0x7f0000000080), 0x6, 0x30000) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1, &(0x7f0000000040)=0x3f, 0x4) (async) add_key$keyring(&(0x7f0000000000), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) (async) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) (async) keyctl$unlink(0x9, r1, r2) (async) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) (async) add_key(&(0x7f0000000140)='trusted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="2c08ea5bf9147c324dd1b6b905ed7e6740907064e1a3b20ece82b353e95120f5e8a3d726edbf80e8513e785408f75e4eac6f25b40cf8ec", 0x37, r3) (async) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, r3) (async) keyctl$unlink(0x18, r0, 0xffffffffffffffff) (async) syz_open_dev$dri(&(0x7f0000000080), 0x6, 0x30000) (async) 19:12:02 executing program 3: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$unlink(0x18, r0, 0xfffffffffffffff8) 19:12:02 executing program 3: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) (async) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) (async) keyctl$unlink(0x18, r0, 0xfffffffffffffff8) 19:12:02 executing program 3: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) (async) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$unlink(0x18, r0, 0xfffffffffffffff8) 19:12:02 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="4e31266be69e6d7845c2a6470610942f4f8bd9aa512c718929300d636ed581b8ca0ac6cbfee4ed520d3c6534d377b885064072eca4462cff3d753197a40c7a298ebebdc158de69fa67c0d723509455715e5037580e5502bcb4669f968d30b184c8a5efc7bfc89929c10cbab42ed58a4eebdf6d6896092a1b47a8002940fc534e4dad7eb74e4e1afdd5bcd2fbf730ae29f3774ac9077df15cbfd359109531687ea3ec8a4f7814928a3a6a25cc8e46cc519b1f4d5c3e0e8129b9f73b19", 0xbc, 0xfffffffffffffff8) keyctl$search(0xa, r0, &(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x0}, 0xfffffffffffffffd) 19:12:02 executing program 2: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$unlink(0x18, r0, 0xfffffffffffffff8) 19:12:02 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="4e31266be69e6d7845c2a6470610942f4f8bd9aa512c718929300d636ed581b8ca0ac6cbfee4ed520d3c6534d377b885064072eca4462cff3d753197a40c7a298ebebdc158de69fa67c0d723509455715e5037580e5502bcb4669f968d30b184c8a5efc7bfc89929c10cbab42ed58a4eebdf6d6896092a1b47a8002940fc534e4dad7eb74e4e1afdd5bcd2fbf730ae29f3774ac9077df15cbfd359109531687ea3ec8a4f7814928a3a6a25cc8e46cc519b1f4d5c3e0e8129b9f73b19", 0xbc, 0xfffffffffffffff8) keyctl$search(0xa, r0, &(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x0}, 0xfffffffffffffffd) (async) keyctl$search(0xa, r0, &(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x0}, 0xfffffffffffffffd) 19:12:05 executing program 4: syz_clone3(&(0x7f0000000000)={0xe484c800, 0x0, 0x0, 0x0, {0x1c}, 0x0, 0x0, 0x0, 0x0}, 0x58) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000100)}, 0x20) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0xffffffffffffffff, 0x6ae, 0x18}, 0xc) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000240)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x1}, 0x48) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0), 0x480900, 0x0) accept4$phonet_pipe(r2, &(0x7f0000000300), &(0x7f0000000340)=0x10, 0x800) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000380), 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x4000, r0}, 0x18) 19:12:05 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="4e31266be69e6d7845c2a6470610942f4f8bd9aa512c718929300d636ed581b8ca0ac6cbfee4ed520d3c6534d377b885064072eca4462cff3d753197a40c7a298ebebdc158de69fa67c0d723509455715e5037580e5502bcb4669f968d30b184c8a5efc7bfc89929c10cbab42ed58a4eebdf6d6896092a1b47a8002940fc534e4dad7eb74e4e1afdd5bcd2fbf730ae29f3774ac9077df15cbfd359109531687ea3ec8a4f7814928a3a6a25cc8e46cc519b1f4d5c3e0e8129b9f73b19", 0xbc, 0xfffffffffffffff8) keyctl$search(0xa, r0, &(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x0}, 0xfffffffffffffffd) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="4e31266be69e6d7845c2a6470610942f4f8bd9aa512c718929300d636ed581b8ca0ac6cbfee4ed520d3c6534d377b885064072eca4462cff3d753197a40c7a298ebebdc158de69fa67c0d723509455715e5037580e5502bcb4669f968d30b184c8a5efc7bfc89929c10cbab42ed58a4eebdf6d6896092a1b47a8002940fc534e4dad7eb74e4e1afdd5bcd2fbf730ae29f3774ac9077df15cbfd359109531687ea3ec8a4f7814928a3a6a25cc8e46cc519b1f4d5c3e0e8129b9f73b19", 0xbc, 0xfffffffffffffff8) (async) keyctl$search(0xa, r0, &(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x0}, 0xfffffffffffffffd) (async) 19:12:05 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008aec1, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) bind(r0, &(0x7f0000000540)=@rc={0x1f, @any, 0x1}, 0x80) r2 = syz_clone3(&(0x7f00000011c0)={0xe7226000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x24ea, &(0x7f0000000000)={0x0, 0xba4a, 0x2, 0x0, 0x245}, &(0x7f0000000080), &(0x7f00000000c0)=0x0) syz_io_uring_setup(0x3e93, &(0x7f0000000100)={0x0, 0xe22d, 0x280, 0x1, 0x2de}, &(0x7f0000000180), &(0x7f00000001c0)) syz_io_uring_setup(0x72f4, &(0x7f00000005c0)={0x0, 0x7c6, 0x200, 0x3, 0x386}, &(0x7f0000000640)=0x0, &(0x7f0000000680)) r5 = socket$inet(0x2, 0x8, 0x400) syz_io_uring_submit(r4, r3, &(0x7f0000000700)=@IORING_OP_SEND={0x1a, 0xe, 0x0, r5, 0x0, &(0x7f00000006c0)="ad4b1594a38883f625d74af283b074b146b525feb11bb78fba2e1aaf977a7616aa67286757cbd0b0a4e8d2fd6601", 0x2e, 0x800}) syz_clone3(&(0x7f0000000480)={0x800000, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), {0x27}, &(0x7f00000002c0)=""/79, 0x4f, &(0x7f0000000340)=""/216, &(0x7f0000000440)=[r2], 0x1}, 0x58) socket$alg(0x26, 0x5, 0x0) 19:12:05 executing program 5: ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {0x1}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="f0000007000000002e2f66696c6530005db985849819d286d6c5ceb55e2b54b0f6db8716f742cdf1fcc00969b7114faa714dcd79088e84ce125b440a6f623b653447ad884105f53749cd3ab3d85a8d4e3b9a72963cb557a2bbeecf153936cbf1474203cc4e61f757c6178de384be4b0f1e8b675d60f4777490cd9cce12f354c4318d1611841c92a31f"]) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={'\x00', 0x200, 0x82e, 0x5, 0x2, 0x59, r0}) 19:12:05 executing program 0: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='big_key\x00', 0xfffffffffffffffd, 0x0) 19:12:05 executing program 1: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:12:05 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x36, 0x64, 0x61, 0x63, 0x62, 0x1, 0x63, 0x62, 0x34, 0x39, 0x65, 0x34, 0x5, 0x30, 0x9, 0x30]}, &(0x7f0000000100)={0x0, "58a947a19d546754c229023177c16e00190a6b15b62a6839ec698cf51c02adc563d1e94fe316407c1d89ef32f921bcc0b551541a6bc8984ccef3d9d063fe2f27", 0x1a}, 0x48, 0xfffffffffffffffc) keyctl$unlink(0x18, r1, r0) 19:12:05 executing program 4: syz_clone3(&(0x7f0000000000)={0xe484c800, 0x0, 0x0, 0x0, {0x1c}, 0x0, 0x0, 0x0, 0x0}, 0x58) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000100)}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0xffffffffffffffff, 0x6ae, 0x18}, 0xc) (async) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0xffffffffffffffff, 0x6ae, 0x18}, 0xc) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000240)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x1}, 0x48) openat$full(0xffffffffffffff9c, &(0x7f00000002c0), 0x480900, 0x0) (async) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0), 0x480900, 0x0) accept4$phonet_pipe(r2, &(0x7f0000000300), &(0x7f0000000340)=0x10, 0x800) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, 0x0, 0x0) (async) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000380), 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x4000, r0}, 0x18) 19:12:06 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x36, 0x64, 0x61, 0x63, 0x62, 0x1, 0x63, 0x62, 0x34, 0x39, 0x65, 0x34, 0x5, 0x30, 0x9, 0x30]}, &(0x7f0000000100)={0x0, "58a947a19d546754c229023177c16e00190a6b15b62a6839ec698cf51c02adc563d1e94fe316407c1d89ef32f921bcc0b551541a6bc8984ccef3d9d063fe2f27", 0x1a}, 0x48, 0xfffffffffffffffc) (async) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x36, 0x64, 0x61, 0x63, 0x62, 0x1, 0x63, 0x62, 0x34, 0x39, 0x65, 0x34, 0x5, 0x30, 0x9, 0x30]}, &(0x7f0000000100)={0x0, "58a947a19d546754c229023177c16e00190a6b15b62a6839ec698cf51c02adc563d1e94fe316407c1d89ef32f921bcc0b551541a6bc8984ccef3d9d063fe2f27", 0x1a}, 0x48, 0xfffffffffffffffc) keyctl$unlink(0x18, r1, r0) 19:12:06 executing program 4: syz_clone3(&(0x7f0000000000)={0xe484c800, 0x0, 0x0, 0x0, {0x1c}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async, rerun: 64) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000100)}, 0x20) (async, rerun: 64) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0xffffffffffffffff, 0x6ae, 0x18}, 0xc) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000240)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x1}, 0x48) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0), 0x480900, 0x0) accept4$phonet_pipe(r2, &(0x7f0000000300), &(0x7f0000000340)=0x10, 0x800) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, 0x0, 0x0) (async) openat$cgroup_subtree(r3, &(0x7f0000000380), 0x2, 0x0) (async, rerun: 32) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x4000, r0}, 0x18) (rerun: 32) 19:12:06 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x36, 0x64, 0x61, 0x63, 0x62, 0x1, 0x63, 0x62, 0x34, 0x39, 0x65, 0x34, 0x5, 0x30, 0x9, 0x30]}, &(0x7f0000000100)={0x0, "58a947a19d546754c229023177c16e00190a6b15b62a6839ec698cf51c02adc563d1e94fe316407c1d89ef32f921bcc0b551541a6bc8984ccef3d9d063fe2f27", 0x1a}, 0x48, 0xfffffffffffffffc) keyctl$unlink(0x18, r1, r0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) (async) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x36, 0x64, 0x61, 0x63, 0x62, 0x1, 0x63, 0x62, 0x34, 0x39, 0x65, 0x34, 0x5, 0x30, 0x9, 0x30]}, &(0x7f0000000100)={0x0, "58a947a19d546754c229023177c16e00190a6b15b62a6839ec698cf51c02adc563d1e94fe316407c1d89ef32f921bcc0b551541a6bc8984ccef3d9d063fe2f27", 0x1a}, 0x48, 0xfffffffffffffffc) (async) keyctl$unlink(0x18, r1, r0) (async) 19:12:06 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x220000, 0x0) r0 = semget(0x0, 0x1, 0x20) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) semtimedop(r0, &(0x7f0000000000), 0x0, &(0x7f0000000080)={r1, r2+10000000}) 19:12:06 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$unlink(0x9, r0, 0xfffffffffffffff8) 19:12:06 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$unlink(0x9, r0, 0xfffffffffffffff8) 19:12:06 executing program 2: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080), &(0x7f00000000c0)) socket$inet6_mptcp(0xa, 0x1, 0x106) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:12:06 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) (async) keyctl$unlink(0x9, r0, 0xfffffffffffffff8) 19:12:06 executing program 0: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r3, 0x10000000) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x5, 0x1, 0x3f, 0x9, 0x10, r3, 0x61, '\x00', r2, r4, 0x0, 0x2}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1d, 0x2f, &(0x7f0000000040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_idx_val={0x18, 0x2, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}, @call={0x85, 0x0, 0x0, 0xb}, @map_fd={0x18, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe590}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @generic={0x80, 0x9, 0x1, 0x80, 0xcbf9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000001c0)='GPL\x00', 0x4, 0xef, &(0x7f0000000200)=""/239, 0x41000, 0x4, '\x00', r2, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x1, 0xe, 0x4, 0xfffffffd}, 0x10, 0xffffffffffffffff, 0x0, 0x2, 0x0, &(0x7f0000000380)=[{0x2, 0x1, 0x0, 0x4}, {0x0, 0x4, 0xd, 0x1}], 0x10, 0x2}, 0x90) 19:12:06 executing program 5: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:12:06 executing program 1: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080), &(0x7f00000000c0)) socket$inet6_mptcp(0xa, 0x1, 0x106) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:12:06 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x220000, 0x0) r0 = semget(0x0, 0x1, 0x20) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) semtimedop(r0, &(0x7f0000000000), 0x0, &(0x7f0000000080)={r1, r2+10000000}) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x220000, 0x0) (async) semget(0x0, 0x1, 0x20) (async) clock_gettime(0x0, &(0x7f0000000040)) (async) semtimedop(r0, &(0x7f0000000000), 0x0, &(0x7f0000000080)={r1, r2+10000000}) (async) 19:12:06 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r1, &(0x7f0000000440)={&(0x7f0000000340), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x28, r2, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x0) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x10, 0x70bd25, 0x25dfdbfc, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000090}, 0x8000) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) 19:12:06 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r1, &(0x7f0000000440)={&(0x7f0000000340), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x28, r2, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x0) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x10, 0x70bd25, 0x25dfdbfc, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000090}, 0x8000) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) (async) sendmsg$NL802154_CMD_NEW_SEC_KEY(r1, &(0x7f0000000440)={&(0x7f0000000340), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x28, r2, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x0) (async) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x10, 0x70bd25, 0x25dfdbfc, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000090}, 0x8000) (async) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) 19:12:06 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r1, &(0x7f0000000440)={&(0x7f0000000340), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x28, r2, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x0) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x10, 0x70bd25, 0x25dfdbfc, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000090}, 0x8000) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) 19:12:06 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x6, &(0x7f0000000340)=ANY=[@ANYBLOB="18120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000085200000030000000dfbf97bc6f3636628695d127c2aa2fbb7e4743b954d0e428a7cd10f080002bf07fbca7043614701cd1cca9d49bcbc19cc51f1151dda345db71e22d896aea2e1ff811d39e7839d2e70f98a0ea14d5c100769cc4fda97126cad2ce293dac6a266e6659a42aad47e4c5491a71cdf4923e899cd811aabdf9a4cccbd92bece861dec95de261e4ca3347b63ee28e7546dfe5af265dcfa2dd4937cf6780b6278329634befccb271a7d9de3ef3cee67bdaf0881689254e65c9b5fcf222cd2173b670cff247372401ec1154d61b0130c232901b0b8f3c291c327"], &(0x7f0000000040)='syzkaller\x00', 0x7fff, 0x70, &(0x7f0000000080)=""/112, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x6, 0x9, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000180)=[0x1, r0, 0x1], &(0x7f00000001c0)=[{0x4, 0x1, 0xa}, {0x2, 0x3, 0x9, 0x9}, {0x3, 0x3, 0xe, 0x5}, {0x1, 0x2, 0xb, 0x3}, {0x0, 0x3, 0xe, 0x5}, {0x1, 0x5, 0x7, 0xb}, {0x0, 0x3, 0x5, 0x1}], 0x10, 0x4}, 0x90) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$KEYCTL_MOVE(0x1e, 0x0, r1, r2, 0x0) 19:12:06 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x6, &(0x7f0000000340)=ANY=[@ANYBLOB="18120000", @ANYRES32, @ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x7fff, 0x70, &(0x7f0000000080)=""/112, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x6, 0x9, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000180)=[0x1, r0, 0x1], &(0x7f00000001c0)=[{0x4, 0x1, 0xa}, {0x2, 0x3, 0x9, 0x9}, {0x3, 0x3, 0xe, 0x5}, {0x1, 0x2, 0xb, 0x3}, {0x0, 0x3, 0xe, 0x5}, {0x1, 0x5, 0x7, 0xb}, {0x0, 0x3, 0x5, 0x1}], 0x10, 0x4}, 0x90) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$KEYCTL_MOVE(0x1e, 0x0, r1, r2, 0x0) 19:12:06 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x6, &(0x7f0000000340)=ANY=[@ANYBLOB="18120000", @ANYRES32, @ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x7fff, 0x70, &(0x7f0000000080)=""/112, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x6, 0x9, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000180)=[0x1, r0, 0x1], &(0x7f00000001c0)=[{0x4, 0x1, 0xa}, {0x2, 0x3, 0x9, 0x9}, {0x3, 0x3, 0xe, 0x5}, {0x1, 0x2, 0xb, 0x3}, {0x0, 0x3, 0xe, 0x5}, {0x1, 0x5, 0x7, 0xb}, {0x0, 0x3, 0x5, 0x1}], 0x10, 0x4}, 0x90) (async) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) (async) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) (async) keyctl$KEYCTL_MOVE(0x1e, 0x0, r1, r2, 0x0) 19:12:07 executing program 2: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) 19:12:07 executing program 3: r0 = semget(0x1, 0x4, 0x61) semtimedop(r0, &(0x7f0000000400)=[{0x1, 0x101, 0x1800}, {0x3, 0x7fff, 0x1000}, {0x2, 0xdcad}], 0x3, &(0x7f0000000440)={0x77359400}) socketpair(0x1, 0x6, 0x200, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_dccp_int(r1, 0x21, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0x4) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x3, &(0x7f0000000100)=@raw=[@alu={0x4, 0x1, 0xd, 0x692c78b5ed3f7649, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}], &(0x7f0000000140)='GPL\x00', 0xcc0, 0x68, &(0x7f0000000180)=""/104, 0x40f00, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff], &(0x7f0000000280)=[{0x0, 0x5, 0x10, 0x4}], 0x10, 0x101}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{}, &(0x7f00000000c0), &(0x7f0000000380)=r2}, 0x20) 19:12:07 executing program 1: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x220000, 0x0) r0 = semget(0x0, 0x1, 0x20) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) semtimedop(r0, &(0x7f0000000000), 0x0, &(0x7f0000000080)={r1, r2+10000000}) 19:12:07 executing program 5: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:12:07 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x220000, 0x0) (async) r0 = semget(0x0, 0x1, 0x20) (async, rerun: 64) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) (rerun: 64) semtimedop(r0, &(0x7f0000000000), 0x0, &(0x7f0000000080)={r1, r2+10000000}) 19:12:07 executing program 0: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x3, 0x0) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='big_key\x00', 0xfffffffffffffffd, 0x0) 19:12:07 executing program 3: r0 = semget(0x1, 0x4, 0x61) semtimedop(r0, &(0x7f0000000400)=[{0x1, 0x101, 0x1800}, {0x3, 0x7fff, 0x1000}, {0x2, 0xdcad}], 0x3, &(0x7f0000000440)={0x77359400}) socketpair(0x1, 0x6, 0x200, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_dccp_int(r1, 0x21, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0x4) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x3, &(0x7f0000000100)=@raw=[@alu={0x4, 0x1, 0xd, 0x692c78b5ed3f7649, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}], &(0x7f0000000140)='GPL\x00', 0xcc0, 0x68, &(0x7f0000000180)=""/104, 0x40f00, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff], &(0x7f0000000280)=[{0x0, 0x5, 0x10, 0x4}], 0x10, 0x101}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{}, &(0x7f00000000c0), &(0x7f0000000380)=r2}, 0x20) semget(0x1, 0x4, 0x61) (async) semtimedop(r0, &(0x7f0000000400)=[{0x1, 0x101, 0x1800}, {0x3, 0x7fff, 0x1000}, {0x2, 0xdcad}], 0x3, &(0x7f0000000440)={0x77359400}) (async) socketpair(0x1, 0x6, 0x200, &(0x7f0000000000)) (async) getsockopt$inet_dccp_int(r1, 0x21, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0x4) (async) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x3, &(0x7f0000000100)=@raw=[@alu={0x4, 0x1, 0xd, 0x692c78b5ed3f7649, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}], &(0x7f0000000140)='GPL\x00', 0xcc0, 0x68, &(0x7f0000000180)=""/104, 0x40f00, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff], &(0x7f0000000280)=[{0x0, 0x5, 0x10, 0x4}], 0x10, 0x101}, 0x90) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{}, &(0x7f00000000c0), &(0x7f0000000380)=r2}, 0x20) (async) 19:12:07 executing program 2: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) 19:12:07 executing program 2: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) 19:12:07 executing program 3: r0 = semget(0x1, 0x4, 0x61) semtimedop(r0, &(0x7f0000000400)=[{0x1, 0x101, 0x1800}, {0x3, 0x7fff, 0x1000}, {0x2, 0xdcad}], 0x3, &(0x7f0000000440)={0x77359400}) socketpair(0x1, 0x6, 0x200, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_dccp_int(r1, 0x21, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0x4) (async) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x3, &(0x7f0000000100)=@raw=[@alu={0x4, 0x1, 0xd, 0x692c78b5ed3f7649, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}], &(0x7f0000000140)='GPL\x00', 0xcc0, 0x68, &(0x7f0000000180)=""/104, 0x40f00, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff], &(0x7f0000000280)=[{0x0, 0x5, 0x10, 0x4}], 0x10, 0x101}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{}, &(0x7f00000000c0), &(0x7f0000000380)=r2}, 0x20) 19:12:07 executing program 2: add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) 19:12:07 executing program 3: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x200, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x1) 19:12:07 executing program 2: add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) 19:12:07 executing program 3: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) (async) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x200, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x1) 19:12:07 executing program 1: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:12:07 executing program 5: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:12:07 executing program 2: add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) 19:12:07 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6014000, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:12:07 executing program 3: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x200, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x1) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) (async) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x200, 0x0) (async) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x1) (async) 19:12:07 executing program 0: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x3, 0x0) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$search(0xa, r0, &(0x7f00000000c0)='big_key\x00', 0xfffffffffffffffd, 0x0) 19:12:07 executing program 3: r0 = add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="137f9f8fe9f681be93e95793cbd537165ecb9cefd66557644157af536a5eab0366b8813076800f8dc7ec5895f5c00c45686bd57108f35c46c8c01d1a89fe78aed47d2898df51a3e949358fa3003f7bac79cb45d517f65434c096a4e829cc40d9fa5db527669112923667dd8aa5d55385beb2218b6a69e85a0276b42215f36519e6cd034636527e30278521dafac3c3b712f4ba0d5148bdeaa288808f081092b2c4992c9ff7ed0a4a286db45b", 0xac, 0xfffffffffffffffb) keyctl$unlink(0x18, 0x0, r0) 19:12:07 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6014000, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:12:07 executing program 2: add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) 19:12:07 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6014000, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_clone3(&(0x7f00000011c0)={0xf6014000, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) 19:12:07 executing program 3: r0 = add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="137f9f8fe9f681be93e95793cbd537165ecb9cefd66557644157af536a5eab0366b8813076800f8dc7ec5895f5c00c45686bd57108f35c46c8c01d1a89fe78aed47d2898df51a3e949358fa3003f7bac79cb45d517f65434c096a4e829cc40d9fa5db527669112923667dd8aa5d55385beb2218b6a69e85a0276b42215f36519e6cd034636527e30278521dafac3c3b712f4ba0d5148bdeaa288808f081092b2c4992c9ff7ed0a4a286db45b", 0xac, 0xfffffffffffffffb) keyctl$unlink(0x18, 0x0, r0) add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="137f9f8fe9f681be93e95793cbd537165ecb9cefd66557644157af536a5eab0366b8813076800f8dc7ec5895f5c00c45686bd57108f35c46c8c01d1a89fe78aed47d2898df51a3e949358fa3003f7bac79cb45d517f65434c096a4e829cc40d9fa5db527669112923667dd8aa5d55385beb2218b6a69e85a0276b42215f36519e6cd034636527e30278521dafac3c3b712f4ba0d5148bdeaa288808f081092b2c4992c9ff7ed0a4a286db45b", 0xac, 0xfffffffffffffffb) (async) keyctl$unlink(0x18, 0x0, r0) (async) 19:12:07 executing program 2: add_key(&(0x7f0000000000)='asymmetric\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) 19:12:08 executing program 1: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080), &(0x7f00000000c0)) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:12:08 executing program 5: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x3, 0x0) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0x0) keyctl$search(0xa, r0, &(0x7f00000000c0)='big_key\x00', 0xfffffffffffffffd, 0x0) 19:12:08 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) 19:12:08 executing program 3: r0 = add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="137f9f8fe9f681be93e95793cbd537165ecb9cefd66557644157af536a5eab0366b8813076800f8dc7ec5895f5c00c45686bd57108f35c46c8c01d1a89fe78aed47d2898df51a3e949358fa3003f7bac79cb45d517f65434c096a4e829cc40d9fa5db527669112923667dd8aa5d55385beb2218b6a69e85a0276b42215f36519e6cd034636527e30278521dafac3c3b712f4ba0d5148bdeaa288808f081092b2c4992c9ff7ed0a4a286db45b", 0xac, 0xfffffffffffffffb) keyctl$unlink(0x18, 0x0, r0) (async) keyctl$unlink(0x18, 0x0, r0) 19:12:08 executing program 2: add_key(&(0x7f0000000000)='asymmetric\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) 19:12:08 executing program 0: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x3, 0x0) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$search(0xa, r0, &(0x7f00000000c0)='big_key\x00', 0xfffffffffffffffd, 0x0) 19:12:08 executing program 2: add_key(&(0x7f0000000000)='asymmetric\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) 19:12:08 executing program 3: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) keyctl$unlink(0x18, r0, 0xffffffffffffffff) 19:12:08 executing program 1: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080), &(0x7f00000000c0)) socket$inet6_mptcp(0xa, 0x1, 0x106) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:12:08 executing program 2: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x3, 0x0) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f00000000c0)='big_key\x00', 0xfffffffffffffffd, r1) 19:12:08 executing program 3: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) keyctl$unlink(0x18, r0, 0xffffffffffffffff) (async) keyctl$unlink(0x18, r0, 0xffffffffffffffff) 19:12:08 executing program 3: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) keyctl$unlink(0x18, r0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) keyctl$unlink(0x18, r0, 0xffffffffffffffff) (async) 19:12:08 executing program 3: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$unlink(0x18, r4, r1) 19:12:09 executing program 5: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) 19:12:09 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) (async) openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) 19:12:09 executing program 3: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) (async) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) (async) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) (async) r4 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r4) (async) keyctl$unlink(0x18, r4, r1) 19:12:09 executing program 0: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_io_uring_submit(r0, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x58) 19:12:09 executing program 2: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x3, 0x0) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f00000000c0)='big_key\x00', 0xfffffffffffffffd, r2) keyctl$reject(0x13, r0, 0x124ac10c, 0x2, r1) 19:12:09 executing program 1: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_io_uring_submit(r0, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) r2 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r2, 0x0, 0x0], 0x9}, 0x58) r3 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r3, 0x0, 0x0], 0x9}, 0x58) 19:12:09 executing program 3: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) (async) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$unlink(0x18, r4, r1) 19:12:09 executing program 3: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "ed4833c83e25b2e5c1ad6a6d8ce7c3bd5ae450acdcde06efa9af955fbdd6e98b848dba39b9b62867d4f50a0fc5288bcb5edb7d8b9f5aaafcd1b04fc1ddfce688", 0x19}, 0x48, r1) keyctl$unlink(0x18, r2, r3) 19:12:09 executing program 3: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) (async) r2 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "ed4833c83e25b2e5c1ad6a6d8ce7c3bd5ae450acdcde06efa9af955fbdd6e98b848dba39b9b62867d4f50a0fc5288bcb5edb7d8b9f5aaafcd1b04fc1ddfce688", 0x19}, 0x48, r1) (async) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "ed4833c83e25b2e5c1ad6a6d8ce7c3bd5ae450acdcde06efa9af955fbdd6e98b848dba39b9b62867d4f50a0fc5288bcb5edb7d8b9f5aaafcd1b04fc1ddfce688", 0x19}, 0x48, r1) keyctl$unlink(0x18, r2, r3) 19:12:09 executing program 3: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) (async) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "ed4833c83e25b2e5c1ad6a6d8ce7c3bd5ae450acdcde06efa9af955fbdd6e98b848dba39b9b62867d4f50a0fc5288bcb5edb7d8b9f5aaafcd1b04fc1ddfce688", 0x19}, 0x48, r1) keyctl$unlink(0x18, r2, r3) 19:12:09 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) keyctl$negate(0xd, 0x0, 0x8000000000000001, 0xfffffffffffffffd) 19:12:09 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) keyctl$negate(0xd, 0x0, 0x8000000000000001, 0xfffffffffffffffd) 19:12:09 executing program 5: r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) r3 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r3, 0x0, 0x0], 0x9}, 0x58) r4 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r4, 0x0, 0x0], 0x9}, 0x58) syz_clone3(&(0x7f00000005c0)={0x20000400, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400), {0x1e}, &(0x7f0000000440)=""/237, 0xed, &(0x7f0000000540)=""/42, &(0x7f0000000580)=[r0, r0, r0, 0xffffffffffffffff, r0], 0x5}, 0x58) 19:12:09 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) keyctl$negate(0xd, 0x0, 0x8000000000000001, 0xfffffffffffffffd) 19:12:09 executing program 2: r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) r3 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r3, 0x0, 0x0], 0x9}, 0x58) r4 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r4, 0x0, 0x0], 0x9}, 0x58) syz_clone3(&(0x7f00000005c0)={0x20000400, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400), {0x1e}, &(0x7f0000000440)=""/237, 0xed, &(0x7f0000000540)=""/42, &(0x7f0000000580)=[r0, r0, r0, 0xffffffffffffffff, r0], 0x5}, 0x58) 19:12:09 executing program 0: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_io_uring_submit(r0, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) r2 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r2, 0x0, 0x0], 0x9}, 0x58) r3 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r3, 0x0, 0x0], 0x9}, 0x58) 19:12:09 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) (async) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) 19:12:09 executing program 1: r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) r3 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r3, 0x0, 0x0], 0x9}, 0x58) r4 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r4, 0x0, 0x0], 0x9}, 0x58) r5 = syz_clone3(&(0x7f00000005c0)={0x20000400, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400), {0x1e}, &(0x7f0000000440)=""/237, 0xed, &(0x7f0000000540)=""/42, &(0x7f0000000580)=[r0, r0, r0, 0xffffffffffffffff, r0], 0x5}, 0x58) syz_clone3(&(0x7f0000000680)={0x21000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0x37}, &(0x7f0000000280)=""/171, 0xab, &(0x7f0000000340)=""/42, &(0x7f0000000640)=[r0, r0, r3, r4, r5], 0x5}, 0x58) 19:12:09 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) setsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, &(0x7f0000000000)=0x1, 0x4) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) getsockopt$PNPIPE_INITSTATE(r1, 0x113, 0x4, &(0x7f0000000140), &(0x7f0000000180)=0x4) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$unlink(0x18, r2, 0xfffffffffffffffa) r3 = mq_open(&(0x7f0000000040)='\x00', 0x40, 0xc0, &(0x7f0000000080)={0x6, 0x3, 0x5, 0xffffffff00000001}) mq_getsetattr(r3, &(0x7f00000000c0)={0x1, 0x0, 0x9, 0xfff}, &(0x7f0000000100)) 19:12:10 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) setsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, &(0x7f0000000000)=0x1, 0x4) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) getsockopt$PNPIPE_INITSTATE(r1, 0x113, 0x4, &(0x7f0000000140), &(0x7f0000000180)=0x4) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$unlink(0x18, r2, 0xfffffffffffffffa) r3 = mq_open(&(0x7f0000000040)='\x00', 0x40, 0xc0, &(0x7f0000000080)={0x6, 0x3, 0x5, 0xffffffff00000001}) mq_getsetattr(r3, &(0x7f00000000c0)={0x1, 0x0, 0x9, 0xfff}, &(0x7f0000000100)) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (async) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) (async) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) (async) setsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, &(0x7f0000000000)=0x1, 0x4) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (async) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) (async) getsockopt$PNPIPE_INITSTATE(r1, 0x113, 0x4, &(0x7f0000000140), &(0x7f0000000180)=0x4) (async) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) (async) keyctl$unlink(0x18, r2, 0xfffffffffffffffa) (async) mq_open(&(0x7f0000000040)='\x00', 0x40, 0xc0, &(0x7f0000000080)={0x6, 0x3, 0x5, 0xffffffff00000001}) (async) mq_getsetattr(r3, &(0x7f00000000c0)={0x1, 0x0, 0x9, 0xfff}, &(0x7f0000000100)) (async) 19:12:10 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) setsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, &(0x7f0000000000)=0x1, 0x4) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) getsockopt$PNPIPE_INITSTATE(r1, 0x113, 0x4, &(0x7f0000000140), &(0x7f0000000180)=0x4) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$unlink(0x18, r2, 0xfffffffffffffffa) r3 = mq_open(&(0x7f0000000040)='\x00', 0x40, 0xc0, &(0x7f0000000080)={0x6, 0x3, 0x5, 0xffffffff00000001}) mq_getsetattr(r3, &(0x7f00000000c0)={0x1, 0x0, 0x9, 0xfff}, &(0x7f0000000100)) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (async) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) (async) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) (async) setsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, &(0x7f0000000000)=0x1, 0x4) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (async) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) (async) getsockopt$PNPIPE_INITSTATE(r1, 0x113, 0x4, &(0x7f0000000140), &(0x7f0000000180)=0x4) (async) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) (async) keyctl$unlink(0x18, r2, 0xfffffffffffffffa) (async) mq_open(&(0x7f0000000040)='\x00', 0x40, 0xc0, &(0x7f0000000080)={0x6, 0x3, 0x5, 0xffffffff00000001}) (async) mq_getsetattr(r3, &(0x7f00000000c0)={0x1, 0x0, 0x9, 0xfff}, &(0x7f0000000100)) (async) 19:12:10 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x3ff}, 0xc) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001200)={0xffffffffffffffff, 0x7, 0x18}, 0xc) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001380)={r1, 0xffffffffffffffff}, 0x4) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) read$FUSE(r1, &(0x7f0000001700)={0x2020}, 0x2020) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, 0x0, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001640)=@bpf_tracing={0x1a, 0xb, &(0x7f00000013c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7356, 0x0, 0x0, 0x0, 0x8}, [@generic={0x4, 0x8, 0x3, 0x3, 0x8}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x1}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @exit]}, &(0x7f0000001440)='GPL\x00', 0x5, 0xb2, &(0x7f0000001480)=""/178, 0x41000, 0x65, '\x00', 0x0, 0x17, r1, 0x8, &(0x7f0000001540)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000001580)={0x5, 0x3, 0x6, 0x8fca}, 0x10, 0x22fb4, r4, 0x6, 0x0, &(0x7f00000015c0)=[{0x2, 0x5, 0x2, 0xb}, {0x5, 0x3, 0x7, 0xc}, {0x1, 0x2, 0xe, 0x1}, {0x3, 0x3, 0xe, 0x2}, {0x3, 0x1, 0x6, 0x2}, {0x1, 0x2, 0xf, 0x3}], 0x10, 0xf6a3}, 0x90) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x11, 0x28, &(0x7f0000000040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x900}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @printk={@integer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x168}}, @ldst={0x2, 0x0, 0x3, 0x7, 0x9, 0x1, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @ringbuf_query, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @ringbuf_query, @alu={0x4, 0x1, 0x1, 0x1, 0x3, 0x2, 0x8}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000011c0)={0xa, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000001240)=[r2], &(0x7f0000001280)=[{0x0, 0x4, 0x10, 0xb}, {0x5, 0x1, 0x3, 0x4}, {0x5, 0x3, 0xb, 0x6}], 0x10, 0x3}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000003780)=@o_path={&(0x7f0000003740)='./file0\x00', 0x0, 0x0, r5}, 0x18) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) 19:12:10 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x3ff}, 0xc) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001200)={0xffffffffffffffff, 0x7, 0x18}, 0xc) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001380)={r1, 0xffffffffffffffff}, 0x4) (async) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) read$FUSE(r1, &(0x7f0000001700)={0x2020}, 0x2020) (async) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, 0x0, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001640)=@bpf_tracing={0x1a, 0xb, &(0x7f00000013c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7356, 0x0, 0x0, 0x0, 0x8}, [@generic={0x4, 0x8, 0x3, 0x3, 0x8}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x1}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @exit]}, &(0x7f0000001440)='GPL\x00', 0x5, 0xb2, &(0x7f0000001480)=""/178, 0x41000, 0x65, '\x00', 0x0, 0x17, r1, 0x8, &(0x7f0000001540)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000001580)={0x5, 0x3, 0x6, 0x8fca}, 0x10, 0x22fb4, r4, 0x6, 0x0, &(0x7f00000015c0)=[{0x2, 0x5, 0x2, 0xb}, {0x5, 0x3, 0x7, 0xc}, {0x1, 0x2, 0xe, 0x1}, {0x3, 0x3, 0xe, 0x2}, {0x3, 0x1, 0x6, 0x2}, {0x1, 0x2, 0xf, 0x3}], 0x10, 0xf6a3}, 0x90) (async) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x11, 0x28, &(0x7f0000000040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x900}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @printk={@integer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x168}}, @ldst={0x2, 0x0, 0x3, 0x7, 0x9, 0x1, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @ringbuf_query, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @ringbuf_query, @alu={0x4, 0x1, 0x1, 0x1, 0x3, 0x2, 0x8}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000011c0)={0xa, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000001240)=[r2], &(0x7f0000001280)=[{0x0, 0x4, 0x10, 0xb}, {0x5, 0x1, 0x3, 0x4}, {0x5, 0x3, 0xb, 0x6}], 0x10, 0x3}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000003780)=@o_path={&(0x7f0000003740)='./file0\x00', 0x0, 0x0, r5}, 0x18) (async) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) 19:12:10 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x3ff}, 0xc) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001200)={0xffffffffffffffff, 0x7, 0x18}, 0xc) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001380)={r1, 0xffffffffffffffff}, 0x4) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) read$FUSE(r1, &(0x7f0000001700)={0x2020}, 0x2020) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, 0x0, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001640)=@bpf_tracing={0x1a, 0xb, &(0x7f00000013c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7356, 0x0, 0x0, 0x0, 0x8}, [@generic={0x4, 0x8, 0x3, 0x3, 0x8}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x1}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @exit]}, &(0x7f0000001440)='GPL\x00', 0x5, 0xb2, &(0x7f0000001480)=""/178, 0x41000, 0x65, '\x00', 0x0, 0x17, r1, 0x8, &(0x7f0000001540)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000001580)={0x5, 0x3, 0x6, 0x8fca}, 0x10, 0x22fb4, r4, 0x6, 0x0, &(0x7f00000015c0)=[{0x2, 0x5, 0x2, 0xb}, {0x5, 0x3, 0x7, 0xc}, {0x1, 0x2, 0xe, 0x1}, {0x3, 0x3, 0xe, 0x2}, {0x3, 0x1, 0x6, 0x2}, {0x1, 0x2, 0xf, 0x3}], 0x10, 0xf6a3}, 0x90) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x11, 0x28, &(0x7f0000000040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x900}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @printk={@integer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x168}}, @ldst={0x2, 0x0, 0x3, 0x7, 0x9, 0x1, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @ringbuf_query, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @ringbuf_query, @alu={0x4, 0x1, 0x1, 0x1, 0x3, 0x2, 0x8}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000011c0)={0xa, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000001240)=[r2], &(0x7f0000001280)=[{0x0, 0x4, 0x10, 0xb}, {0x5, 0x1, 0x3, 0x4}, {0x5, 0x3, 0xb, 0x6}], 0x10, 0x3}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000003780)=@o_path={&(0x7f0000003740)='./file0\x00', 0x0, 0x0, r5}, 0x18) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x3ff}, 0xc) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (async) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001200)={0xffffffffffffffff, 0x7, 0x18}, 0xc) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001380)={r1}, 0x4) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (async) read$FUSE(r1, &(0x7f0000001700)={0x2020}, 0x2020) (async) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, 0x0, 0x0) (async) socket$inet6_mptcp(0xa, 0x1, 0x106) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001640)=@bpf_tracing={0x1a, 0xb, &(0x7f00000013c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7356, 0x0, 0x0, 0x0, 0x8}, [@generic={0x4, 0x8, 0x3, 0x3, 0x8}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x1}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @exit]}, &(0x7f0000001440)='GPL\x00', 0x5, 0xb2, &(0x7f0000001480)=""/178, 0x41000, 0x65, '\x00', 0x0, 0x17, r1, 0x8, &(0x7f0000001540)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000001580)={0x5, 0x3, 0x6, 0x8fca}, 0x10, 0x22fb4, r4, 0x6, 0x0, &(0x7f00000015c0)=[{0x2, 0x5, 0x2, 0xb}, {0x5, 0x3, 0x7, 0xc}, {0x1, 0x2, 0xe, 0x1}, {0x3, 0x3, 0xe, 0x2}, {0x3, 0x1, 0x6, 0x2}, {0x1, 0x2, 0xf, 0x3}], 0x10, 0xf6a3}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x11, 0x28, &(0x7f0000000040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x900}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @printk={@integer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x168}}, @ldst={0x2, 0x0, 0x3, 0x7, 0x9, 0x1, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @ringbuf_query, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @ringbuf_query, @alu={0x4, 0x1, 0x1, 0x1, 0x3, 0x2, 0x8}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000011c0)={0xa, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000001240)=[r2], &(0x7f0000001280)=[{0x0, 0x4, 0x10, 0xb}, {0x5, 0x1, 0x3, 0x4}, {0x5, 0x3, 0xb, 0x6}], 0x10, 0x3}, 0x90) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000003780)=@o_path={&(0x7f0000003740)='./file0\x00', 0x0, 0x0, r5}, 0x18) (async) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) 19:12:10 executing program 5: r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) r3 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r3, 0x0, 0x0], 0x9}, 0x58) r4 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r4, 0x0, 0x0], 0x9}, 0x58) r5 = syz_clone3(&(0x7f00000005c0)={0x20000400, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400), {0x1e}, &(0x7f0000000440)=""/237, 0xed, &(0x7f0000000540)=""/42, &(0x7f0000000580)=[r0, r0, r0, 0xffffffffffffffff, r0], 0x5}, 0x58) syz_clone3(&(0x7f0000000680)={0x21000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0x37}, &(0x7f0000000280)=""/171, 0xab, &(0x7f0000000340)=""/42, &(0x7f0000000640)=[r0, r0, r3, r4, r5], 0x5}, 0x58) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x7, 0x0, 0x0) 19:12:10 executing program 4: syz_clone3(&(0x7f0000000000)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f20941f73c13c51cb5da06953693bde521389dbe457e1c1bbee63e5d7d663df85565b5df91e00fc6bab2ee756e9b56bc900820d0d7f4dd2982026938da2cb9c4", 0x37}, 0x48, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x61, 0x32, 0x63, 0x65, 0x65, 0x65, 0x32, 0x37, 0x63, 0x33, 0x64, 0x33, 0x33, 0x30, 0x36, 0x37]}, &(0x7f0000000100)={0x0, "ddde2917410d269374a98adfdd1835ba54970e66a76eacd509e38849d66d533488dda8129a9bd48f9ddaffcfb1d61b5ba4a0fd523ac2e630311105338bd39a82", 0x18}, 0x48, r0) r2 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc4}, &(0x7f0000000340)={0x0, "7fa90ba4aee1a3e105f1fa90dd096ad1ad71e2b93f1c9c5c9bba28d98dd78236282189e9827fd5708a46a3a556c3c4d2709c45aab43340fdfa3c77eb7af720a6", 0x36}, 0x48, r2) 19:12:10 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x224001, 0x0) keyctl$link(0x8, 0x0, r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$negate(0xd, r1, 0x800, r0) 19:12:10 executing program 0: r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) r3 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r3, 0x0, 0x0], 0x9}, 0x58) r4 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r4, 0x0, 0x0], 0x9}, 0x58) r5 = syz_clone3(&(0x7f00000005c0)={0x20000400, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400), {0x1e}, &(0x7f0000000440)=""/237, 0xed, &(0x7f0000000540)=""/42, &(0x7f0000000580)=[r0, r0, r0, 0xffffffffffffffff, r0], 0x5}, 0x58) syz_clone3(&(0x7f0000000680)={0x21000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0x37}, &(0x7f0000000280)=""/171, 0xab, &(0x7f0000000340)=""/42, &(0x7f0000000640)=[r0, r0, r3, r4, r5], 0x5}, 0x58) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x7, 0x0, 0x0) 19:12:10 executing program 2: r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) r3 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r3, 0x0, 0x0], 0x9}, 0x58) r4 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r4, 0x0, 0x0], 0x9}, 0x58) r5 = syz_clone3(&(0x7f00000005c0)={0x20000400, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400), {0x1e}, &(0x7f0000000440)=""/237, 0xed, &(0x7f0000000540)=""/42, &(0x7f0000000580)=[r0, r0, r0, 0xffffffffffffffff, r0], 0x5}, 0x58) syz_clone3(&(0x7f0000000680)={0x21000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0x37}, &(0x7f0000000280)=""/171, 0xab, &(0x7f0000000340)=""/42, &(0x7f0000000640)=[r0, r0, r3, r4, r5], 0x5}, 0x58) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x7, 0x0, 0x0) 19:12:10 executing program 1: r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) r3 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r3, 0x0, 0x0], 0x9}, 0x58) r4 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r4, 0x0, 0x0], 0x9}, 0x58) r5 = syz_clone3(&(0x7f00000005c0)={0x20000400, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400), {0x1e}, &(0x7f0000000440)=""/237, 0xed, &(0x7f0000000540)=""/42, &(0x7f0000000580)=[r0, r0, r0, 0xffffffffffffffff, r0], 0x5}, 0x58) syz_clone3(&(0x7f0000000680)={0x21000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0x37}, &(0x7f0000000280)=""/171, 0xab, &(0x7f0000000340)=""/42, &(0x7f0000000640)=[r0, r0, r3, r4, r5], 0x5}, 0x58) 19:12:10 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async, rerun: 32) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) (rerun: 32) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x224001, 0x0) keyctl$link(0x8, 0x0, r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$negate(0xd, r1, 0x800, r0) 19:12:10 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x224001, 0x0) keyctl$link(0x8, 0x0, r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$negate(0xd, r1, 0x800, r0) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) (async) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x224001, 0x0) (async) keyctl$link(0x8, 0x0, r0) (async) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) (async) keyctl$negate(0xd, r1, 0x800, r0) (async) 19:12:11 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) getsockopt$inet6_mptcp_buf(0xffffffffffffffff, 0x11c, 0x1, &(0x7f0000000100)=""/180, &(0x7f00000001c0)=0xb4) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r1, 0x1) 19:12:11 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) getsockopt$inet6_mptcp_buf(0xffffffffffffffff, 0x11c, 0x1, &(0x7f0000000100)=""/180, &(0x7f00000001c0)=0xb4) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r1, 0x1) (async) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r1, 0x1) 19:12:11 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) getsockopt$inet6_mptcp_buf(0xffffffffffffffff, 0x11c, 0x1, &(0x7f0000000100)=""/180, &(0x7f00000001c0)=0xb4) (async) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r1, 0x1) 19:12:11 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$negate(0xd, 0x0, 0x7, r0) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$unlink(0x9, r1, r0) 19:12:11 executing program 5: syz_clone3(&(0x7f0000000000)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f20941f73c13c51cb5da06953693bde521389dbe457e1c1bbee63e5d7d663df85565b5df91e00fc6bab2ee756e9b56bc900820d0d7f4dd2982026938da2cb9c4", 0x37}, 0x48, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x61, 0x32, 0x63, 0x65, 0x65, 0x65, 0x32, 0x37, 0x63, 0x33, 0x64, 0x33, 0x33, 0x30, 0x36, 0x37]}, &(0x7f0000000100)={0x0, "ddde2917410d269374a98adfdd1835ba54970e66a76eacd509e38849d66d533488dda8129a9bd48f9ddaffcfb1d61b5ba4a0fd523ac2e630311105338bd39a82", 0x18}, 0x48, r0) r2 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc4}, &(0x7f0000000340)={0x0, "7fa90ba4aee1a3e105f1fa90dd096ad1ad71e2b93f1c9c5c9bba28d98dd78236282189e9827fd5708a46a3a556c3c4d2709c45aab43340fdfa3c77eb7af720a6", 0x36}, 0x48, r2) 19:12:11 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) (async) keyctl$negate(0xd, 0x0, 0x7, r0) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) (async) keyctl$unlink(0x9, r1, r0) 19:12:11 executing program 4: syz_clone3(&(0x7f0000000000)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f20941f73c13c51cb5da06953693bde521389dbe457e1c1bbee63e5d7d663df85565b5df91e00fc6bab2ee756e9b56bc900820d0d7f4dd2982026938da2cb9c4", 0x37}, 0x48, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) (async) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x61, 0x32, 0x63, 0x65, 0x65, 0x65, 0x32, 0x37, 0x63, 0x33, 0x64, 0x33, 0x33, 0x30, 0x36, 0x37]}, &(0x7f0000000100)={0x0, "ddde2917410d269374a98adfdd1835ba54970e66a76eacd509e38849d66d533488dda8129a9bd48f9ddaffcfb1d61b5ba4a0fd523ac2e630311105338bd39a82", 0x18}, 0x48, r0) r2 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc4}, &(0x7f0000000340)={0x0, "7fa90ba4aee1a3e105f1fa90dd096ad1ad71e2b93f1c9c5c9bba28d98dd78236282189e9827fd5708a46a3a556c3c4d2709c45aab43340fdfa3c77eb7af720a6", 0x36}, 0x48, r2) 19:12:11 executing program 0: r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) r3 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r3, 0x0, 0x0], 0x9}, 0x58) r4 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r4, 0x0, 0x0], 0x9}, 0x58) r5 = syz_clone3(&(0x7f00000005c0)={0x20000400, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400), {0x1e}, &(0x7f0000000440)=""/237, 0xed, &(0x7f0000000540)=""/42, &(0x7f0000000580)=[r0, r0, r0, 0xffffffffffffffff, r0], 0x5}, 0x58) syz_clone3(&(0x7f0000000680)={0x21000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0x37}, &(0x7f0000000280)=""/171, 0xab, &(0x7f0000000340)=""/42, &(0x7f0000000640)=[r0, r0, r3, r4, r5], 0x5}, 0x58) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x7, 0x0, 0x0) 19:12:11 executing program 2: r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x886, &(0x7f0000000000)={0x0, 0x103e, 0x40, 0x2, 0x7e}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000100)=@phonet={0x23, 0x0, 0xca, 0x9}}) r3 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r3, 0x0, 0x0], 0x9}, 0x58) r4 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r4, 0x0, 0x0], 0x9}, 0x58) r5 = syz_clone3(&(0x7f00000005c0)={0x20000400, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400), {0x1e}, &(0x7f0000000440)=""/237, 0xed, &(0x7f0000000540)=""/42, &(0x7f0000000580)=[r0, r0, r0, 0xffffffffffffffff, r0], 0x5}, 0x58) syz_clone3(&(0x7f0000000680)={0x21000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0x37}, &(0x7f0000000280)=""/171, 0xab, &(0x7f0000000340)=""/42, &(0x7f0000000640)=[r0, r0, r3, r4, r5], 0x5}, 0x58) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x7, 0x0, 0x0) 19:12:11 executing program 1: add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) (fail_nth: 1) 19:12:11 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) (async) keyctl$negate(0xd, 0x0, 0x7, r0) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) (async) keyctl$unlink(0x9, r1, r0) 19:12:11 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) [ 2391.820073][ T6582] FAULT_INJECTION: forcing a failure. [ 2391.820073][ T6582] name fail_usercopy, interval 1, probability 0, space 0, times 0 19:12:11 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) [ 2391.928234][ T6582] CPU: 0 PID: 6582 Comm: syz-executor.1 Not tainted 5.15.138-syzkaller #0 [ 2391.936783][ T6582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2391.946886][ T6582] Call Trace: [ 2391.950184][ T6582] [ 2391.953139][ T6582] dump_stack_lvl+0x1e3/0x2cb [ 2391.957876][ T6582] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2391.963565][ T6582] ? panic+0x84d/0x84d [ 2391.967711][ T6582] should_fail+0x38a/0x4c0 [ 2391.972159][ T6582] strncpy_from_user+0x32/0x370 [ 2391.977050][ T6582] __se_sys_add_key+0xd5/0x480 [ 2391.981842][ T6582] ? __x64_sys_add_key+0xc0/0xc0 [ 2391.986805][ T6582] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2391.992817][ T6582] ? lockdep_hardirqs_on+0x94/0x130 [ 2391.998045][ T6582] ? __x64_sys_add_key+0x1c/0xc0 [ 2392.003009][ T6582] do_syscall_64+0x3d/0xb0 [ 2392.007450][ T6582] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2392.013370][ T6582] RIP: 0033:0x7fcc6920bae9 [ 2392.017804][ T6582] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2392.037429][ T6582] RSP: 002b:00007fcc6778d0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 2392.045874][ T6582] RAX: ffffffffffffffda RBX: 00007fcc6932af80 RCX: 00007fcc6920bae9 [ 2392.053863][ T6582] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000000 [ 2392.061850][ T6582] RBP: 00007fcc6778d120 R08: fffffffffffffff8 R09: 0000000000000000 [ 2392.069841][ T6582] R10: 000000000000003f R11: 0000000000000246 R12: 0000000000000001 19:12:12 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) [ 2392.077827][ T6582] R13: 000000000000000b R14: 00007fcc6932af80 R15: 00007ffc30905548 [ 2392.085919][ T6582] 19:12:12 executing program 3: getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) socketpair(0x26, 0xe, 0x5, &(0x7f0000000380)={0xffffffffffffffff}) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e23}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x4c810) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r2, 0x10000000) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x5, 0x1, 0x3f, 0x9, 0x10, r2, 0x61, '\x00', r0, r3, 0x0, 0x2}, 0x48) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, 0x0, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, 0x0, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x7, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r7, 0x114, 0x7, 0x0, 0x0) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r8, 0x114, 0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1a, 0x4, &(0x7f00000000c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xb, 0x4, 0x7, 0x30, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0x7}], &(0x7f0000000100)='GPL\x00', 0x7fff, 0x51, &(0x7f0000000140)=""/81, 0x41100, 0x8, '\x00', r0, 0x30, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8, &(0x7f0000000200)=[r4, r5, r6, r7, 0x1, r8], &(0x7f0000000240)=[{0x3, 0x5, 0xc, 0x6}, {0x0, 0x5, 0xd, 0x2}, {0x1, 0x1, 0xa, 0x9}, {0x2, 0x5, 0xf, 0xc}, {0x4, 0x1, 0x6, 0x8}, {0x5, 0x4, 0xf, 0x9}, {0x1, 0x4, 0x8, 0xb}, {0x5, 0x5, 0xd, 0x3}], 0x10, 0x7}, 0x90) r9 = add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="3a33bbb3523f724aa44017e4ee6e5ec80b9b145f905b18ee474a7ed1d21a5f7e87", 0x21, 0xfffffffffffffffd) ioctl$MEDIA_IOC_REQUEST_ALLOC(r2, 0x80047c05, &(0x7f00000004c0)) keyctl$unlink(0x18, 0x0, r9) 19:12:12 executing program 4: syz_clone3(&(0x7f0000000000)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f20941f73c13c51cb5da06953693bde521389dbe457e1c1bbee63e5d7d663df85565b5df91e00fc6bab2ee756e9b56bc900820d0d7f4dd2982026938da2cb9c4", 0x37}, 0x48, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x61, 0x32, 0x63, 0x65, 0x65, 0x65, 0x32, 0x37, 0x63, 0x33, 0x64, 0x33, 0x33, 0x30, 0x36, 0x37]}, &(0x7f0000000100)={0x0, "ddde2917410d269374a98adfdd1835ba54970e66a76eacd509e38849d66d533488dda8129a9bd48f9ddaffcfb1d61b5ba4a0fd523ac2e630311105338bd39a82", 0x18}, 0x48, r0) r2 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc4}, &(0x7f0000000340)={0x0, "7fa90ba4aee1a3e105f1fa90dd096ad1ad71e2b93f1c9c5c9bba28d98dd78236282189e9827fd5708a46a3a556c3c4d2709c45aab43340fdfa3c77eb7af720a6", 0x36}, 0x48, r2) syz_clone3(&(0x7f0000000000)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f20941f73c13c51cb5da06953693bde521389dbe457e1c1bbee63e5d7d663df85565b5df91e00fc6bab2ee756e9b56bc900820d0d7f4dd2982026938da2cb9c4", 0x37}, 0x48, 0x0) (async) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) (async) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x61, 0x32, 0x63, 0x65, 0x65, 0x65, 0x32, 0x37, 0x63, 0x33, 0x64, 0x33, 0x33, 0x30, 0x36, 0x37]}, &(0x7f0000000100)={0x0, "ddde2917410d269374a98adfdd1835ba54970e66a76eacd509e38849d66d533488dda8129a9bd48f9ddaffcfb1d61b5ba4a0fd523ac2e630311105338bd39a82", 0x18}, 0x48, r0) (async) add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, r1) (async) add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc4}, &(0x7f0000000340)={0x0, "7fa90ba4aee1a3e105f1fa90dd096ad1ad71e2b93f1c9c5c9bba28d98dd78236282189e9827fd5708a46a3a556c3c4d2709c45aab43340fdfa3c77eb7af720a6", 0x36}, 0x48, r2) (async) 19:12:12 executing program 5: getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) socketpair(0x26, 0xe, 0x5, &(0x7f0000000380)={0xffffffffffffffff}) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e23}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x4c810) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r2, 0x10000000) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x5, 0x1, 0x3f, 0x9, 0x10, r2, 0x61, '\x00', r0, r3, 0x0, 0x2}, 0x48) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, 0x0, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, 0x0, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x7, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r7, 0x114, 0x7, 0x0, 0x0) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r8, 0x114, 0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1a, 0x4, &(0x7f00000000c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xb, 0x4, 0x7, 0x30, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0x7}], &(0x7f0000000100)='GPL\x00', 0x7fff, 0x51, &(0x7f0000000140)=""/81, 0x41100, 0x8, '\x00', r0, 0x30, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8, &(0x7f0000000200)=[r4, r5, r6, r7, 0x1, r8], &(0x7f0000000240)=[{0x3, 0x5, 0xc, 0x6}, {0x0, 0x5, 0xd, 0x2}, {0x1, 0x1, 0xa, 0x9}, {0x2, 0x5, 0xf, 0xc}, {0x4, 0x1, 0x6, 0x8}, {0x5, 0x4, 0xf, 0x9}, {0x1, 0x4, 0x8, 0xb}, {0x5, 0x5, 0xd, 0x3}], 0x10, 0x7}, 0x90) r9 = add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="3a33bbb3523f724aa44017e4ee6e5ec80b9b145f905b18ee474a7ed1d21a5f7e87", 0x21, 0xfffffffffffffffd) ioctl$MEDIA_IOC_REQUEST_ALLOC(r2, 0x80047c05, &(0x7f00000004c0)) keyctl$unlink(0x18, 0x0, r9) 19:12:12 executing program 3: getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) (async) socketpair(0x26, 0xe, 0x5, &(0x7f0000000380)={0xffffffffffffffff}) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e23}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x4c810) (async) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (async) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r2, 0x10000000) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x5, 0x1, 0x3f, 0x9, 0x10, r2, 0x61, '\x00', r0, r3, 0x0, 0x2}, 0x48) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, 0x0, 0x0) (async) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, 0x0, 0x0) (async) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x7, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r7, 0x114, 0x7, 0x0, 0x0) (async) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r8, 0x114, 0x7, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1a, 0x4, &(0x7f00000000c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xb, 0x4, 0x7, 0x30, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0x7}], &(0x7f0000000100)='GPL\x00', 0x7fff, 0x51, &(0x7f0000000140)=""/81, 0x41100, 0x8, '\x00', r0, 0x30, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8, &(0x7f0000000200)=[r4, r5, r6, r7, 0x1, r8], &(0x7f0000000240)=[{0x3, 0x5, 0xc, 0x6}, {0x0, 0x5, 0xd, 0x2}, {0x1, 0x1, 0xa, 0x9}, {0x2, 0x5, 0xf, 0xc}, {0x4, 0x1, 0x6, 0x8}, {0x5, 0x4, 0xf, 0x9}, {0x1, 0x4, 0x8, 0xb}, {0x5, 0x5, 0xd, 0x3}], 0x10, 0x7}, 0x90) (async) r9 = add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="3a33bbb3523f724aa44017e4ee6e5ec80b9b145f905b18ee474a7ed1d21a5f7e87", 0x21, 0xfffffffffffffffd) ioctl$MEDIA_IOC_REQUEST_ALLOC(r2, 0x80047c05, &(0x7f00000004c0)) (async) keyctl$unlink(0x18, 0x0, r9) 19:12:12 executing program 1: add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) (fail_nth: 2) 19:12:12 executing program 0: getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) socketpair(0x26, 0xe, 0x5, &(0x7f0000000380)={0xffffffffffffffff}) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e23}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x4c810) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r2, 0x10000000) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x5, 0x1, 0x3f, 0x9, 0x10, r2, 0x61, '\x00', r0, r3, 0x0, 0x2}, 0x48) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, 0x0, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, 0x0, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x7, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r7, 0x114, 0x7, 0x0, 0x0) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r8, 0x114, 0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1a, 0x4, &(0x7f00000000c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xb, 0x4, 0x7, 0x30, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0x7}], &(0x7f0000000100)='GPL\x00', 0x7fff, 0x51, &(0x7f0000000140)=""/81, 0x41100, 0x8, '\x00', r0, 0x30, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8, &(0x7f0000000200)=[r4, r5, r6, r7, 0x1, r8], &(0x7f0000000240)=[{0x3, 0x5, 0xc, 0x6}, {0x0, 0x5, 0xd, 0x2}, {0x1, 0x1, 0xa, 0x9}, {0x2, 0x5, 0xf, 0xc}, {0x4, 0x1, 0x6, 0x8}, {0x5, 0x4, 0xf, 0x9}, {0x1, 0x4, 0x8, 0xb}, {0x5, 0x5, 0xd, 0x3}], 0x10, 0x7}, 0x90) r9 = add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="3a33bbb3523f724aa44017e4ee6e5ec80b9b145f905b18ee474a7ed1d21a5f7e87", 0x21, 0xfffffffffffffffd) ioctl$MEDIA_IOC_REQUEST_ALLOC(r2, 0x80047c05, &(0x7f00000004c0)) keyctl$unlink(0x18, 0x0, r9) [ 2392.567346][ T6611] FAULT_INJECTION: forcing a failure. [ 2392.567346][ T6611] name failslab, interval 1, probability 0, space 0, times 0 [ 2392.630470][ T6611] CPU: 1 PID: 6611 Comm: syz-executor.1 Not tainted 5.15.138-syzkaller #0 [ 2392.639020][ T6611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2392.649181][ T6611] Call Trace: [ 2392.652468][ T6611] [ 2392.655398][ T6611] dump_stack_lvl+0x1e3/0x2cb [ 2392.660085][ T6611] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2392.665722][ T6611] ? panic+0x84d/0x84d [ 2392.669802][ T6611] ? __might_sleep+0xc0/0xc0 [ 2392.674399][ T6611] should_fail+0x38a/0x4c0 [ 2392.678817][ T6611] ? __se_sys_add_key+0x1ac/0x480 [ 2392.683842][ T6611] should_failslab+0x5/0x20 [ 2392.688437][ T6611] slab_pre_alloc_hook+0x53/0xc0 [ 2392.693388][ T6611] ? __se_sys_add_key+0x1ac/0x480 [ 2392.698414][ T6611] __kmalloc_track_caller+0x6c/0x300 [ 2392.703701][ T6611] ? __se_sys_add_key+0x1ac/0x480 [ 2392.708723][ T6611] ? strnlen_user+0x156/0x270 [ 2392.713412][ T6611] strndup_user+0x73/0x150 [ 2392.717860][ T6611] __se_sys_add_key+0x1ac/0x480 [ 2392.722713][ T6611] ? __x64_sys_add_key+0xc0/0xc0 [ 2392.727681][ T6611] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2392.733658][ T6611] ? lockdep_hardirqs_on+0x94/0x130 [ 2392.738962][ T6611] ? __x64_sys_add_key+0x1c/0xc0 [ 2392.743897][ T6611] do_syscall_64+0x3d/0xb0 [ 2392.748316][ T6611] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2392.754208][ T6611] RIP: 0033:0x7fcc6920bae9 [ 2392.758620][ T6611] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 19:12:12 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 1) [ 2392.778218][ T6611] RSP: 002b:00007fcc6778d0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 2392.786633][ T6611] RAX: ffffffffffffffda RBX: 00007fcc6932af80 RCX: 00007fcc6920bae9 [ 2392.794612][ T6611] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000000 [ 2392.802582][ T6611] RBP: 00007fcc6778d120 R08: fffffffffffffff8 R09: 0000000000000000 [ 2392.810551][ T6611] R10: 000000000000003f R11: 0000000000000246 R12: 0000000000000001 [ 2392.818520][ T6611] R13: 000000000000000b R14: 00007fcc6932af80 R15: 00007ffc30905548 [ 2392.826501][ T6611] 19:12:12 executing program 3: getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) (async) getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) socketpair(0x26, 0xe, 0x5, &(0x7f0000000380)) (async) socketpair(0x26, 0xe, 0x5, &(0x7f0000000380)={0xffffffffffffffff}) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e23}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x4c810) (async) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e23}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x4c810) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r2, 0x10000000) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x5, 0x1, 0x3f, 0x9, 0x10, r2, 0x61, '\x00', r0, r3, 0x0, 0x2}, 0x48) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (async) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, 0x0, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x7, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r7, 0x114, 0x7, 0x0, 0x0) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r8, 0x114, 0x7, 0x0, 0x0) (async) setsockopt$RDS_GET_MR_FOR_DEST(r8, 0x114, 0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1a, 0x4, &(0x7f00000000c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xb, 0x4, 0x7, 0x30, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0x7}], &(0x7f0000000100)='GPL\x00', 0x7fff, 0x51, &(0x7f0000000140)=""/81, 0x41100, 0x8, '\x00', r0, 0x30, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8, &(0x7f0000000200)=[r4, r5, r6, r7, 0x1, r8], &(0x7f0000000240)=[{0x3, 0x5, 0xc, 0x6}, {0x0, 0x5, 0xd, 0x2}, {0x1, 0x1, 0xa, 0x9}, {0x2, 0x5, 0xf, 0xc}, {0x4, 0x1, 0x6, 0x8}, {0x5, 0x4, 0xf, 0x9}, {0x1, 0x4, 0x8, 0xb}, {0x5, 0x5, 0xd, 0x3}], 0x10, 0x7}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1a, 0x4, &(0x7f00000000c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xb, 0x4, 0x7, 0x30, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0x7}], &(0x7f0000000100)='GPL\x00', 0x7fff, 0x51, &(0x7f0000000140)=""/81, 0x41100, 0x8, '\x00', r0, 0x30, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8, &(0x7f0000000200)=[r4, r5, r6, r7, 0x1, r8], &(0x7f0000000240)=[{0x3, 0x5, 0xc, 0x6}, {0x0, 0x5, 0xd, 0x2}, {0x1, 0x1, 0xa, 0x9}, {0x2, 0x5, 0xf, 0xc}, {0x4, 0x1, 0x6, 0x8}, {0x5, 0x4, 0xf, 0x9}, {0x1, 0x4, 0x8, 0xb}, {0x5, 0x5, 0xd, 0x3}], 0x10, 0x7}, 0x90) add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="3a33bbb3523f724aa44017e4ee6e5ec80b9b145f905b18ee474a7ed1d21a5f7e87", 0x21, 0xfffffffffffffffd) (async) r9 = add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="3a33bbb3523f724aa44017e4ee6e5ec80b9b145f905b18ee474a7ed1d21a5f7e87", 0x21, 0xfffffffffffffffd) ioctl$MEDIA_IOC_REQUEST_ALLOC(r2, 0x80047c05, &(0x7f00000004c0)) keyctl$unlink(0x18, 0x0, r9) [ 2392.896093][ T6619] FAULT_INJECTION: forcing a failure. [ 2392.896093][ T6619] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2392.913113][ T6619] CPU: 0 PID: 6619 Comm: syz-executor.2 Not tainted 5.15.138-syzkaller #0 [ 2392.921653][ T6619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2392.931729][ T6619] Call Trace: [ 2392.935112][ T6619] [ 2392.938065][ T6619] dump_stack_lvl+0x1e3/0x2cb [ 2392.942786][ T6619] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2392.948490][ T6619] ? panic+0x84d/0x84d [ 2392.952596][ T6619] should_fail+0x38a/0x4c0 [ 2392.957046][ T6619] _copy_from_user+0x2d/0x170 [ 2392.961754][ T6619] copy_clone_args_from_user+0x1c9/0x830 [ 2392.967420][ T6619] ? __lock_acquire+0x1295/0x1ff0 [ 2392.972460][ T6619] ? __delayed_free_task+0x20/0x20 [ 2392.977703][ T6619] __se_sys_clone3+0xf0/0x430 [ 2392.982388][ T6619] ? __x64_sys_clone3+0x60/0x60 [ 2392.987257][ T6619] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2392.993242][ T6619] ? lockdep_hardirqs_on+0x94/0x130 [ 2392.998445][ T6619] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2393.004453][ T6619] do_syscall_64+0x3d/0xb0 [ 2393.008875][ T6619] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2393.014771][ T6619] RIP: 0033:0x7f205aae6ae9 [ 2393.019189][ T6619] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 19:12:13 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 1) [ 2393.038811][ T6619] RSP: 002b:00007f2059067f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2393.047242][ T6619] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f205aae6ae9 [ 2393.055226][ T6619] RDX: 00007f2059067fb0 RSI: 0000000000000058 RDI: 00007f2059067fb0 [ 2393.063204][ T6619] RBP: 00007f2059068120 R08: 0000000000000000 R09: 0000000000000058 [ 2393.071177][ T6619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2393.079146][ T6619] R13: 000000000000000b R14: 00007f205ac05f80 R15: 00007ffc7dca06e8 [ 2393.087179][ T6619] 19:12:13 executing program 5: getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) socketpair(0x26, 0xe, 0x5, &(0x7f0000000380)={0xffffffffffffffff}) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e23}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x4c810) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r2, 0x10000000) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x5, 0x1, 0x3f, 0x9, 0x10, r2, 0x61, '\x00', r0, r3, 0x0, 0x2}, 0x48) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, 0x0, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, 0x0, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x7, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r7, 0x114, 0x7, 0x0, 0x0) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r8, 0x114, 0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1a, 0x4, &(0x7f00000000c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xb, 0x4, 0x7, 0x30, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0x7}], &(0x7f0000000100)='GPL\x00', 0x7fff, 0x51, &(0x7f0000000140)=""/81, 0x41100, 0x8, '\x00', r0, 0x30, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8, &(0x7f0000000200)=[r4, r5, r6, r7, 0x1, r8], &(0x7f0000000240)=[{0x3, 0x5, 0xc, 0x6}, {0x0, 0x5, 0xd, 0x2}, {0x1, 0x1, 0xa, 0x9}, {0x2, 0x5, 0xf, 0xc}, {0x4, 0x1, 0x6, 0x8}, {0x5, 0x4, 0xf, 0x9}, {0x1, 0x4, 0x8, 0xb}, {0x5, 0x5, 0xd, 0x3}], 0x10, 0x7}, 0x90) r9 = add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="3a33bbb3523f724aa44017e4ee6e5ec80b9b145f905b18ee474a7ed1d21a5f7e87", 0x21, 0xfffffffffffffffd) ioctl$MEDIA_IOC_REQUEST_ALLOC(r2, 0x80047c05, &(0x7f00000004c0)) keyctl$unlink(0x18, 0x0, r9) 19:12:13 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 2) 19:12:13 executing program 1: add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) (fail_nth: 3) [ 2393.172670][ T6628] FAULT_INJECTION: forcing a failure. [ 2393.172670][ T6628] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2393.186747][ T6628] CPU: 0 PID: 6628 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2393.195281][ T6628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2393.205369][ T6628] Call Trace: [ 2393.208666][ T6628] [ 2393.211613][ T6628] dump_stack_lvl+0x1e3/0x2cb [ 2393.216317][ T6628] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2393.221977][ T6628] ? panic+0x84d/0x84d [ 2393.226075][ T6628] should_fail+0x38a/0x4c0 [ 2393.230609][ T6628] _copy_from_user+0x2d/0x170 [ 2393.235314][ T6628] copy_clone_args_from_user+0x1c9/0x830 [ 2393.241006][ T6628] ? __lock_acquire+0x1295/0x1ff0 [ 2393.246062][ T6628] ? __delayed_free_task+0x20/0x20 [ 2393.251212][ T6628] __se_sys_clone3+0xf0/0x430 [ 2393.255916][ T6628] ? __x64_sys_clone3+0x60/0x60 [ 2393.260828][ T6628] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2393.266830][ T6628] ? lockdep_hardirqs_on+0x94/0x130 [ 2393.272058][ T6628] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2393.274095][ T6634] FAULT_INJECTION: forcing a failure. [ 2393.274095][ T6634] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2393.278069][ T6628] do_syscall_64+0x3d/0xb0 [ 2393.278108][ T6628] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2393.278134][ T6628] RIP: 0033:0x7fa1e449cae9 [ 2393.305845][ T6628] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2393.325470][ T6628] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2393.333913][ T6628] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2393.341904][ T6628] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2393.349890][ T6628] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2393.357876][ T6628] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2393.365853][ T6628] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2393.373858][ T6628] [ 2393.377595][ T6634] CPU: 1 PID: 6634 Comm: syz-executor.1 Not tainted 5.15.138-syzkaller #0 [ 2393.386226][ T6634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2393.396388][ T6634] Call Trace: [ 2393.399690][ T6634] [ 2393.402638][ T6634] dump_stack_lvl+0x1e3/0x2cb [ 2393.407354][ T6634] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2393.408848][ T6637] FAULT_INJECTION: forcing a failure. [ 2393.408848][ T6637] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2393.413025][ T6634] ? panic+0x84d/0x84d [ 2393.413086][ T6634] should_fail+0x38a/0x4c0 [ 2393.434686][ T6634] _copy_from_user+0x2d/0x170 [ 2393.439405][ T6634] strndup_user+0xb0/0x150 [ 2393.443837][ T6634] __se_sys_add_key+0x1ac/0x480 [ 2393.448706][ T6634] ? __x64_sys_add_key+0xc0/0xc0 [ 2393.453667][ T6634] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2393.459664][ T6634] ? lockdep_hardirqs_on+0x94/0x130 [ 2393.464887][ T6634] ? __x64_sys_add_key+0x1c/0xc0 19:12:13 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 2) [ 2393.469851][ T6634] do_syscall_64+0x3d/0xb0 [ 2393.474296][ T6634] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2393.480213][ T6634] RIP: 0033:0x7fcc6920bae9 [ 2393.484657][ T6634] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2393.504288][ T6634] RSP: 002b:00007fcc6778d0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 2393.512706][ T6634] RAX: ffffffffffffffda RBX: 00007fcc6932af80 RCX: 00007fcc6920bae9 [ 2393.520710][ T6634] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000000 [ 2393.528697][ T6634] RBP: 00007fcc6778d120 R08: fffffffffffffff8 R09: 0000000000000000 [ 2393.536682][ T6634] R10: 000000000000003f R11: 0000000000000246 R12: 0000000000000001 [ 2393.544676][ T6634] R13: 000000000000000b R14: 00007fcc6932af80 R15: 00007ffc30905548 [ 2393.552678][ T6634] [ 2393.565728][ T6637] CPU: 1 PID: 6637 Comm: syz-executor.2 Not tainted 5.15.138-syzkaller #0 [ 2393.574269][ T6637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2393.584426][ T6637] Call Trace: [ 2393.587718][ T6637] [ 2393.590663][ T6637] dump_stack_lvl+0x1e3/0x2cb [ 2393.595361][ T6637] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2393.601025][ T6637] ? panic+0x84d/0x84d [ 2393.605135][ T6637] should_fail+0x38a/0x4c0 [ 2393.609580][ T6637] _copy_from_user+0x2d/0x170 [ 2393.614295][ T6637] copy_clone_args_from_user+0x713/0x830 [ 2393.619940][ T6637] ? usbnet_start_xmit+0xf0/0x1d70 [ 2393.625141][ T6637] ? __delayed_free_task+0x20/0x20 [ 2393.630273][ T6637] __se_sys_clone3+0xf0/0x430 [ 2393.634957][ T6637] ? __x64_sys_clone3+0x60/0x60 [ 2393.639827][ T6637] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2393.645803][ T6637] ? lockdep_hardirqs_on+0x94/0x130 [ 2393.651006][ T6637] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2393.656988][ T6637] do_syscall_64+0x3d/0xb0 [ 2393.661407][ T6637] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2393.667298][ T6637] RIP: 0033:0x7f205aae6ae9 [ 2393.671713][ T6637] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2393.691317][ T6637] RSP: 002b:00007f2059067f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2393.699729][ T6637] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f205aae6ae9 [ 2393.707699][ T6637] RDX: 00007f2059067fb0 RSI: 0000000000000058 RDI: 00007f2059067fb0 [ 2393.715670][ T6637] RBP: 00007f2059068120 R08: 0000000000000000 R09: 0000000000000058 [ 2393.723642][ T6637] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2393.731613][ T6637] R13: 000000000000000b R14: 00007f205ac05f80 R15: 00007ffc7dca06e8 [ 2393.739598][ T6637] [ 2393.755161][ T6639] FAULT_INJECTION: forcing a failure. [ 2393.755161][ T6639] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2393.768489][ T6639] CPU: 1 PID: 6639 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2393.777023][ T6639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2393.787093][ T6639] Call Trace: [ 2393.790379][ T6639] [ 2393.793319][ T6639] dump_stack_lvl+0x1e3/0x2cb [ 2393.798022][ T6639] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2393.803682][ T6639] ? panic+0x84d/0x84d [ 2393.807783][ T6639] should_fail+0x38a/0x4c0 [ 2393.812246][ T6639] _copy_from_user+0x2d/0x170 [ 2393.816955][ T6639] copy_clone_args_from_user+0x713/0x830 [ 2393.822615][ T6639] ? __delayed_free_task+0x20/0x20 [ 2393.827774][ T6639] __se_sys_clone3+0xf0/0x430 [ 2393.832468][ T6639] ? __x64_sys_clone3+0x60/0x60 [ 2393.837358][ T6639] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2393.843354][ T6639] ? lockdep_hardirqs_on+0x94/0x130 [ 2393.848574][ T6639] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2393.854573][ T6639] do_syscall_64+0x3d/0xb0 [ 2393.859010][ T6639] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2393.865010][ T6639] RIP: 0033:0x7fa1e449cae9 [ 2393.869439][ T6639] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2393.889068][ T6639] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2393.897520][ T6639] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2393.905510][ T6639] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2393.913503][ T6639] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2393.921492][ T6639] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2393.929513][ T6639] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2393.937517][ T6639] 19:12:16 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) read$FUSE(0xffffffffffffffff, &(0x7f0000001240)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000280)={'\x00', 0x9, 0xd03, 0x0, 0x200, 0x7, r0}) syz_clone3(&(0x7f0000000200)={0x100, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x11}, &(0x7f00000000c0)=""/98, 0x62, &(0x7f0000000140)=""/102, &(0x7f00000001c0)=[r0], 0x1, {r1}}, 0x58) 19:12:16 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) keyctl$negate(0xd, 0x0, 0x898d, 0xffffffffffffffff) 19:12:16 executing program 1: add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) (fail_nth: 4) 19:12:16 executing program 5: getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) socketpair(0x26, 0xe, 0x5, &(0x7f0000000380)={0xffffffffffffffff}) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e23}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x4c810) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r2, 0x10000000) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x5, 0x1, 0x3f, 0x9, 0x10, r2, 0x61, '\x00', r0, r3, 0x0, 0x2}, 0x48) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, 0x0, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, 0x0, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x7, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r7, 0x114, 0x7, 0x0, 0x0) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r8, 0x114, 0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1a, 0x4, &(0x7f00000000c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xb, 0x4, 0x7, 0x30, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0x7}], &(0x7f0000000100)='GPL\x00', 0x7fff, 0x51, &(0x7f0000000140)=""/81, 0x41100, 0x8, '\x00', r0, 0x30, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8, &(0x7f0000000200)=[r4, r5, r6, r7, 0x1, r8], &(0x7f0000000240)=[{0x3, 0x5, 0xc, 0x6}, {0x0, 0x5, 0xd, 0x2}, {0x1, 0x1, 0xa, 0x9}, {0x2, 0x5, 0xf, 0xc}, {0x4, 0x1, 0x6, 0x8}, {0x5, 0x4, 0xf, 0x9}, {0x1, 0x4, 0x8, 0xb}, {0x5, 0x5, 0xd, 0x3}], 0x10, 0x7}, 0x90) r9 = add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="3a33bbb3523f724aa44017e4ee6e5ec80b9b145f905b18ee474a7ed1d21a5f7e87", 0x21, 0xfffffffffffffffd) ioctl$MEDIA_IOC_REQUEST_ALLOC(r2, 0x80047c05, &(0x7f00000004c0)) keyctl$unlink(0x18, 0x0, r9) 19:12:16 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 3) 19:12:16 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 3) [ 2396.560268][ T6644] FAULT_INJECTION: forcing a failure. [ 2396.560268][ T6644] name failslab, interval 1, probability 0, space 0, times 0 [ 2396.570373][ T6648] FAULT_INJECTION: forcing a failure. [ 2396.570373][ T6648] name failslab, interval 1, probability 0, space 0, times 0 [ 2396.575622][ T6647] FAULT_INJECTION: forcing a failure. [ 2396.575622][ T6647] name failslab, interval 1, probability 0, space 0, times 0 19:12:16 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) keyctl$negate(0xd, 0x0, 0x898d, 0xffffffffffffffff) [ 2396.610851][ T6647] CPU: 1 PID: 6647 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2396.619562][ T6647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2396.629829][ T6647] Call Trace: [ 2396.633115][ T6647] [ 2396.636056][ T6647] dump_stack_lvl+0x1e3/0x2cb [ 2396.640747][ T6647] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2396.646404][ T6647] ? panic+0x84d/0x84d [ 2396.650502][ T6647] should_fail+0x38a/0x4c0 [ 2396.654943][ T6647] should_failslab+0x5/0x20 19:12:16 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) keyctl$negate(0xd, 0x0, 0x898d, 0xffffffffffffffff) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) keyctl$negate(0xd, 0x0, 0x898d, 0xffffffffffffffff) (async) [ 2396.659464][ T6647] slab_pre_alloc_hook+0x53/0xc0 [ 2396.664411][ T6647] kmem_cache_alloc_node+0x49/0x2c0 [ 2396.669624][ T6647] ? dup_task_struct+0x57/0xb60 [ 2396.674501][ T6647] ? _raw_spin_lock_irq+0xdb/0x110 [ 2396.679638][ T6647] dup_task_struct+0x57/0xb60 [ 2396.684328][ T6647] ? _raw_spin_unlock_irq+0x1f/0x40 [ 2396.689564][ T6647] ? lockdep_hardirqs_on+0x94/0x130 [ 2396.694796][ T6647] copy_process+0x5eb/0x3ef0 [ 2396.699429][ T6647] ? __might_fault+0xb8/0x110 [ 2396.704133][ T6647] ? __lock_acquire+0x1ff0/0x1ff0 [ 2396.709185][ T6647] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2396.714316][ T6647] ? _copy_from_user+0x10f/0x170 [ 2396.719289][ T6647] kernel_clone+0x210/0x960 [ 2396.723806][ T6647] ? create_io_thread+0x1e0/0x1e0 [ 2396.728853][ T6647] __se_sys_clone3+0x3e1/0x430 [ 2396.733616][ T6647] ? __x64_sys_clone3+0x60/0x60 [ 2396.738486][ T6647] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2396.744467][ T6647] ? lockdep_hardirqs_on+0x94/0x130 [ 2396.749668][ T6647] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2396.755647][ T6647] do_syscall_64+0x3d/0xb0 [ 2396.760078][ T6647] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2396.765970][ T6647] RIP: 0033:0x7fa1e449cae9 [ 2396.770471][ T6647] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2396.790074][ T6647] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2396.798497][ T6647] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2396.806468][ T6647] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2396.814453][ T6647] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2396.822422][ T6647] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2396.830388][ T6647] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2396.838370][ T6647] [ 2396.846196][ T6648] CPU: 0 PID: 6648 Comm: syz-executor.1 Not tainted 5.15.138-syzkaller #0 [ 2396.854822][ T6648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2396.864984][ T6648] Call Trace: [ 2396.868281][ T6648] [ 2396.871224][ T6648] dump_stack_lvl+0x1e3/0x2cb [ 2396.875935][ T6648] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2396.881598][ T6648] ? panic+0x84d/0x84d [ 2396.885698][ T6648] should_fail+0x38a/0x4c0 [ 2396.890138][ T6648] should_failslab+0x5/0x20 [ 2396.894663][ T6648] slab_pre_alloc_hook+0x53/0xc0 [ 2396.899628][ T6648] __kmalloc_node+0x71/0x390 [ 2396.904245][ T6648] ? __might_fault+0xb4/0x110 [ 2396.908954][ T6648] ? kvmalloc_node+0x80/0x140 [ 2396.913666][ T6648] kvmalloc_node+0x80/0x140 [ 2396.918194][ T6648] __se_sys_add_key+0x26c/0x480 [ 2396.923071][ T6648] ? __x64_sys_add_key+0xc0/0xc0 [ 2396.928126][ T6648] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2396.934136][ T6648] ? lockdep_hardirqs_on+0x94/0x130 [ 2396.939365][ T6648] ? __x64_sys_add_key+0x1c/0xc0 [ 2396.944329][ T6648] do_syscall_64+0x3d/0xb0 [ 2396.948769][ T6648] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2396.954711][ T6648] RIP: 0033:0x7fcc6920bae9 19:12:16 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wpan0\x00'}) [ 2396.959147][ T6648] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2396.978778][ T6648] RSP: 002b:00007fcc6778d0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 2396.987216][ T6648] RAX: ffffffffffffffda RBX: 00007fcc6932af80 RCX: 00007fcc6920bae9 [ 2396.995215][ T6648] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000000 [ 2397.003214][ T6648] RBP: 00007fcc6778d120 R08: fffffffffffffff8 R09: 0000000000000000 [ 2397.011211][ T6648] R10: 000000000000003f R11: 0000000000000246 R12: 0000000000000001 [ 2397.019204][ T6648] R13: 000000000000000b R14: 00007fcc6932af80 R15: 00007ffc30905548 [ 2397.027218][ T6648] [ 2397.030379][ T6644] CPU: 1 PID: 6644 Comm: syz-executor.2 Not tainted 5.15.138-syzkaller #0 [ 2397.038911][ T6644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2397.049063][ T6644] Call Trace: [ 2397.052356][ T6644] [ 2397.055304][ T6644] dump_stack_lvl+0x1e3/0x2cb [ 2397.060007][ T6644] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2397.065676][ T6644] ? panic+0x84d/0x84d [ 2397.069922][ T6644] should_fail+0x38a/0x4c0 [ 2397.074369][ T6644] should_failslab+0x5/0x20 [ 2397.078898][ T6644] slab_pre_alloc_hook+0x53/0xc0 [ 2397.083864][ T6644] kmem_cache_alloc_node+0x49/0x2c0 [ 2397.089103][ T6644] ? dup_task_struct+0x57/0xb60 [ 2397.093980][ T6644] ? _raw_spin_lock_irq+0xdb/0x110 [ 2397.099135][ T6644] dup_task_struct+0x57/0xb60 [ 2397.103842][ T6644] ? _raw_spin_unlock_irq+0x1f/0x40 [ 2397.109067][ T6644] ? lockdep_hardirqs_on+0x94/0x130 [ 2397.114305][ T6644] copy_process+0x5eb/0x3ef0 [ 2397.118942][ T6644] ? __might_fault+0xb8/0x110 [ 2397.123655][ T6644] ? __lock_acquire+0x1ff0/0x1ff0 [ 2397.128717][ T6644] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2397.133866][ T6644] ? _copy_from_user+0x10f/0x170 [ 2397.138837][ T6644] kernel_clone+0x210/0x960 [ 2397.143367][ T6644] ? create_io_thread+0x1e0/0x1e0 [ 2397.148437][ T6644] __se_sys_clone3+0x3e1/0x430 [ 2397.153234][ T6644] ? __x64_sys_clone3+0x60/0x60 19:12:17 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 4) 19:12:17 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wpan0\x00'}) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wpan0\x00'}) (async) 19:12:17 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wpan0\x00'}) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wpan0\x00'}) (async) [ 2397.158320][ T6644] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2397.164345][ T6644] ? lockdep_hardirqs_on+0x94/0x130 [ 2397.169573][ T6644] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2397.175585][ T6644] do_syscall_64+0x3d/0xb0 [ 2397.180034][ T6644] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2397.185963][ T6644] RIP: 0033:0x7f205aae6ae9 [ 2397.190409][ T6644] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2397.193473][ T6668] FAULT_INJECTION: forcing a failure. [ 2397.193473][ T6668] name failslab, interval 1, probability 0, space 0, times 0 [ 2397.210037][ T6644] RSP: 002b:00007f2059067f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2397.210069][ T6644] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f205aae6ae9 [ 2397.210086][ T6644] RDX: 00007f2059067fb0 RSI: 0000000000000058 RDI: 00007f2059067fb0 [ 2397.210102][ T6644] RBP: 00007f2059068120 R08: 0000000000000000 R09: 0000000000000058 [ 2397.210116][ T6644] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2397.210129][ T6644] R13: 000000000000000b R14: 00007f205ac05f80 R15: 00007ffc7dca06e8 [ 2397.210160][ T6644] [ 2397.364999][ T6668] CPU: 1 PID: 6668 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2397.373570][ T6668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2397.383633][ T6668] Call Trace: [ 2397.386911][ T6668] [ 2397.389842][ T6668] dump_stack_lvl+0x1e3/0x2cb [ 2397.394529][ T6668] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2397.400169][ T6668] ? panic+0x84d/0x84d [ 2397.404245][ T6668] should_fail+0x38a/0x4c0 [ 2397.408688][ T6668] should_failslab+0x5/0x20 [ 2397.413190][ T6668] slab_pre_alloc_hook+0x53/0xc0 [ 2397.418130][ T6668] ? prepare_creds+0x3c/0x630 [ 2397.422817][ T6668] kmem_cache_alloc+0x3f/0x280 [ 2397.427585][ T6668] prepare_creds+0x3c/0x630 [ 2397.432094][ T6668] copy_creds+0x146/0xca0 [ 2397.436434][ T6668] copy_process+0x8a7/0x3ef0 [ 2397.441033][ T6668] ? __might_fault+0xb8/0x110 [ 2397.445722][ T6668] ? __lock_acquire+0x1ff0/0x1ff0 [ 2397.450758][ T6668] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2397.455889][ T6668] ? _copy_from_user+0x10f/0x170 [ 2397.460828][ T6668] kernel_clone+0x210/0x960 [ 2397.465339][ T6668] ? create_io_thread+0x1e0/0x1e0 [ 2397.470387][ T6668] __se_sys_clone3+0x3e1/0x430 [ 2397.475157][ T6668] ? __x64_sys_clone3+0x60/0x60 [ 2397.480024][ T6668] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2397.485998][ T6668] ? lockdep_hardirqs_on+0x94/0x130 [ 2397.491195][ T6668] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2397.497190][ T6668] do_syscall_64+0x3d/0xb0 [ 2397.501606][ T6668] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2397.507496][ T6668] RIP: 0033:0x7fa1e449cae9 [ 2397.511910][ T6668] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2397.531515][ T6668] RSP: 002b:00007fa1e29fcf98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2397.539932][ T6668] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2397.547897][ T6668] RDX: 00007fa1e29fcfb0 RSI: 0000000000000058 RDI: 00007fa1e29fcfb0 [ 2397.555862][ T6668] RBP: 00007fa1e29fd120 R08: 0000000000000000 R09: 0000000000000058 [ 2397.563846][ T6668] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2397.571816][ T6668] R13: 000000000000006e R14: 00007fa1e45bc050 R15: 00007fff9ee6cff8 [ 2397.579802][ T6668] 19:12:17 executing program 1: add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) (fail_nth: 5) 19:12:17 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) ioctl$MEDIA_IOC_G_TOPOLOGY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000540)={0x0, 0x4, 0x0, &(0x7f0000000180)=[{}, {}, {}, {}], 0x1, 0x0, &(0x7f0000000080)=[{}], 0xa, 0x0, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}, {0x0, 0x80000000, 0x0, {0x0}}, {}, {}], 0x6, 0x0, &(0x7f0000000440)=[{}, {}, {}, {}, {}, {}]}) ioctl$MEDIA_IOC_SETUP_LINK(r0, 0xc0347c03, &(0x7f00000005c0)={{0x80000000, 0x0, 0x4, [0x5, 0x3]}, {0x80000000, r1, 0x0, [0x40, 0x3]}, 0x1, [0x9, 0x4]}) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x31, 0x33, 0x62, 0x61, 0x32, 0x62, 0x37, 0x61, 0x31, 0x39, 0x65, 0x37, 0x37, 0x92efd74bdf262af8, 0x38, 0x38]}, &(0x7f0000000100)={0x0, "71c4c0a08d4e593dddca2c10569849ec87842807b06a583680d9afde2ba125112971f6816af6267f7c0cf7996e0f3ecbfc31b75cfd239078bbe6ded425b9339a", 0x20}, 0x48, 0xfffffffffffffffb) keyctl$unlink(0x9, r2, 0xfffffffffffffff8) keyctl$negate(0xd, 0x0, 0x147c, 0xfffffffffffffff9) 19:12:17 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 4) 19:12:17 executing program 5: getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) socketpair(0x26, 0xe, 0x5, &(0x7f0000000380)={0xffffffffffffffff}) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e23}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x4c810) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r2, 0x10000000) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x5, 0x1, 0x3f, 0x9, 0x10, r2, 0x61, '\x00', r0, r3, 0x0, 0x2}, 0x48) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, 0x0, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, 0x0, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x7, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r7, 0x114, 0x7, 0x0, 0x0) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r8, 0x114, 0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1a, 0x4, &(0x7f00000000c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xb, 0x4, 0x7, 0x30, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0x7}], &(0x7f0000000100)='GPL\x00', 0x7fff, 0x51, &(0x7f0000000140)=""/81, 0x41100, 0x8, '\x00', r0, 0x30, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8, &(0x7f0000000200)=[r4, r5, r6, r7, 0x1, r8], &(0x7f0000000240)=[{0x3, 0x5, 0xc, 0x6}, {0x0, 0x5, 0xd, 0x2}, {0x1, 0x1, 0xa, 0x9}, {0x2, 0x5, 0xf, 0xc}, {0x4, 0x1, 0x6, 0x8}, {0x5, 0x4, 0xf, 0x9}, {0x1, 0x4, 0x8, 0xb}, {0x5, 0x5, 0xd, 0x3}], 0x10, 0x7}, 0x90) add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="3a33bbb3523f724aa44017e4ee6e5ec80b9b145f905b18ee474a7ed1d21a5f7e87", 0x21, 0xfffffffffffffffd) ioctl$MEDIA_IOC_REQUEST_ALLOC(r2, 0x80047c05, &(0x7f00000004c0)) 19:12:17 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async, rerun: 64) read$FUSE(0xffffffffffffffff, &(0x7f0000001240)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) (async, rerun: 64) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) (async) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000280)={'\x00', 0x9, 0xd03, 0x0, 0x200, 0x7, r0}) syz_clone3(&(0x7f0000000200)={0x100, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x11}, &(0x7f00000000c0)=""/98, 0x62, &(0x7f0000000140)=""/102, &(0x7f00000001c0)=[r0], 0x1, {r1}}, 0x58) 19:12:17 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 5) [ 2397.753279][ T6679] FAULT_INJECTION: forcing a failure. [ 2397.753279][ T6679] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2397.768323][ T6681] FAULT_INJECTION: forcing a failure. [ 2397.768323][ T6681] name failslab, interval 1, probability 0, space 0, times 0 [ 2397.778426][ T6678] FAULT_INJECTION: forcing a failure. [ 2397.778426][ T6678] name failslab, interval 1, probability 0, space 0, times 0 [ 2397.790852][ T6681] CPU: 0 PID: 6681 Comm: syz-executor.2 Not tainted 5.15.138-syzkaller #0 [ 2397.802168][ T6681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2397.812242][ T6681] Call Trace: [ 2397.815556][ T6681] [ 2397.818506][ T6681] dump_stack_lvl+0x1e3/0x2cb [ 2397.823212][ T6681] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2397.828865][ T6681] ? panic+0x84d/0x84d [ 2397.833040][ T6681] ? __might_sleep+0xc0/0xc0 [ 2397.837648][ T6681] should_fail+0x38a/0x4c0 [ 2397.842085][ T6681] should_failslab+0x5/0x20 [ 2397.846612][ T6681] slab_pre_alloc_hook+0x53/0xc0 [ 2397.851574][ T6681] kmem_cache_alloc_node_trace+0x4e/0x2e0 [ 2397.857308][ T6681] ? __get_vm_area_node+0x11f/0x2f0 [ 2397.862523][ T6681] __get_vm_area_node+0x11f/0x2f0 [ 2397.867562][ T6681] ? __lock_acquire+0x1ff0/0x1ff0 [ 2397.872593][ T6681] __vmalloc_node_range+0xe3/0x8c0 [ 2397.877719][ T6681] ? copy_process+0x5eb/0x3ef0 [ 2397.882499][ T6681] ? rcu_is_watching+0x11/0xa0 [ 2397.887290][ T6681] ? kmem_cache_alloc_node+0x154/0x2c0 [ 2397.892833][ T6681] dup_task_struct+0x428/0xb60 [ 2397.897619][ T6681] ? copy_process+0x5eb/0x3ef0 [ 2397.902399][ T6681] ? _raw_spin_unlock_irq+0x1f/0x40 [ 2397.907606][ T6681] ? lockdep_hardirqs_on+0x94/0x130 [ 2397.912825][ T6681] copy_process+0x5eb/0x3ef0 [ 2397.917434][ T6681] ? __might_fault+0xb8/0x110 [ 2397.922121][ T6681] ? __lock_acquire+0x1ff0/0x1ff0 [ 2397.927166][ T6681] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2397.932288][ T6681] ? _copy_from_user+0x10f/0x170 [ 2397.937249][ T6681] kernel_clone+0x210/0x960 [ 2397.941782][ T6681] ? create_io_thread+0x1e0/0x1e0 [ 2397.946843][ T6681] __se_sys_clone3+0x3e1/0x430 [ 2397.951633][ T6681] ? __x64_sys_clone3+0x60/0x60 [ 2397.956522][ T6681] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2397.962512][ T6681] ? lockdep_hardirqs_on+0x94/0x130 [ 2397.967759][ T6681] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2397.973750][ T6681] do_syscall_64+0x3d/0xb0 [ 2397.978187][ T6681] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2397.984092][ T6681] RIP: 0033:0x7f205aae6ae9 [ 2397.988521][ T6681] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2398.008225][ T6681] RSP: 002b:00007f2059067f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2398.016650][ T6681] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f205aae6ae9 [ 2398.024625][ T6681] RDX: 00007f2059067fb0 RSI: 0000000000000058 RDI: 00007f2059067fb0 [ 2398.032703][ T6681] RBP: 00007f2059068120 R08: 0000000000000000 R09: 0000000000000058 [ 2398.040705][ T6681] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 19:12:17 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) ioctl$MEDIA_IOC_G_TOPOLOGY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000540)={0x0, 0x4, 0x0, &(0x7f0000000180)=[{}, {}, {}, {}], 0x1, 0x0, &(0x7f0000000080)=[{}], 0xa, 0x0, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}, {0x0, 0x80000000, 0x0, {0x0}}, {}, {}], 0x6, 0x0, &(0x7f0000000440)=[{}, {}, {}, {}, {}, {}]}) ioctl$MEDIA_IOC_SETUP_LINK(r0, 0xc0347c03, &(0x7f00000005c0)={{0x80000000, 0x0, 0x4, [0x5, 0x3]}, {0x80000000, r1, 0x0, [0x40, 0x3]}, 0x1, [0x9, 0x4]}) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x31, 0x33, 0x62, 0x61, 0x32, 0x62, 0x37, 0x61, 0x31, 0x39, 0x65, 0x37, 0x37, 0x92efd74bdf262af8, 0x38, 0x38]}, &(0x7f0000000100)={0x0, "71c4c0a08d4e593dddca2c10569849ec87842807b06a583680d9afde2ba125112971f6816af6267f7c0cf7996e0f3ecbfc31b75cfd239078bbe6ded425b9339a", 0x20}, 0x48, 0xfffffffffffffffb) keyctl$unlink(0x9, r2, 0xfffffffffffffff8) keyctl$negate(0xd, 0x0, 0x147c, 0xfffffffffffffff9) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (async) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) (async) ioctl$MEDIA_IOC_G_TOPOLOGY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000540)={0x0, 0x4, 0x0, &(0x7f0000000180)=[{}, {}, {}, {}], 0x1, 0x0, &(0x7f0000000080)=[{}], 0xa, 0x0, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x6, 0x0, &(0x7f0000000440)=[{}, {}, {}, {}, {}, {}]}) (async) ioctl$MEDIA_IOC_SETUP_LINK(r0, 0xc0347c03, &(0x7f00000005c0)={{0x80000000, 0x0, 0x4, [0x5, 0x3]}, {0x80000000, r1, 0x0, [0x40, 0x3]}, 0x1, [0x9, 0x4]}) (async) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x31, 0x33, 0x62, 0x61, 0x32, 0x62, 0x37, 0x61, 0x31, 0x39, 0x65, 0x37, 0x37, 0x92efd74bdf262af8, 0x38, 0x38]}, &(0x7f0000000100)={0x0, "71c4c0a08d4e593dddca2c10569849ec87842807b06a583680d9afde2ba125112971f6816af6267f7c0cf7996e0f3ecbfc31b75cfd239078bbe6ded425b9339a", 0x20}, 0x48, 0xfffffffffffffffb) (async) keyctl$unlink(0x9, r2, 0xfffffffffffffff8) (async) keyctl$negate(0xd, 0x0, 0x147c, 0xfffffffffffffff9) (async) [ 2398.048687][ T6681] R13: 000000000000000b R14: 00007f205ac05f80 R15: 00007ffc7dca06e8 [ 2398.056680][ T6681] [ 2398.059715][ T6678] CPU: 1 PID: 6678 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2398.068247][ T6678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2398.071691][ T6681] syz-executor.2: vmalloc error: size 32768, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 2398.078442][ T6678] Call Trace: [ 2398.078452][ T6678] [ 2398.078462][ T6678] dump_stack_lvl+0x1e3/0x2cb [ 2398.078494][ T6678] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2398.091645][ T6681] ,cpuset= [ 2398.094687][ T6678] ? panic+0x84d/0x84d [ 2398.094720][ T6678] ? __might_sleep+0xc0/0xc0 [ 2398.094752][ T6678] should_fail+0x38a/0x4c0 [ 2398.094778][ T6678] should_failslab+0x5/0x20 [ 2398.097889][ T6681] syz2 [ 2398.102378][ T6678] slab_pre_alloc_hook+0x53/0xc0 [ 2398.108317][ T6681] ,mems_allowed=0-1 [ 2398.111038][ T6678] __kmalloc+0x6e/0x300 [ 2398.111067][ T6678] ? security_prepare_creds+0x48/0x130 [ 2398.111097][ T6678] security_prepare_creds+0x48/0x130 [ 2398.111122][ T6678] prepare_creds+0x454/0x630 [ 2398.111147][ T6678] copy_creds+0x146/0xca0 [ 2398.118083][ T6681] [ 2398.119813][ T6678] copy_process+0x8a7/0x3ef0 [ 2398.119855][ T6678] ? __might_fault+0xb8/0x110 [ 2398.119881][ T6678] ? __lock_acquire+0x1ff0/0x1ff0 [ 2398.180547][ T6678] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2398.185688][ T6678] ? _copy_from_user+0x10f/0x170 [ 2398.190651][ T6678] kernel_clone+0x210/0x960 [ 2398.195170][ T6678] ? create_io_thread+0x1e0/0x1e0 [ 2398.200226][ T6678] __se_sys_clone3+0x3e1/0x430 [ 2398.205012][ T6678] ? __x64_sys_clone3+0x60/0x60 [ 2398.209902][ T6678] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2398.215913][ T6678] ? lockdep_hardirqs_on+0x94/0x130 [ 2398.221125][ T6678] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2398.227115][ T6678] do_syscall_64+0x3d/0xb0 [ 2398.231550][ T6678] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2398.237467][ T6678] RIP: 0033:0x7fa1e449cae9 [ 2398.242029][ T6678] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2398.261646][ T6678] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2398.270085][ T6678] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2398.278088][ T6678] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2398.286071][ T6678] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2398.294069][ T6678] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2398.302058][ T6678] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2398.310058][ T6678] [ 2398.325930][ T6679] CPU: 0 PID: 6679 Comm: syz-executor.1 Not tainted 5.15.138-syzkaller #0 [ 2398.334483][ T6679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2398.344598][ T6679] Call Trace: [ 2398.347900][ T6679] [ 2398.350852][ T6679] dump_stack_lvl+0x1e3/0x2cb 19:12:18 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) ioctl$MEDIA_IOC_G_TOPOLOGY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000540)={0x0, 0x4, 0x0, &(0x7f0000000180)=[{}, {}, {}, {}], 0x1, 0x0, &(0x7f0000000080)=[{}], 0xa, 0x0, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x6, 0x0, &(0x7f0000000440)=[{}, {}, {}, {}, {}, {}]}) (async) ioctl$MEDIA_IOC_G_TOPOLOGY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000540)={0x0, 0x4, 0x0, &(0x7f0000000180)=[{}, {}, {}, {}], 0x1, 0x0, &(0x7f0000000080)=[{}], 0xa, 0x0, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}, {0x0, 0x80000000, 0x0, {0x0}}, {}, {}], 0x6, 0x0, &(0x7f0000000440)=[{}, {}, {}, {}, {}, {}]}) ioctl$MEDIA_IOC_SETUP_LINK(r0, 0xc0347c03, &(0x7f00000005c0)={{0x80000000, 0x0, 0x4, [0x5, 0x3]}, {0x80000000, r1, 0x0, [0x40, 0x3]}, 0x1, [0x9, 0x4]}) (async) ioctl$MEDIA_IOC_SETUP_LINK(r0, 0xc0347c03, &(0x7f00000005c0)={{0x80000000, 0x0, 0x4, [0x5, 0x3]}, {0x80000000, r1, 0x0, [0x40, 0x3]}, 0x1, [0x9, 0x4]}) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x31, 0x33, 0x62, 0x61, 0x32, 0x62, 0x37, 0x61, 0x31, 0x39, 0x65, 0x37, 0x37, 0x92efd74bdf262af8, 0x38, 0x38]}, &(0x7f0000000100)={0x0, "71c4c0a08d4e593dddca2c10569849ec87842807b06a583680d9afde2ba125112971f6816af6267f7c0cf7996e0f3ecbfc31b75cfd239078bbe6ded425b9339a", 0x20}, 0x48, 0xfffffffffffffffb) keyctl$unlink(0x9, r2, 0xfffffffffffffff8) keyctl$negate(0xd, 0x0, 0x147c, 0xfffffffffffffff9) 19:12:18 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 6) [ 2398.355556][ T6679] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2398.361220][ T6679] ? panic+0x84d/0x84d [ 2398.365337][ T6679] should_fail+0x38a/0x4c0 [ 2398.369780][ T6679] _copy_from_user+0x2d/0x170 [ 2398.374481][ T6679] __se_sys_add_key+0x296/0x480 [ 2398.379363][ T6679] ? __x64_sys_add_key+0xc0/0xc0 [ 2398.384329][ T6679] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2398.390339][ T6679] ? lockdep_hardirqs_on+0x94/0x130 [ 2398.395572][ T6679] ? __x64_sys_add_key+0x1c/0xc0 [ 2398.400524][ T6679] do_syscall_64+0x3d/0xb0 19:12:18 executing program 3: syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) [ 2398.404982][ T6679] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2398.410902][ T6679] RIP: 0033:0x7fcc6920bae9 [ 2398.415358][ T6679] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2398.434984][ T6679] RSP: 002b:00007fcc6778d0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 2398.443411][ T6679] RAX: ffffffffffffffda RBX: 00007fcc6932af80 RCX: 00007fcc6920bae9 19:12:18 executing program 3: syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) [ 2398.451403][ T6679] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000000 [ 2398.459382][ T6679] RBP: 00007fcc6778d120 R08: fffffffffffffff8 R09: 0000000000000000 [ 2398.467385][ T6679] R10: 000000000000003f R11: 0000000000000246 R12: 0000000000000001 [ 2398.475367][ T6679] R13: 000000000000000b R14: 00007fcc6932af80 R15: 00007ffc30905548 [ 2398.483498][ T6679] [ 2398.487328][ T6681] CPU: 1 PID: 6681 Comm: syz-executor.2 Not tainted 5.15.138-syzkaller #0 [ 2398.495859][ T6681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2398.505931][ T6681] Call Trace: [ 2398.509223][ T6681] [ 2398.512164][ T6681] dump_stack_lvl+0x1e3/0x2cb [ 2398.516891][ T6681] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2398.522551][ T6681] ? panic+0x84d/0x84d [ 2398.526647][ T6681] ? __rcu_read_unlock+0x92/0x100 [ 2398.531707][ T6681] warn_alloc+0x278/0x3f0 [ 2398.536061][ T6681] ? zone_watermark_ok_safe+0x280/0x280 [ 2398.541623][ T6681] ? kmem_cache_alloc_node_trace+0x171/0x2e0 [ 2398.547626][ T6681] ? __get_vm_area_node+0x11f/0x2f0 [ 2398.552866][ T6681] ? __get_vm_area_node+0x2d6/0x2f0 [ 2398.558097][ T6681] ? __lock_acquire+0x1ff0/0x1ff0 [ 2398.563151][ T6681] __vmalloc_node_range+0x2b9/0x8c0 [ 2398.566974][ T6708] FAULT_INJECTION: forcing a failure. [ 2398.566974][ T6708] name failslab, interval 1, probability 0, space 0, times 0 [ 2398.568376][ T6681] ? rcu_is_watching+0x11/0xa0 [ 2398.568404][ T6681] ? kmem_cache_alloc_node+0x154/0x2c0 [ 2398.591221][ T6681] dup_task_struct+0x428/0xb60 [ 2398.596016][ T6681] ? copy_process+0x5eb/0x3ef0 [ 2398.600801][ T6681] ? _raw_spin_unlock_irq+0x1f/0x40 [ 2398.606029][ T6681] ? lockdep_hardirqs_on+0x94/0x130 [ 2398.611263][ T6681] copy_process+0x5eb/0x3ef0 [ 2398.615891][ T6681] ? __might_fault+0xb8/0x110 [ 2398.620599][ T6681] ? __lock_acquire+0x1ff0/0x1ff0 [ 2398.625657][ T6681] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2398.630795][ T6681] ? _copy_from_user+0x10f/0x170 [ 2398.633886][ T6711] FAULT_INJECTION: forcing a failure. [ 2398.633886][ T6711] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2398.635767][ T6681] kernel_clone+0x210/0x960 19:12:18 executing program 1: add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) (fail_nth: 6) 19:12:18 executing program 5: getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) socketpair(0x26, 0xe, 0x5, &(0x7f0000000380)={0xffffffffffffffff}) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e23}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x4c810) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r2, 0x10000000) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x5, 0x1, 0x3f, 0x9, 0x10, r2, 0x61, '\x00', r0, r3, 0x0, 0x2}, 0x48) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, 0x0, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, 0x0, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x7, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r7, 0x114, 0x7, 0x0, 0x0) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r8, 0x114, 0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1a, 0x4, &(0x7f00000000c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xb, 0x4, 0x7, 0x30, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0x7}], &(0x7f0000000100)='GPL\x00', 0x7fff, 0x51, &(0x7f0000000140)=""/81, 0x41100, 0x8, '\x00', r0, 0x30, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8, &(0x7f0000000200)=[r4, r5, r6, r7, 0x1, r8], &(0x7f0000000240)=[{0x3, 0x5, 0xc, 0x6}, {0x0, 0x5, 0xd, 0x2}, {0x1, 0x1, 0xa, 0x9}, {0x2, 0x5, 0xf, 0xc}, {0x4, 0x1, 0x6, 0x8}, {0x5, 0x4, 0xf, 0x9}, {0x1, 0x4, 0x8, 0xb}, {0x5, 0x5, 0xd, 0x3}], 0x10, 0x7}, 0x90) add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="3a33bbb3523f724aa44017e4ee6e5ec80b9b145f905b18ee474a7ed1d21a5f7e87", 0x21, 0xfffffffffffffffd) [ 2398.635800][ T6681] ? create_io_thread+0x1e0/0x1e0 [ 2398.635840][ T6681] __se_sys_clone3+0x3e1/0x430 [ 2398.663099][ T6681] ? __x64_sys_clone3+0x60/0x60 [ 2398.668000][ T6681] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2398.674001][ T6681] ? lockdep_hardirqs_on+0x94/0x130 [ 2398.679504][ T6681] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2398.685508][ T6681] do_syscall_64+0x3d/0xb0 [ 2398.689950][ T6681] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2398.695869][ T6681] RIP: 0033:0x7f205aae6ae9 [ 2398.700306][ T6681] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2398.719923][ T6681] RSP: 002b:00007f2059067f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2398.728350][ T6681] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f205aae6ae9 [ 2398.736341][ T6681] RDX: 00007f2059067fb0 RSI: 0000000000000058 RDI: 00007f2059067fb0 [ 2398.744325][ T6681] RBP: 00007f2059068120 R08: 0000000000000000 R09: 0000000000000058 [ 2398.752303][ T6681] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2398.760306][ T6681] R13: 000000000000000b R14: 00007f205ac05f80 R15: 00007ffc7dca06e8 [ 2398.768304][ T6681] [ 2398.773744][ T6708] CPU: 0 PID: 6708 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2398.782283][ T6708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2398.792352][ T6708] Call Trace: [ 2398.795643][ T6708] [ 2398.798592][ T6708] dump_stack_lvl+0x1e3/0x2cb [ 2398.803303][ T6708] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2398.808957][ T6708] ? panic+0x84d/0x84d [ 2398.813027][ T6708] ? __might_sleep+0xc0/0xc0 [ 2398.817638][ T6708] should_fail+0x38a/0x4c0 [ 2398.822071][ T6708] should_failslab+0x5/0x20 [ 2398.826573][ T6708] slab_pre_alloc_hook+0x53/0xc0 [ 2398.831512][ T6708] __kmalloc+0x6e/0x300 [ 2398.835669][ T6708] ? security_task_alloc+0x3f/0x120 [ 2398.840890][ T6708] security_task_alloc+0x3f/0x120 [ 2398.845921][ T6708] copy_process+0x1664/0x3ef0 [ 2398.850625][ T6708] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2398.855736][ T6708] ? _copy_from_user+0x10f/0x170 [ 2398.860677][ T6708] kernel_clone+0x210/0x960 [ 2398.865183][ T6708] ? create_io_thread+0x1e0/0x1e0 [ 2398.870214][ T6708] __se_sys_clone3+0x3e1/0x430 [ 2398.874981][ T6708] ? __x64_sys_clone3+0x60/0x60 [ 2398.879851][ T6708] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2398.885831][ T6708] ? lockdep_hardirqs_on+0x94/0x130 [ 2398.891033][ T6708] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2398.897011][ T6708] do_syscall_64+0x3d/0xb0 [ 2398.901430][ T6708] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2398.907325][ T6708] RIP: 0033:0x7fa1e449cae9 [ 2398.911737][ T6708] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2398.931339][ T6708] RSP: 002b:00007fa1e29fcf98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2398.939750][ T6708] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2398.947726][ T6708] RDX: 00007fa1e29fcfb0 RSI: 0000000000000058 RDI: 00007fa1e29fcfb0 19:12:18 executing program 3: syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) [ 2398.955695][ T6708] RBP: 00007fa1e29fd120 R08: 0000000000000000 R09: 0000000000000058 [ 2398.963667][ T6708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2398.971640][ T6708] R13: 000000000000006e R14: 00007fa1e45bc050 R15: 00007fff9ee6cff8 [ 2398.979618][ T6708] [ 2398.993586][ T6681] Mem-Info: [ 2399.000898][ T6681] active_anon:15620 inactive_anon:27780 isolated_anon:0 [ 2399.000898][ T6681] active_file:5560 inactive_file:41506 isolated_file:0 [ 2399.000898][ T6681] unevictable:768 dirty:27 writeback:0 [ 2399.000898][ T6681] slab_reclaimable:24830 slab_unreclaimable:114190 [ 2399.000898][ T6681] mapped:28768 shmem:16872 pagetables:639 bounce:0 [ 2399.000898][ T6681] kernel_misc_reclaimable:0 [ 2399.000898][ T6681] free:1366852 free_pcp:9869 free_cma:0 [ 2399.054868][ T6711] CPU: 0 PID: 6711 Comm: syz-executor.1 Not tainted 5.15.138-syzkaller #0 [ 2399.063536][ T6711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2399.073597][ T6711] Call Trace: [ 2399.076876][ T6711] [ 2399.079821][ T6711] dump_stack_lvl+0x1e3/0x2cb [ 2399.084515][ T6711] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2399.090152][ T6711] ? panic+0x84d/0x84d [ 2399.094227][ T6711] ? snprintf+0xd6/0x120 [ 2399.098476][ T6711] should_fail+0x38a/0x4c0 [ 2399.102898][ T6711] _copy_to_user+0x2d/0x130 [ 2399.107408][ T6711] simple_read_from_buffer+0xc6/0x150 [ 2399.112787][ T6711] proc_fail_nth_read+0x1a3/0x210 [ 2399.117827][ T6711] ? proc_fault_inject_write+0x390/0x390 [ 2399.123495][ T6711] ? fsnotify_perm+0x438/0x5a0 [ 2399.128274][ T6711] ? proc_fault_inject_write+0x390/0x390 [ 2399.133915][ T6711] vfs_read+0x300/0xe10 [ 2399.138083][ T6711] ? kernel_read+0x1f0/0x1f0 [ 2399.142681][ T6711] ? __fget_files+0x413/0x480 [ 2399.147582][ T6711] ? mutex_lock_nested+0x17/0x20 [ 2399.152523][ T6711] ? __fdget_pos+0x2cb/0x380 [ 2399.157143][ T6711] ? ksys_read+0x77/0x2c0 [ 2399.161477][ T6711] ksys_read+0x1a2/0x2c0 [ 2399.165736][ T6711] ? print_irqtrace_events+0x210/0x210 [ 2399.171231][ T6711] ? vfs_write+0xe50/0xe50 [ 2399.175659][ T6711] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2399.181646][ T6711] ? lockdep_hardirqs_on+0x94/0x130 [ 2399.186862][ T6711] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2399.192860][ T6711] do_syscall_64+0x3d/0xb0 [ 2399.197291][ T6711] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2399.203308][ T6711] RIP: 0033:0x7fcc6920a78c [ 2399.207730][ T6711] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48 [ 2399.227447][ T6711] RSP: 002b:00007fcc6778d0c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2399.235863][ T6711] RAX: ffffffffffffffda RBX: 00007fcc6932af80 RCX: 00007fcc6920a78c [ 2399.243858][ T6711] RDX: 000000000000000f RSI: 00007fcc6778d130 RDI: 0000000000000003 [ 2399.251837][ T6711] RBP: 00007fcc6778d120 R08: 0000000000000000 R09: 0000000000000000 [ 2399.260260][ T6711] R10: 000000000000003f R11: 0000000000000246 R12: 0000000000000001 [ 2399.268242][ T6711] R13: 000000000000000b R14: 00007fcc6932af80 R15: 00007ffc30905548 [ 2399.276349][ T6711] [ 2399.308855][ T6681] Node 0 active_anon:62472kB inactive_anon:110704kB active_file:22168kB inactive_file:166024kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:115072kB dirty:104kB writeback:0kB shmem:65428kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:15304kB pagetables:2556kB all_unreclaimable? no [ 2399.362918][ T6681] Node 1 active_anon:8kB inactive_anon:516kB active_file:72kB inactive_file:0kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:2060kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:16kB pagetables:0kB all_unreclaimable? no [ 2399.393765][ T6681] Node 0 DMA free:15360kB min:200kB low:248kB high:296kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2399.422009][ T6681] lowmem_reserve[]: 0 2629 2630 2630 2630 [ 2399.428074][ T6681] Node 0 DMA32 free:1508628kB min:35532kB low:44412kB high:53292kB reserved_highatomic:0KB active_anon:62472kB inactive_anon:110604kB active_file:22168kB inactive_file:166024kB unevictable:1536kB writepending:104kB present:3129332kB managed:2699564kB mlocked:0kB bounce:0kB free_pcp:42032kB local_pcp:21196kB free_cma:0kB [ 2399.465560][ T6681] lowmem_reserve[]: 0 0 0 0 0 [ 2399.473764][ T6681] Node 0 Normal free:0kB min:8kB low:8kB high:8kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:1048576kB managed:660kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2399.502550][ T6681] lowmem_reserve[]: 0 0 0 0 0 [ 2399.507384][ T6681] Node 1 Normal free:3947724kB min:54364kB low:67952kB high:81540kB reserved_highatomic:0KB active_anon:8kB inactive_anon:516kB active_file:72kB inactive_file:0kB unevictable:1536kB writepending:4kB present:4194304kB managed:4119672kB mlocked:0kB bounce:0kB free_pcp:128kB local_pcp:128kB free_cma:0kB [ 2399.536914][ T6681] lowmem_reserve[]: 0 0 0 0 0 [ 2399.541800][ T6681] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 2399.554643][ T6681] Node 0 DMA32: 11473*4kB (UME) 6358*8kB (UME) 4860*16kB (UME) 4741*32kB (UME) 2889*64kB (UME) 1275*128kB (UME) 491*256kB (UME) 126*512kB (UME) 17*1024kB (UME) 8*2048kB (UME) 149*4096kB (UM) = 1508628kB [ 2399.575141][ T6681] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2399.586845][ T6681] Node 1 Normal: 143*4kB (UME) 38*8kB (UME) 18*16kB (UME) 104*32kB (UME) 67*64kB (UME) 25*128kB (UME) 14*256kB (UM) 4*512kB (U) 0*1024kB 3*2048kB (UME) 958*4096kB (M) = 3947724kB [ 2399.605768][ T6681] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2399.616363][ T6681] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 2399.625862][ T6681] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2399.635597][ T6681] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 2399.645438][ T6681] 63941 total pagecache pages [ 2399.650251][ T6681] 0 pages in swap cache [ 2399.654581][ T6681] Swap cache stats: add 0, delete 0, find 0/0 [ 2399.660846][ T6681] Free swap = 124996kB 19:12:19 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:19 executing program 3: r0 = add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="ee875ec755011b24781af2cef80151ac589d0a307a7cfee4ac8af3b35c702f4f119f577a5bcf79ebdbbed76d7cfaded909a0857fdab31338a8f3e1c3f8dc08b377b982345c24f8cdc46321003ce72141bbb0eb1136a97d22c54b5823434bd2d3a30b15cd94ec03f32940d229a22ebf29de2d16541e1cb72b09051a400f218d64c807d34a", 0x84, 0xfffffffffffffff8) keyctl$unlink(0x18, r0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) 19:12:19 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) read$FUSE(0xffffffffffffffff, &(0x7f0000001240)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (async) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000280)={'\x00', 0x9, 0xd03, 0x0, 0x200, 0x7, r0}) (async) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000280)={'\x00', 0x9, 0xd03, 0x0, 0x200, 0x7, r0}) syz_clone3(&(0x7f0000000200)={0x100, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x11}, &(0x7f00000000c0)=""/98, 0x62, &(0x7f0000000140)=""/102, &(0x7f00000001c0)=[r0], 0x1, {r1}}, 0x58) 19:12:19 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 7) 19:12:19 executing program 1: add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) 19:12:19 executing program 5: getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) socketpair(0x26, 0xe, 0x5, &(0x7f0000000380)={0xffffffffffffffff}) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e23}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x4c810) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r2, 0x10000000) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x5, 0x1, 0x3f, 0x9, 0x10, r2, 0x61, '\x00', r0, r3, 0x0, 0x2}, 0x48) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, 0x0, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, 0x0, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x7, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r7, 0x114, 0x7, 0x0, 0x0) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r8, 0x114, 0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1a, 0x4, &(0x7f00000000c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xb, 0x4, 0x7, 0x30, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0x7}], &(0x7f0000000100)='GPL\x00', 0x7fff, 0x51, &(0x7f0000000140)=""/81, 0x41100, 0x8, '\x00', r0, 0x30, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8, &(0x7f0000000200)=[r4, r5, r6, r7, 0x1, r8], &(0x7f0000000240)=[{0x3, 0x5, 0xc, 0x6}, {0x0, 0x5, 0xd, 0x2}, {0x1, 0x1, 0xa, 0x9}, {0x2, 0x5, 0xf, 0xc}, {0x4, 0x1, 0x6, 0x8}, {0x5, 0x4, 0xf, 0x9}, {0x1, 0x4, 0x8, 0xb}, {0x5, 0x5, 0xd, 0x3}], 0x10, 0x7}, 0x90) [ 2399.665176][ T6681] Total swap = 124996kB [ 2399.669472][ T6681] 2097051 pages RAM [ 2399.673466][ T6681] 0 pages HighMem/MovableOnly [ 2399.678275][ T6681] 388237 pages reserved [ 2399.682597][ T6681] 0 pages cma reserved 19:12:19 executing program 3: r0 = add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="ee875ec755011b24781af2cef80151ac589d0a307a7cfee4ac8af3b35c702f4f119f577a5bcf79ebdbbed76d7cfaded909a0857fdab31338a8f3e1c3f8dc08b377b982345c24f8cdc46321003ce72141bbb0eb1136a97d22c54b5823434bd2d3a30b15cd94ec03f32940d229a22ebf29de2d16541e1cb72b09051a400f218d64c807d34a", 0x84, 0xfffffffffffffff8) keyctl$unlink(0x18, r0, 0xfffffffffffffffb) (async) keyctl$unlink(0x18, r0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) 19:12:19 executing program 1: add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) [ 2399.742175][ T6722] FAULT_INJECTION: forcing a failure. [ 2399.742175][ T6722] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2399.820196][ T6722] CPU: 1 PID: 6722 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2399.828741][ T6722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2399.838815][ T6722] Call Trace: [ 2399.842105][ T6722] [ 2399.845048][ T6722] dump_stack_lvl+0x1e3/0x2cb [ 2399.849749][ T6722] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2399.855408][ T6722] ? panic+0x84d/0x84d [ 2399.859509][ T6722] should_fail+0x38a/0x4c0 [ 2399.863971][ T6722] prepare_alloc_pages+0x1db/0x5b0 19:12:19 executing program 3: r0 = add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="ee875ec755011b24781af2cef80151ac589d0a307a7cfee4ac8af3b35c702f4f119f577a5bcf79ebdbbed76d7cfaded909a0857fdab31338a8f3e1c3f8dc08b377b982345c24f8cdc46321003ce72141bbb0eb1136a97d22c54b5823434bd2d3a30b15cd94ec03f32940d229a22ebf29de2d16541e1cb72b09051a400f218d64c807d34a", 0x84, 0xfffffffffffffff8) keyctl$unlink(0x18, r0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="ee875ec755011b24781af2cef80151ac589d0a307a7cfee4ac8af3b35c702f4f119f577a5bcf79ebdbbed76d7cfaded909a0857fdab31338a8f3e1c3f8dc08b377b982345c24f8cdc46321003ce72141bbb0eb1136a97d22c54b5823434bd2d3a30b15cd94ec03f32940d229a22ebf29de2d16541e1cb72b09051a400f218d64c807d34a", 0x84, 0xfffffffffffffff8) (async) keyctl$unlink(0x18, r0, 0xfffffffffffffffb) (async) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) (async) [ 2399.869146][ T6722] __alloc_pages+0x14f/0x700 [ 2399.873764][ T6722] ? __rmqueue_pcplist+0x2030/0x2030 [ 2399.879087][ T6722] ? alloc_pages+0x458/0x570 [ 2399.883726][ T6722] __get_free_pages+0x8/0x30 [ 2399.888344][ T6722] kasan_populate_vmalloc_pte+0x2a/0xd0 [ 2399.893931][ T6722] ? __apply_to_page_range+0x9ad/0xcc0 [ 2399.899420][ T6722] __apply_to_page_range+0x9bf/0xcc0 [ 2399.904743][ T6722] ? kasan_populate_vmalloc+0x70/0x70 [ 2399.910139][ T6722] alloc_vmap_area+0x1875/0x19a0 [ 2399.915115][ T6722] ? vm_map_ram+0xb80/0xb80 19:12:19 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x2, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) [ 2399.919643][ T6722] ? kmem_cache_alloc_node_trace+0x171/0x2e0 [ 2399.925644][ T6722] ? __get_vm_area_node+0x11f/0x2f0 [ 2399.930874][ T6722] __get_vm_area_node+0x16e/0x2f0 [ 2399.935932][ T6722] __vmalloc_node_range+0xe3/0x8c0 [ 2399.941083][ T6722] ? copy_process+0x5eb/0x3ef0 [ 2399.945885][ T6722] ? rcu_is_watching+0x11/0xa0 [ 2399.950669][ T6722] ? kmem_cache_alloc_node+0x154/0x2c0 [ 2399.956154][ T6722] dup_task_struct+0x428/0xb60 [ 2399.960965][ T6722] ? copy_process+0x5eb/0x3ef0 [ 2399.965758][ T6722] ? _raw_spin_unlock_irq+0x1f/0x40 [ 2399.970976][ T6722] ? lockdep_hardirqs_on+0x94/0x130 [ 2399.976207][ T6722] copy_process+0x5eb/0x3ef0 [ 2399.980834][ T6722] ? __might_fault+0xb8/0x110 [ 2399.985537][ T6722] ? __lock_acquire+0x1ff0/0x1ff0 [ 2399.990589][ T6722] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2399.995728][ T6722] ? _copy_from_user+0x10f/0x170 [ 2400.000704][ T6722] kernel_clone+0x210/0x960 [ 2400.005225][ T6722] ? ata_scsi_park_store+0x900/0x920 [ 2400.010643][ T6722] ? create_io_thread+0x1e0/0x1e0 [ 2400.015727][ T6722] __se_sys_clone3+0x3e1/0x430 19:12:20 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x7, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) [ 2400.020511][ T6722] ? __x64_sys_clone3+0x60/0x60 [ 2400.025437][ T6722] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2400.031435][ T6722] ? lockdep_hardirqs_on+0x94/0x130 [ 2400.036670][ T6722] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2400.042828][ T6722] do_syscall_64+0x3d/0xb0 [ 2400.047270][ T6722] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2400.053195][ T6722] RIP: 0033:0x7fa1e449cae9 [ 2400.057634][ T6722] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2400.077439][ T6722] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2400.085883][ T6722] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2400.093879][ T6722] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2400.101982][ T6722] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2400.109973][ T6722] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 19:12:20 executing program 1: add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2, 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) 19:12:20 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x8, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:20 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) syz_io_uring_setup(0x15df, &(0x7f0000000140)={0x0, 0x5a9e, 0x400, 0x1, 0x332, 0x0, r1}, &(0x7f00000001c0), &(0x7f0000000200)) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000040)) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x80000001}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {0x1}}, './file0\x00'}) ioctl$BLKROGET(r3, 0x125e, &(0x7f00000000c0)) [ 2400.117961][ T6722] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2400.125970][ T6722] 19:12:20 executing program 4: r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = getpgrp(r0) r2 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040)=0x0, &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r2, 0x0, 0x0], 0x9}, 0x58) syz_clone3(&(0x7f0000001240)={0x11b050c00, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x2d}, &(0x7f00000012c0)=""/4098, 0x1002, &(0x7f0000000300)=""/73, &(0x7f0000001140)=[r0, r0, r0, r3, r1, r1], 0x6}, 0x58) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:12:20 executing program 5: getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) socketpair(0x26, 0xe, 0x5, &(0x7f0000000380)={0xffffffffffffffff}) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e23}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x4c810) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r2, 0x10000000) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x5, 0x1, 0x3f, 0x9, 0x10, r2, 0x61, '\x00', r0, r3, 0x0, 0x2}, 0x48) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, 0x0, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, 0x0, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x7, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r7, 0x114, 0x7, 0x0, 0x0) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r8, 0x114, 0x7, 0x0, 0x0) 19:12:20 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 8) 19:12:20 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x9, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:20 executing program 1: add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2, 0x7}, 0x0, 0x3f, 0xfffffffffffffff8) 19:12:20 executing program 3: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) (async) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) syz_io_uring_setup(0x15df, &(0x7f0000000140)={0x0, 0x5a9e, 0x400, 0x1, 0x332, 0x0, r1}, &(0x7f00000001c0), &(0x7f0000000200)) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000040)) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x80000001}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {0x1}}, './file0\x00'}) ioctl$BLKROGET(r3, 0x125e, &(0x7f00000000c0)) (async) ioctl$BLKROGET(r3, 0x125e, &(0x7f00000000c0)) 19:12:20 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x11, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:20 executing program 1: add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x1001, 0xfffffffffffffff8) [ 2400.564362][ T6764] FAULT_INJECTION: forcing a failure. [ 2400.564362][ T6764] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2400.609335][ T6764] CPU: 1 PID: 6764 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2400.617966][ T6764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2400.628328][ T6764] Call Trace: [ 2400.631636][ T6764] [ 2400.634588][ T6764] dump_stack_lvl+0x1e3/0x2cb [ 2400.639302][ T6764] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2400.644963][ T6764] ? panic+0x84d/0x84d [ 2400.649070][ T6764] ? __lock_acquire+0x1295/0x1ff0 [ 2400.654134][ T6764] should_fail+0x38a/0x4c0 [ 2400.658581][ T6764] prepare_alloc_pages+0x1db/0x5b0 [ 2400.663724][ T6764] __alloc_pages+0x14f/0x700 [ 2400.668342][ T6764] ? __rmqueue_pcplist+0x2030/0x2030 [ 2400.673653][ T6764] ? do_raw_spin_lock+0x14a/0x370 [ 2400.678713][ T6764] ? alloc_pages+0x458/0x570 [ 2400.683338][ T6764] __get_free_pages+0x8/0x30 [ 2400.687953][ T6764] kasan_populate_vmalloc_pte+0x2a/0xd0 [ 2400.693523][ T6764] ? __apply_to_page_range+0x9ad/0xcc0 [ 2400.699017][ T6764] __apply_to_page_range+0x9bf/0xcc0 [ 2400.704424][ T6764] ? kasan_populate_vmalloc+0x70/0x70 19:12:20 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x41, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:20 executing program 1: add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0xfffff, 0xfffffffffffffff8) [ 2400.709829][ T6764] alloc_vmap_area+0x1875/0x19a0 [ 2400.714817][ T6764] ? vm_map_ram+0xb80/0xb80 [ 2400.719354][ T6764] ? kmem_cache_alloc_node_trace+0x171/0x2e0 [ 2400.725368][ T6764] ? __get_vm_area_node+0x11f/0x2f0 [ 2400.730601][ T6764] __get_vm_area_node+0x16e/0x2f0 [ 2400.735662][ T6764] __vmalloc_node_range+0xe3/0x8c0 [ 2400.740850][ T6764] ? copy_process+0x5eb/0x3ef0 [ 2400.745642][ T6764] ? rcu_is_watching+0x11/0xa0 [ 2400.750431][ T6764] ? kmem_cache_alloc_node+0x154/0x2c0 19:12:20 executing program 1: add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x7ffffffff000, 0xfffffffffffffff8) [ 2400.750467][ T6764] dup_task_struct+0x428/0xb60 [ 2400.760676][ T6764] ? copy_process+0x5eb/0x3ef0 [ 2400.765456][ T6764] ? _raw_spin_unlock_irq+0x1f/0x40 [ 2400.770675][ T6764] ? lockdep_hardirqs_on+0x94/0x130 [ 2400.775902][ T6764] copy_process+0x5eb/0x3ef0 [ 2400.780531][ T6764] ? __might_fault+0xb8/0x110 [ 2400.785230][ T6764] ? __lock_acquire+0x1ff0/0x1ff0 [ 2400.790293][ T6764] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2400.795429][ T6764] ? _copy_from_user+0x10f/0x170 [ 2400.800397][ T6764] kernel_clone+0x210/0x960 [ 2400.804932][ T6764] ? create_io_thread+0x1e0/0x1e0 19:12:20 executing program 1: add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 2400.809998][ T6764] __se_sys_clone3+0x3e1/0x430 [ 2400.814807][ T6764] ? __x64_sys_clone3+0x60/0x60 [ 2400.819710][ T6764] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2400.825714][ T6764] ? lockdep_hardirqs_on+0x94/0x130 [ 2400.830939][ T6764] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2400.836945][ T6764] do_syscall_64+0x3d/0xb0 [ 2400.841391][ T6764] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2400.847309][ T6764] RIP: 0033:0x7fa1e449cae9 19:12:20 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpgrp(r0) (async) r1 = getpgrp(r0) r2 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040)=0x0, &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r2, 0x0, 0x0], 0x9}, 0x58) syz_clone3(&(0x7f0000001240)={0x11b050c00, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x2d}, &(0x7f00000012c0)=""/4098, 0x1002, &(0x7f0000000300)=""/73, &(0x7f0000001140)=[r0, r0, r0, r3, r1, r1], 0x6}, 0x58) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 2400.851742][ T6764] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2400.871467][ T6764] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2400.879910][ T6764] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2400.889470][ T6764] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2400.897469][ T6764] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2400.905977][ T6764] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2400.913969][ T6764] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2400.921974][ T6764] 19:12:20 executing program 5: getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) socketpair(0x26, 0xe, 0x5, &(0x7f0000000380)={0xffffffffffffffff}) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e23}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x4c810) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r2, 0x10000000) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x5, 0x1, 0x3f, 0x9, 0x10, r2, 0x61, '\x00', r0, r3, 0x0, 0x2}, 0x48) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, 0x0, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, 0x0, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x7, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r7, 0x114, 0x7, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) 19:12:20 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 9) 19:12:20 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x70, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:20 executing program 1: add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 19:12:20 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) syz_io_uring_setup(0x15df, &(0x7f0000000140)={0x0, 0x5a9e, 0x400, 0x1, 0x332, 0x0, r1}, &(0x7f00000001c0), &(0x7f0000000200)) (async) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000040)) (async) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x80000001}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {0x1}}, './file0\x00'}) ioctl$BLKROGET(r3, 0x125e, &(0x7f00000000c0)) 19:12:21 executing program 1: add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 19:12:21 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 19:12:21 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x700, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) [ 2401.070211][ T6798] FAULT_INJECTION: forcing a failure. [ 2401.070211][ T6798] name failslab, interval 1, probability 0, space 0, times 0 [ 2401.117530][ T6798] CPU: 0 PID: 6798 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2401.126072][ T6798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2401.136147][ T6798] Call Trace: [ 2401.139455][ T6798] [ 2401.142397][ T6798] dump_stack_lvl+0x1e3/0x2cb [ 2401.147102][ T6798] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2401.152776][ T6798] ? panic+0x84d/0x84d [ 2401.156865][ T6798] ? __might_sleep+0xc0/0xc0 [ 2401.161478][ T6798] ? do_raw_spin_lock+0x14a/0x370 [ 2401.166529][ T6798] should_fail+0x38a/0x4c0 [ 2401.170968][ T6798] should_failslab+0x5/0x20 [ 2401.175493][ T6798] slab_pre_alloc_hook+0x53/0xc0 [ 2401.180457][ T6798] __kmalloc_node+0x71/0x390 [ 2401.185091][ T6798] ? __vmalloc_node_range+0x2e2/0x8c0 [ 2401.190501][ T6798] __vmalloc_node_range+0x2e2/0x8c0 [ 2401.195731][ T6798] ? kmem_cache_alloc_node+0x154/0x2c0 [ 2401.201224][ T6798] dup_task_struct+0x428/0xb60 [ 2401.206009][ T6798] ? copy_process+0x5eb/0x3ef0 [ 2401.210879][ T6798] ? _raw_spin_unlock_irq+0x1f/0x40 19:12:21 executing program 1: r0 = add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$reject(0x13, r1, 0xafb, 0x7fffffffffffffff, r0) 19:12:21 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 19:12:21 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) [ 2401.216099][ T6798] ? lockdep_hardirqs_on+0x94/0x130 [ 2401.221324][ T6798] copy_process+0x5eb/0x3ef0 [ 2401.225949][ T6798] ? __might_fault+0xb8/0x110 [ 2401.230657][ T6798] ? __lock_acquire+0x1ff0/0x1ff0 [ 2401.235732][ T6798] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2401.240874][ T6798] ? _copy_from_user+0x10f/0x170 [ 2401.245844][ T6798] kernel_clone+0x210/0x960 [ 2401.250376][ T6798] ? create_io_thread+0x1e0/0x1e0 [ 2401.255445][ T6798] __se_sys_clone3+0x3e1/0x430 [ 2401.260232][ T6798] ? __x64_sys_clone3+0x60/0x60 [ 2401.265129][ T6798] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2401.271134][ T6798] ? lockdep_hardirqs_on+0x94/0x130 [ 2401.276362][ T6798] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2401.282364][ T6798] do_syscall_64+0x3d/0xb0 [ 2401.286823][ T6798] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2401.292832][ T6798] RIP: 0033:0x7fa1e449cae9 [ 2401.297277][ T6798] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2401.316910][ T6798] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2401.325349][ T6798] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2401.333341][ T6798] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2401.341326][ T6798] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2401.349312][ T6798] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2401.357304][ T6798] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2401.365308][ T6798] 19:12:21 executing program 4: r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = getpgrp(r0) (async) r2 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040)=0x0, &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r2, 0x0, 0x0], 0x9}, 0x58) syz_clone3(&(0x7f0000001240)={0x11b050c00, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x2d}, &(0x7f00000012c0)=""/4098, 0x1002, &(0x7f0000000300)=""/73, &(0x7f0000001140)=[r0, r0, r0, r3, r1, r1], 0x6}, 0x58) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:12:21 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) (async) 19:12:21 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:21 executing program 1: r0 = add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) (async) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) (async) keyctl$reject(0x13, r1, 0xafb, 0x7fffffffffffffff, r0) 19:12:21 executing program 5: getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) socketpair(0x26, 0xe, 0x5, &(0x7f0000000380)={0xffffffffffffffff}) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e23}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x4c810) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r2, 0x10000000) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x5, 0x1, 0x3f, 0x9, 0x10, r2, 0x61, '\x00', r0, r3, 0x0, 0x2}, 0x48) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, 0x0, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, 0x0, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x7, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r7, 0x114, 0x7, 0x0, 0x0) 19:12:21 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 10) 19:12:21 executing program 3: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$unlink(0x18, 0x0, r1) [ 2401.731158][ T6826] FAULT_INJECTION: forcing a failure. [ 2401.731158][ T6826] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2401.796121][ T6826] CPU: 1 PID: 6826 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2401.804680][ T6826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2401.814764][ T6826] Call Trace: [ 2401.818054][ T6826] [ 2401.820995][ T6826] dump_stack_lvl+0x1e3/0x2cb [ 2401.825702][ T6826] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2401.831366][ T6826] ? panic+0x84d/0x84d [ 2401.835457][ T6826] ? do_syscall_64+0x3d/0xb0 [ 2401.840083][ T6826] should_fail+0x38a/0x4c0 [ 2401.844535][ T6826] prepare_alloc_pages+0x1db/0x5b0 [ 2401.849680][ T6826] __alloc_pages+0x14f/0x700 [ 2401.854295][ T6826] ? __rmqueue_pcplist+0x2030/0x2030 [ 2401.859610][ T6826] ? alloc_pages+0x458/0x570 [ 2401.864229][ T6826] __vmalloc_node_range+0x5ab/0x8c0 [ 2401.869471][ T6826] dup_task_struct+0x428/0xb60 [ 2401.874253][ T6826] ? copy_process+0x5eb/0x3ef0 [ 2401.879041][ T6826] ? _raw_spin_unlock_irq+0x1f/0x40 [ 2401.884264][ T6826] ? lockdep_hardirqs_on+0x94/0x130 [ 2401.889494][ T6826] copy_process+0x5eb/0x3ef0 [ 2401.894124][ T6826] ? __might_fault+0xb8/0x110 [ 2401.898826][ T6826] ? __lock_acquire+0x1ff0/0x1ff0 [ 2401.903893][ T6826] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2401.909027][ T6826] ? _copy_from_user+0x10f/0x170 [ 2401.913988][ T6826] kernel_clone+0x210/0x960 [ 2401.918516][ T6826] ? create_io_thread+0x1e0/0x1e0 [ 2401.923583][ T6826] __se_sys_clone3+0x3e1/0x430 [ 2401.928369][ T6826] ? __x64_sys_clone3+0x60/0x60 [ 2401.933271][ T6826] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2401.939264][ T6826] ? lockdep_hardirqs_on+0x94/0x130 [ 2401.944481][ T6826] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2401.950488][ T6826] do_syscall_64+0x3d/0xb0 [ 2401.954930][ T6826] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2401.960851][ T6826] RIP: 0033:0x7fa1e449cae9 [ 2401.965278][ T6826] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2401.984906][ T6826] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 19:12:22 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x1f00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:22 executing program 5: getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) socketpair(0x26, 0xe, 0x5, &(0x7f0000000380)={0xffffffffffffffff}) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e23}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x4c810) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r2, 0x10000000) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x5, 0x1, 0x3f, 0x9, 0x10, r2, 0x61, '\x00', r0, r3, 0x0, 0x2}, 0x48) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, 0x0, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, 0x0, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x7, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) 19:12:22 executing program 1: r0 = add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$reject(0x13, r1, 0xafb, 0x7fffffffffffffff, r0) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) (async) keyctl$reject(0x13, r1, 0xafb, 0x7fffffffffffffff, r0) (async) [ 2401.993347][ T6826] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2402.001336][ T6826] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2402.009313][ T6826] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2402.017341][ T6826] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2402.025326][ T6826] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2402.033331][ T6826] 19:12:22 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 11) 19:12:22 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x2000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:22 executing program 4: setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000140)={@l2tp={0x2, 0x0, @empty, 0x4}, {&(0x7f0000000000)=""/253, 0xfd}, &(0x7f0000000100), 0x32}, 0xa0) 19:12:22 executing program 3: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$unlink(0x18, 0x0, r1) 19:12:22 executing program 5: getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) socketpair(0x26, 0xe, 0x5, &(0x7f0000000380)={0xffffffffffffffff}) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e23}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x4c810) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r2, 0x10000000) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x5, 0x1, 0x3f, 0x9, 0x10, r2, 0x61, '\x00', r0, r3, 0x0, 0x2}, 0x48) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, 0x0, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, 0x0, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x7, 0x0, 0x0) [ 2402.169449][ T6847] FAULT_INJECTION: forcing a failure. [ 2402.169449][ T6847] name fail_page_alloc, interval 1, probability 0, space 0, times 0 19:12:22 executing program 3: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) (async) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$unlink(0x18, 0x0, r1) [ 2402.222326][ T6847] CPU: 1 PID: 6847 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2402.230876][ T6847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2402.240948][ T6847] Call Trace: [ 2402.244246][ T6847] [ 2402.247189][ T6847] dump_stack_lvl+0x1e3/0x2cb [ 2402.251896][ T6847] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2402.257564][ T6847] ? panic+0x84d/0x84d [ 2402.261671][ T6847] should_fail+0x38a/0x4c0 [ 2402.266111][ T6847] prepare_alloc_pages+0x1db/0x5b0 [ 2402.271254][ T6847] __alloc_pages+0x14f/0x700 [ 2402.275865][ T6847] ? __rmqueue_pcplist+0x2030/0x2030 [ 2402.281295][ T6847] ? alloc_pages+0x458/0x570 [ 2402.285906][ T6847] __vmalloc_node_range+0x5ab/0x8c0 [ 2402.291136][ T6847] dup_task_struct+0x428/0xb60 [ 2402.295927][ T6847] ? copy_process+0x5eb/0x3ef0 [ 2402.300710][ T6847] ? _raw_spin_unlock_irq+0x1f/0x40 [ 2402.305931][ T6847] ? lockdep_hardirqs_on+0x94/0x130 [ 2402.311155][ T6847] copy_process+0x5eb/0x3ef0 [ 2402.315781][ T6847] ? __might_fault+0xb8/0x110 [ 2402.320475][ T6847] ? __lock_acquire+0x1ff0/0x1ff0 [ 2402.325529][ T6847] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2402.330669][ T6847] ? _copy_from_user+0x10f/0x170 [ 2402.335637][ T6847] kernel_clone+0x210/0x960 [ 2402.340192][ T6847] ? create_io_thread+0x1e0/0x1e0 [ 2402.345247][ T6847] __se_sys_clone3+0x3e1/0x430 [ 2402.350065][ T6847] ? __x64_sys_clone3+0x60/0x60 [ 2402.354999][ T6847] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2402.361023][ T6847] ? lockdep_hardirqs_on+0x94/0x130 [ 2402.366255][ T6847] ? syscall_enter_from_user_mode+0x2e/0x230 19:12:22 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$search(0xa, r0, &(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x1}, 0xfffffffffffffff8) [ 2402.372249][ T6847] do_syscall_64+0x3d/0xb0 [ 2402.376768][ T6847] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2402.382679][ T6847] RIP: 0033:0x7fa1e449cae9 [ 2402.387117][ T6847] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2402.406863][ T6847] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2402.415294][ T6847] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 19:12:22 executing program 4: setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000140)={@l2tp={0x2, 0x0, @empty, 0x4}, {&(0x7f0000000000)=""/253, 0xfd}, &(0x7f0000000100), 0x32}, 0xa0) 19:12:22 executing program 1: r0 = add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)='s:\x00') 19:12:22 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x4000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) [ 2402.423281][ T6847] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2402.431270][ T6847] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2402.439251][ T6847] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2402.447235][ T6847] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2402.455237][ T6847] 19:12:22 executing program 4: setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000140)={@l2tp={0x2, 0x0, @empty, 0x4}, {&(0x7f0000000000)=""/253, 0xfd}, &(0x7f0000000100), 0x32}, 0xa0) 19:12:22 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 12) 19:12:22 executing program 1: r0 = add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)='s:\x00') 19:12:22 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) (async) keyctl$search(0xa, r0, &(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x1}, 0xfffffffffffffff8) 19:12:22 executing program 5: getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) socketpair(0x26, 0xe, 0x5, &(0x7f0000000380)={0xffffffffffffffff}) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e23}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x4c810) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r2, 0x10000000) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x5, 0x1, 0x3f, 0x9, 0x10, r2, 0x61, '\x00', r0, r3, 0x0, 0x2}, 0x48) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, 0x0, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) 19:12:22 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x4100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:22 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) 19:12:22 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$search(0xa, r0, &(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x1}, 0xfffffffffffffff8) [ 2402.650945][ T6876] FAULT_INJECTION: forcing a failure. [ 2402.650945][ T6876] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2402.700701][ T6876] CPU: 1 PID: 6876 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2402.709251][ T6876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2402.719445][ T6876] Call Trace: [ 2402.722743][ T6876] [ 2402.725692][ T6876] dump_stack_lvl+0x1e3/0x2cb [ 2402.730409][ T6876] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2402.736073][ T6876] ? panic+0x84d/0x84d [ 2402.740179][ T6876] should_fail+0x38a/0x4c0 [ 2402.744629][ T6876] prepare_alloc_pages+0x1db/0x5b0 19:12:22 executing program 3: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$unlink(0x18, r0, 0xffffffffffffffff) [ 2402.749775][ T6876] __alloc_pages+0x14f/0x700 [ 2402.754395][ T6876] ? __rmqueue_pcplist+0x2030/0x2030 [ 2402.759720][ T6876] ? alloc_pages+0x458/0x570 [ 2402.764344][ T6876] __vmalloc_node_range+0x5ab/0x8c0 [ 2402.769582][ T6876] dup_task_struct+0x428/0xb60 [ 2402.774367][ T6876] ? copy_process+0x5eb/0x3ef0 [ 2402.779150][ T6876] ? _raw_spin_unlock_irq+0x1f/0x40 [ 2402.784366][ T6876] ? lockdep_hardirqs_on+0x94/0x130 [ 2402.789599][ T6876] copy_process+0x5eb/0x3ef0 [ 2402.794226][ T6876] ? __might_fault+0xb8/0x110 [ 2402.798938][ T6876] ? __lock_acquire+0x1ff0/0x1ff0 [ 2402.804001][ T6876] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2402.809143][ T6876] ? _copy_from_user+0x10f/0x170 [ 2402.814113][ T6876] kernel_clone+0x210/0x960 [ 2402.818733][ T6876] ? create_io_thread+0x1e0/0x1e0 [ 2402.823800][ T6876] __se_sys_clone3+0x3e1/0x430 [ 2402.828591][ T6876] ? __x64_sys_clone3+0x60/0x60 [ 2402.833493][ T6876] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2402.839504][ T6876] ? lockdep_hardirqs_on+0x94/0x130 [ 2402.844735][ T6876] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2402.850737][ T6876] do_syscall_64+0x3d/0xb0 [ 2402.855179][ T6876] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2402.861097][ T6876] RIP: 0033:0x7fa1e449cae9 [ 2402.865540][ T6876] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2402.885208][ T6876] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2402.893654][ T6876] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 19:12:22 executing program 1: r0 = add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)='s:\x00') 19:12:22 executing program 3: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$unlink(0x18, r0, 0xffffffffffffffff) (async) keyctl$unlink(0x18, r0, 0xffffffffffffffff) [ 2402.901642][ T6876] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2402.909630][ T6876] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2402.917618][ T6876] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2402.925607][ T6876] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2402.933619][ T6876] 19:12:22 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) 19:12:22 executing program 5: getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) socketpair(0x26, 0xe, 0x5, &(0x7f0000000380)={0xffffffffffffffff}) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e23}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x4c810) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r2, 0x10000000) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x5, 0x1, 0x3f, 0x9, 0x10, r2, 0x61, '\x00', r0, r3, 0x0, 0x2}, 0x48) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, 0x0, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, 0x0, 0x0) 19:12:23 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 13) 19:12:23 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x7000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:23 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) (async) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) 19:12:23 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) (async) 19:12:23 executing program 3: add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$unlink(0x18, r0, 0xffffffffffffffff) 19:12:23 executing program 5: getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) socketpair(0x26, 0xe, 0x5, &(0x7f0000000380)={0xffffffffffffffff}) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e23}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x4c810) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r2, 0x10000000) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x5, 0x1, 0x3f, 0x9, 0x10, r2, 0x61, '\x00', r0, r3, 0x0, 0x2}, 0x48) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) [ 2403.131243][ T6903] FAULT_INJECTION: forcing a failure. [ 2403.131243][ T6903] name fail_page_alloc, interval 1, probability 0, space 0, times 0 19:12:23 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) [ 2403.212589][ T6903] CPU: 1 PID: 6903 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2403.221143][ T6903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2403.231240][ T6903] Call Trace: [ 2403.234523][ T6903] [ 2403.237454][ T6903] dump_stack_lvl+0x1e3/0x2cb [ 2403.242138][ T6903] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2403.247771][ T6903] ? panic+0x84d/0x84d [ 2403.251846][ T6903] should_fail+0x38a/0x4c0 [ 2403.256264][ T6903] prepare_alloc_pages+0x1db/0x5b0 [ 2403.261382][ T6903] __alloc_pages+0x14f/0x700 [ 2403.265971][ T6903] ? __rmqueue_pcplist+0x2030/0x2030 [ 2403.271265][ T6903] ? alloc_pages+0x458/0x570 [ 2403.276099][ T6903] __vmalloc_node_range+0x5ab/0x8c0 [ 2403.281332][ T6903] dup_task_struct+0x428/0xb60 [ 2403.286109][ T6903] ? copy_process+0x5eb/0x3ef0 [ 2403.290878][ T6903] ? _raw_spin_unlock_irq+0x1f/0x40 [ 2403.296274][ T6903] ? lockdep_hardirqs_on+0x94/0x130 [ 2403.301499][ T6903] copy_process+0x5eb/0x3ef0 [ 2403.306100][ T6903] ? __might_fault+0xb8/0x110 [ 2403.310782][ T6903] ? __lock_acquire+0x1ff0/0x1ff0 [ 2403.315829][ T6903] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2403.320967][ T6903] ? _copy_from_user+0x10f/0x170 [ 2403.325907][ T6903] kernel_clone+0x210/0x960 [ 2403.330411][ T6903] ? create_io_thread+0x1e0/0x1e0 [ 2403.335446][ T6903] __se_sys_clone3+0x3e1/0x430 [ 2403.340220][ T6903] ? __x64_sys_clone3+0x60/0x60 [ 2403.345100][ T6903] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2403.351088][ T6903] ? lockdep_hardirqs_on+0x94/0x130 [ 2403.356299][ T6903] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2403.362274][ T6903] do_syscall_64+0x3d/0xb0 [ 2403.366691][ T6903] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2403.372584][ T6903] RIP: 0033:0x7fa1e449cae9 [ 2403.377006][ T6903] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2403.396610][ T6903] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2403.405026][ T6903] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 19:12:23 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) socket$inet6_mptcp(0xa, 0x1, 0x106) [ 2403.412993][ T6903] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2403.420957][ T6903] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2403.428918][ T6903] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2403.436883][ T6903] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2403.444858][ T6903] 19:12:23 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x10fff, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:23 executing program 1: r0 = add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000100)={0x0, "46ae9a81aa184094d66355d3e3894ad54b20cd3526df7fda57c04776a22e078f15ab29b861240703dd058109c48fab3890f6dcf0803f20ec6476efbc5551754c", 0x1c}, 0x48, r0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) r4 = add_key$keyring(&(0x7f0000000400), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r3) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$reject(0x13, r2, 0xfd7, 0x0, r4) r5 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r6 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r5) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x0}, 0x0, 0x0, r5) r8 = semget(0x1, 0x4, 0x208) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) semtimedop(r8, &(0x7f0000000400)=[{0x0, 0x3, 0x800}], 0x1, &(0x7f0000000480)={r9, r10+10000000}) semtimedop(r8, &(0x7f0000000340), 0x0, &(0x7f0000000380)) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r7) r11 = add_key(&(0x7f0000000200)='.dead\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="acea8fd06954017f866b0aa1e7e1801b3a61b27d68f36bd5f026b87ddd7e7f36289ec485d17231cfc8f5037c00113d3b6276bf1e4d9a3929ba4ea50695e720d77e5cf65e5b73a5b12e2499ea9b5001ecfc9d0a7464dcf5cb8c50eda3d3cfd5efaddc7b6b1c810873f3f4fa5171c9ab97bac614439f959c88e347b44a4b5d02b5e827710f48fa395cbb19f9dbdd", 0x8d, r6) keyctl$KEYCTL_MOVE(0x1e, r11, 0x0, r7, 0x1) keyctl$search(0xa, r1, &(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz', 0x3}, r7) 19:12:23 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 14) 19:12:23 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x20010, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:23 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) (async) socket$inet_dccp(0x2, 0x6, 0x0) (async) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) socket$inet6_mptcp(0xa, 0x1, 0x106) [ 2403.616497][ T6925] FAULT_INJECTION: forcing a failure. [ 2403.616497][ T6925] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2403.645408][ T6925] CPU: 0 PID: 6925 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2403.653964][ T6925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2403.664225][ T6925] Call Trace: [ 2403.667529][ T6925] [ 2403.670479][ T6925] dump_stack_lvl+0x1e3/0x2cb [ 2403.675187][ T6925] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2403.680853][ T6925] ? panic+0x84d/0x84d [ 2403.684953][ T6925] should_fail+0x38a/0x4c0 [ 2403.689394][ T6925] prepare_alloc_pages+0x1db/0x5b0 [ 2403.694560][ T6925] __alloc_pages+0x14f/0x700 [ 2403.699182][ T6925] ? __rmqueue_pcplist+0x2030/0x2030 [ 2403.704518][ T6925] ? alloc_pages+0x458/0x570 [ 2403.709143][ T6925] __vmalloc_node_range+0x5ab/0x8c0 [ 2403.714386][ T6925] dup_task_struct+0x428/0xb60 [ 2403.719181][ T6925] ? copy_process+0x5eb/0x3ef0 [ 2403.723970][ T6925] ? _raw_spin_unlock_irq+0x1f/0x40 [ 2403.729189][ T6925] ? lockdep_hardirqs_on+0x94/0x130 [ 2403.734436][ T6925] copy_process+0x5eb/0x3ef0 [ 2403.739068][ T6925] ? __might_fault+0xb8/0x110 [ 2403.743770][ T6925] ? __lock_acquire+0x1ff0/0x1ff0 [ 2403.748817][ T6925] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2403.753969][ T6925] ? _copy_from_user+0x10f/0x170 [ 2403.758930][ T6925] kernel_clone+0x210/0x960 [ 2403.763459][ T6925] ? create_io_thread+0x1e0/0x1e0 [ 2403.768518][ T6925] __se_sys_clone3+0x3e1/0x430 [ 2403.773305][ T6925] ? __x64_sys_clone3+0x60/0x60 [ 2403.778196][ T6925] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2403.784196][ T6925] ? lockdep_hardirqs_on+0x94/0x130 [ 2403.789436][ T6925] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2403.795538][ T6925] do_syscall_64+0x3d/0xb0 [ 2403.799988][ T6925] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2403.805903][ T6925] RIP: 0033:0x7fa1e449cae9 19:12:23 executing program 5: getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) socketpair(0x26, 0xe, 0x5, &(0x7f0000000380)={0xffffffffffffffff}) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e23}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x4c810) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r2, 0x10000000) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x5, 0x1, 0x3f, 0x9, 0x10, r2, 0x61, '\x00', r0, r3, 0x0, 0x2}, 0x48) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, 0x0, 0x0) [ 2403.810341][ T6925] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2403.829971][ T6925] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2403.838415][ T6925] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2403.846407][ T6925] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2403.854392][ T6925] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 19:12:23 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) 19:12:23 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x20200, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:23 executing program 1: r0 = add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000100)={0x0, "46ae9a81aa184094d66355d3e3894ad54b20cd3526df7fda57c04776a22e078f15ab29b861240703dd058109c48fab3890f6dcf0803f20ec6476efbc5551754c", 0x1c}, 0x48, r0) (async) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) r4 = add_key$keyring(&(0x7f0000000400), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r3) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r4) (async) keyctl$reject(0x13, r2, 0xfd7, 0x0, r4) (async) r5 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r6 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r5) (async) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x0}, 0x0, 0x0, r5) (async) r8 = semget(0x1, 0x4, 0x208) (async) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) semtimedop(r8, &(0x7f0000000400)=[{0x0, 0x3, 0x800}], 0x1, &(0x7f0000000480)={r9, r10+10000000}) (async) semtimedop(r8, &(0x7f0000000340), 0x0, &(0x7f0000000380)) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r7) r11 = add_key(&(0x7f0000000200)='.dead\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="acea8fd06954017f866b0aa1e7e1801b3a61b27d68f36bd5f026b87ddd7e7f36289ec485d17231cfc8f5037c00113d3b6276bf1e4d9a3929ba4ea50695e720d77e5cf65e5b73a5b12e2499ea9b5001ecfc9d0a7464dcf5cb8c50eda3d3cfd5efaddc7b6b1c810873f3f4fa5171c9ab97bac614439f959c88e347b44a4b5d02b5e827710f48fa395cbb19f9dbdd", 0x8d, r6) keyctl$KEYCTL_MOVE(0x1e, r11, 0x0, r7, 0x1) keyctl$search(0xa, r1, &(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz', 0x3}, r7) [ 2403.862387][ T6925] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2403.870375][ T6925] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2403.878377][ T6925] 19:12:23 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:23 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) socket$inet6_mptcp(0xa, 0x1, 0x106) socket$inet_dccp(0x2, 0x6, 0x0) (async) socket$inet_dccp(0x2, 0x6, 0x0) (async) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) socket$inet6_mptcp(0xa, 0x1, 0x106) (async) 19:12:23 executing program 1: r0 = add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000100)={0x0, "46ae9a81aa184094d66355d3e3894ad54b20cd3526df7fda57c04776a22e078f15ab29b861240703dd058109c48fab3890f6dcf0803f20ec6476efbc5551754c", 0x1c}, 0x48, r0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) r4 = add_key$keyring(&(0x7f0000000400), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r3) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r4) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$reject(0x13, r2, 0xfd7, 0x0, r4) (async) keyctl$reject(0x13, r2, 0xfd7, 0x0, r4) r5 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r6 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r5) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x0}, 0x0, 0x0, r5) r8 = semget(0x1, 0x4, 0x208) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) semtimedop(r8, &(0x7f0000000400)=[{0x0, 0x3, 0x800}], 0x1, &(0x7f0000000480)={r9, r10+10000000}) (async) semtimedop(r8, &(0x7f0000000400)=[{0x0, 0x3, 0x800}], 0x1, &(0x7f0000000480)={r9, r10+10000000}) semtimedop(r8, &(0x7f0000000340), 0x0, &(0x7f0000000380)) (async) semtimedop(r8, &(0x7f0000000340), 0x0, &(0x7f0000000380)) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r7) add_key(&(0x7f0000000200)='.dead\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="acea8fd06954017f866b0aa1e7e1801b3a61b27d68f36bd5f026b87ddd7e7f36289ec485d17231cfc8f5037c00113d3b6276bf1e4d9a3929ba4ea50695e720d77e5cf65e5b73a5b12e2499ea9b5001ecfc9d0a7464dcf5cb8c50eda3d3cfd5efaddc7b6b1c810873f3f4fa5171c9ab97bac614439f959c88e347b44a4b5d02b5e827710f48fa395cbb19f9dbdd", 0x8d, r6) (async) r11 = add_key(&(0x7f0000000200)='.dead\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="acea8fd06954017f866b0aa1e7e1801b3a61b27d68f36bd5f026b87ddd7e7f36289ec485d17231cfc8f5037c00113d3b6276bf1e4d9a3929ba4ea50695e720d77e5cf65e5b73a5b12e2499ea9b5001ecfc9d0a7464dcf5cb8c50eda3d3cfd5efaddc7b6b1c810873f3f4fa5171c9ab97bac614439f959c88e347b44a4b5d02b5e827710f48fa395cbb19f9dbdd", 0x8d, r6) keyctl$KEYCTL_MOVE(0x1e, r11, 0x0, r7, 0x1) keyctl$search(0xa, r1, &(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz', 0x3}, r7) (async) keyctl$search(0xa, r1, &(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz', 0x3}, r7) 19:12:24 executing program 1: r0 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r0, 0x0, 0x0], 0x9}, 0x58) mq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffff, 0x0, @tid=r0}) 19:12:24 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x101000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:24 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x400000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:24 executing program 1: r0 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r0, 0x0, 0x0], 0x9}, 0x58) mq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffff, 0x0, @tid=r0}) 19:12:24 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 15) 19:12:24 executing program 5: getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) socketpair(0x26, 0xe, 0x5, &(0x7f0000000380)={0xffffffffffffffff}) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e23}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x4c810) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r2, 0x10000000) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x5, 0x1, 0x3f, 0x9, 0x10, r2, 0x61, '\x00', r0, r3, 0x0, 0x2}, 0x48) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) [ 2404.270651][ T6968] FAULT_INJECTION: forcing a failure. [ 2404.270651][ T6968] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2404.284730][ T6968] CPU: 1 PID: 6968 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2404.293267][ T6968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2404.303693][ T6968] Call Trace: [ 2404.306992][ T6968] [ 2404.309931][ T6968] dump_stack_lvl+0x1e3/0x2cb [ 2404.314634][ T6968] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2404.320286][ T6968] ? panic+0x84d/0x84d [ 2404.324372][ T6968] ? __lock_acquire+0x1295/0x1ff0 [ 2404.329426][ T6968] should_fail+0x38a/0x4c0 [ 2404.333869][ T6968] prepare_alloc_pages+0x1db/0x5b0 [ 2404.339011][ T6968] __alloc_pages+0x14f/0x700 [ 2404.343627][ T6968] ? __rmqueue_pcplist+0x2030/0x2030 [ 2404.348929][ T6968] ? lockdep_init_map_type+0x9d/0x8d0 [ 2404.354324][ T6968] ? lockdep_unregister_key+0x5b0/0x5b0 [ 2404.359883][ T6968] ? lockdep_softirqs_off+0x420/0x420 [ 2404.365267][ T6968] ? alloc_pages+0x458/0x570 [ 2404.369878][ T6968] __get_free_pages+0x8/0x30 [ 2404.374477][ T6968] pgd_alloc+0x1d/0x1c0 [ 2404.378652][ T6968] mm_init+0x51d/0x830 [ 2404.382735][ T6968] copy_mm+0x1d0/0x1370 [ 2404.386914][ T6968] ? lockdep_softirqs_off+0x420/0x420 [ 2404.392324][ T6968] ? copy_signal+0x630/0x630 [ 2404.396942][ T6968] ? __init_rwsem+0x11e/0x160 [ 2404.401645][ T6968] ? copy_signal+0x529/0x630 [ 2404.406252][ T6968] copy_process+0x1816/0x3ef0 [ 2404.410977][ T6968] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2404.416113][ T6968] ? _copy_from_user+0x10f/0x170 [ 2404.421077][ T6968] kernel_clone+0x210/0x960 [ 2404.425590][ T6968] ? ata_scsi_activity_store+0x180/0x1e0 [ 2404.431300][ T6968] ? create_io_thread+0x1e0/0x1e0 [ 2404.436355][ T6968] __se_sys_clone3+0x3e1/0x430 [ 2404.441135][ T6968] ? __x64_sys_clone3+0x60/0x60 [ 2404.446027][ T6968] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2404.452021][ T6968] ? lockdep_hardirqs_on+0x94/0x130 [ 2404.457237][ T6968] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2404.463238][ T6968] do_syscall_64+0x3d/0xb0 [ 2404.467672][ T6968] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2404.473584][ T6968] RIP: 0033:0x7fa1e449cae9 [ 2404.478014][ T6968] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2404.497635][ T6968] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2404.506086][ T6968] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2404.514088][ T6968] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 19:12:24 executing program 4: shmget$private(0x0, 0x4000, 0x1000, &(0x7f0000ffc000/0x4000)=nil) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_clone3(&(0x7f00000011c0)={0x2e4a16500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 19:12:24 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "b4e6c0ff5344cc4f6a08c0908db311de37c5f6b138c9e10a714f9409e7cdfb367839682abc6f5217bb7561ecd9b1ad5141f797da68cc472b28cc5c7afefa0c66", 0x32}, 0x48, 0x0) keyctl$search(0xa, r0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x1}, 0xfffffffffffffffb) 19:12:24 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x700000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:24 executing program 5: getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) socketpair(0x26, 0xe, 0x5, &(0x7f0000000380)={0xffffffffffffffff}) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e23}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x4c810) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r2, 0x10000000) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x5, 0x1, 0x3f, 0x9, 0x10, r2, 0x61, '\x00', r0, r3, 0x0, 0x2}, 0x48) 19:12:24 executing program 1: r0 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r0, 0x0, 0x0], 0x9}, 0x58) (async) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r0, 0x0, 0x0], 0x9}, 0x58) mq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffff, 0x0, @tid=r0}) [ 2404.522078][ T6968] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2404.530059][ T6968] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2404.538039][ T6968] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2404.546032][ T6968] 19:12:24 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 16) 19:12:24 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0xf0ff1f, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:24 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "b4e6c0ff5344cc4f6a08c0908db311de37c5f6b138c9e10a714f9409e7cdfb367839682abc6f5217bb7561ecd9b1ad5141f797da68cc472b28cc5c7afefa0c66", 0x32}, 0x48, 0x0) keyctl$search(0xa, r0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x1}, 0xfffffffffffffffb) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "b4e6c0ff5344cc4f6a08c0908db311de37c5f6b138c9e10a714f9409e7cdfb367839682abc6f5217bb7561ecd9b1ad5141f797da68cc472b28cc5c7afefa0c66", 0x32}, 0x48, 0x0) (async) keyctl$search(0xa, r0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x1}, 0xfffffffffffffffb) (async) 19:12:24 executing program 4: shmget$private(0x0, 0x4000, 0x1000, &(0x7f0000ffc000/0x4000)=nil) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_clone3(&(0x7f00000011c0)={0x2e4a16500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 19:12:24 executing program 5: getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) socketpair(0x26, 0xe, 0x5, &(0x7f0000000380)={0xffffffffffffffff}) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e23}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x4c810) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x10000000) 19:12:24 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x1000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:24 executing program 1: add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0xff3a, 0xfffffffffffffffb) 19:12:24 executing program 5: getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) socketpair(0x26, 0xe, 0x5, &(0x7f0000000380)={0xffffffffffffffff}) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e23}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x4c810) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2404.725399][ T6986] FAULT_INJECTION: forcing a failure. [ 2404.725399][ T6986] name failslab, interval 1, probability 0, space 0, times 0 19:12:24 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "b4e6c0ff5344cc4f6a08c0908db311de37c5f6b138c9e10a714f9409e7cdfb367839682abc6f5217bb7561ecd9b1ad5141f797da68cc472b28cc5c7afefa0c66", 0x32}, 0x48, 0x0) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "b4e6c0ff5344cc4f6a08c0908db311de37c5f6b138c9e10a714f9409e7cdfb367839682abc6f5217bb7561ecd9b1ad5141f797da68cc472b28cc5c7afefa0c66", 0x32}, 0x48, 0x0) keyctl$search(0xa, r0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x1}, 0xfffffffffffffffb) 19:12:24 executing program 4: shmget$private(0x0, 0x4000, 0x1000, &(0x7f0000ffc000/0x4000)=nil) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_clone3(&(0x7f00000011c0)={0x2e4a16500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) [ 2404.822119][ T6986] CPU: 1 PID: 6986 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2404.830673][ T6986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2404.840755][ T6986] Call Trace: [ 2404.844055][ T6986] [ 2404.847001][ T6986] dump_stack_lvl+0x1e3/0x2cb [ 2404.851708][ T6986] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2404.857369][ T6986] ? panic+0x84d/0x84d [ 2404.861556][ T6986] ? __might_sleep+0xc0/0xc0 [ 2404.866180][ T6986] should_fail+0x38a/0x4c0 [ 2404.870626][ T6986] should_failslab+0x5/0x20 [ 2404.875146][ T6986] slab_pre_alloc_hook+0x53/0xc0 [ 2404.880107][ T6986] ? copy_mm+0x8d2/0x1370 [ 2404.884470][ T6986] kmem_cache_alloc+0x3f/0x280 [ 2404.889265][ T6986] copy_mm+0x8d2/0x1370 [ 2404.893452][ T6986] ? lockdep_softirqs_off+0x420/0x420 [ 2404.898859][ T6986] ? copy_signal+0x630/0x630 [ 2404.903469][ T6986] ? __init_rwsem+0x11e/0x160 [ 2404.908173][ T6986] ? copy_signal+0x529/0x630 [ 2404.912796][ T6986] copy_process+0x1816/0x3ef0 [ 2404.917548][ T6986] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2404.922685][ T6986] ? _copy_from_user+0x10f/0x170 [ 2404.927667][ T6986] kernel_clone+0x210/0x960 [ 2404.932183][ T6986] ? perf_trace_devlink_hwmsg+0x470/0x9c0 [ 2404.937977][ T6986] ? create_io_thread+0x1e0/0x1e0 [ 2404.943048][ T6986] __se_sys_clone3+0x3e1/0x430 [ 2404.947841][ T6986] ? __x64_sys_clone3+0x60/0x60 [ 2404.952765][ T6986] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2404.958784][ T6986] ? lockdep_hardirqs_on+0x94/0x130 [ 2404.964018][ T6986] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2404.970116][ T6986] do_syscall_64+0x3d/0xb0 [ 2404.974562][ T6986] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2404.980476][ T6986] RIP: 0033:0x7fa1e449cae9 [ 2404.984910][ T6986] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2405.004622][ T6986] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2405.013064][ T6986] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 19:12:24 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpgrp(0xffffffffffffffff) getsockopt$PNPIPE_INITSTATE(0xffffffffffffffff, 0x113, 0x4, &(0x7f0000000300), &(0x7f0000000340)=0x4) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r0, 0x0, 0x0], 0x9}, 0x58) mq_notify(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x16, 0x4, @tid=r0}) 19:12:24 executing program 5: getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) socketpair(0x26, 0xe, 0x5, &(0x7f0000000380)={0xffffffffffffffff}) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e23}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x4c810) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) [ 2405.021061][ T6986] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2405.029054][ T6986] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2405.037041][ T6986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2405.045026][ T6986] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2405.053036][ T6986] 19:12:25 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x2000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:25 executing program 5: getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) socketpair(0x26, 0xe, 0x5, &(0x7f0000000380)={0xffffffffffffffff}) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e23}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x4c810) 19:12:25 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 17) 19:12:25 executing program 1: add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0xff3a, 0xfffffffffffffffb) add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0xff3a, 0xfffffffffffffffb) (async) 19:12:25 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14) 19:12:25 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14) (async) 19:12:25 executing program 1: add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0xff3a, 0xfffffffffffffffb) 19:12:25 executing program 5: getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) socketpair(0x26, 0xe, 0x5, &(0x7f0000000380)) [ 2405.253450][ T7022] FAULT_INJECTION: forcing a failure. [ 2405.253450][ T7022] name fail_page_alloc, interval 1, probability 0, space 0, times 0 19:12:25 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x7000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:25 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14) [ 2405.322931][ T7022] CPU: 0 PID: 7022 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2405.331484][ T7022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2405.341644][ T7022] Call Trace: [ 2405.344933][ T7022] [ 2405.347882][ T7022] dump_stack_lvl+0x1e3/0x2cb [ 2405.352679][ T7022] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2405.358344][ T7022] ? panic+0x84d/0x84d [ 2405.362446][ T7022] should_fail+0x38a/0x4c0 [ 2405.366893][ T7022] prepare_alloc_pages+0x1db/0x5b0 [ 2405.372035][ T7022] __alloc_pages+0x14f/0x700 [ 2405.376648][ T7022] ? __rmqueue_pcplist+0x2030/0x2030 [ 2405.381963][ T7022] ? alloc_pages+0x458/0x570 [ 2405.386578][ T7022] __vmalloc_node_range+0x5ab/0x8c0 [ 2405.391805][ T7022] dup_task_struct+0x428/0xb60 [ 2405.396582][ T7022] ? copy_process+0x5eb/0x3ef0 [ 2405.401349][ T7022] ? _raw_spin_unlock_irq+0x1f/0x40 [ 2405.406558][ T7022] ? lockdep_hardirqs_on+0x94/0x130 [ 2405.411780][ T7022] copy_process+0x5eb/0x3ef0 [ 2405.416406][ T7022] ? __might_fault+0xb8/0x110 [ 2405.421097][ T7022] ? __lock_acquire+0x1ff0/0x1ff0 [ 2405.426144][ T7022] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2405.431281][ T7022] ? _copy_from_user+0x10f/0x170 [ 2405.436243][ T7022] kernel_clone+0x210/0x960 [ 2405.440765][ T7022] ? create_io_thread+0x1e0/0x1e0 [ 2405.445817][ T7022] __se_sys_clone3+0x3e1/0x430 [ 2405.450606][ T7022] ? __x64_sys_clone3+0x60/0x60 [ 2405.455503][ T7022] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2405.461506][ T7022] ? lockdep_hardirqs_on+0x94/0x130 [ 2405.466721][ T7022] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2405.472718][ T7022] do_syscall_64+0x3d/0xb0 [ 2405.477176][ T7022] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2405.483096][ T7022] RIP: 0033:0x7fa1e449cae9 [ 2405.487524][ T7022] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2405.507142][ T7022] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2405.515566][ T7022] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 19:12:25 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) r0 = getpgrp(0xffffffffffffffff) getsockopt$PNPIPE_INITSTATE(0xffffffffffffffff, 0x113, 0x4, &(0x7f0000000300), &(0x7f0000000340)=0x4) (async, rerun: 32) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r0, 0x0, 0x0], 0x9}, 0x58) (async, rerun: 32) mq_notify(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x16, 0x4, @tid=r0}) 19:12:25 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='.request_key_auth\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)="6d862fe53ce2efd84bd696eef29043362c6559b62efc7af6f205dfd249264cf0931e0adc178daed89e123bf4bb10b08f43bc3a092f7bdc791c395763ab1e7746e024c8b4ec4120f58be8c02424b7409bf2758dd17c734a84e931", 0x5a, 0xfffffffffffffff8) r1 = add_key(&(0x7f0000000300)='user\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)="afbcd1b2775eaf550b9071b84ee7020e38c14d117d22896825fe4b030246d278b1514f143e791bfdf9a82d5a6e6db614fc6b5086ee3658d54b96d879dc05953452cf66d1206cf11929a31307c8ba155e4dc74a23655f55152c241a7f1963042e0f663f3ec60d5fc8ef1811658d25cdcfa42224d49918c445ebf4780285aef249bcfe869f4cb15c27d5dfa30a2d76f805193d4356d5a00f1261bce95c3bf5708155ba19ece4f60b197fe89ffedf7ef7ef8803a2049ee3da46706814cef2ce5af54b394ff74cd4b1472c32b8bc233304df12c38dab23b051dadff04af1c925ecafc6eded51308dca55c5f910ab611680fbb4632600dd97", 0xf6, r0) add_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)="45f4ee6adb2c2afc0a623b819cad633238c63c2b82a884d45916918c936249102dd3fc7567d58c5e3edd0bf04489b09044f6684a1cb0831f7b308321ec4cd34bf1ad7dd1b0542b2facc7c3828e9b29f0564ca2e2af96ff4887c7a58d98d13a55eae537120e4b1733db696c60fe616b4feede1cfd5cae9ec9d05896f83a9fb18a2a2112060c137b6bb3cd3c1758819ccd94ef6eefadeddb48612e6f9ad26c11908e8493", 0xa3, r1) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffb, 0xfffffffffffffffa, 0x1) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f0000000000)) 19:12:25 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x8000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) [ 2405.523560][ T7022] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2405.531549][ T7022] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2405.539531][ T7022] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2405.547504][ T7022] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2405.555587][ T7022] 19:12:25 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 18) 19:12:25 executing program 1: r0 = add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) add_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="64e5aea31fc97a05dd28dab24a3ab637269560a2662e41353c7b66bc0aa372d8f96868162c354394f44c8402f5732cfe6ed8195900e1ad249b79514dc452e21a02ec55003be8be4b02b1e30949e3e74315dc880b429e1b4e9f59c5b4e2054567", 0x60, r0) 19:12:25 executing program 5: socketpair(0x26, 0xe, 0x5, &(0x7f0000000380)) 19:12:25 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) r0 = add_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='.request_key_auth\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)="6d862fe53ce2efd84bd696eef29043362c6559b62efc7af6f205dfd249264cf0931e0adc178daed89e123bf4bb10b08f43bc3a092f7bdc791c395763ab1e7746e024c8b4ec4120f58be8c02424b7409bf2758dd17c734a84e931", 0x5a, 0xfffffffffffffff8) (async) r1 = add_key(&(0x7f0000000300)='user\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)="afbcd1b2775eaf550b9071b84ee7020e38c14d117d22896825fe4b030246d278b1514f143e791bfdf9a82d5a6e6db614fc6b5086ee3658d54b96d879dc05953452cf66d1206cf11929a31307c8ba155e4dc74a23655f55152c241a7f1963042e0f663f3ec60d5fc8ef1811658d25cdcfa42224d49918c445ebf4780285aef249bcfe869f4cb15c27d5dfa30a2d76f805193d4356d5a00f1261bce95c3bf5708155ba19ece4f60b197fe89ffedf7ef7ef8803a2049ee3da46706814cef2ce5af54b394ff74cd4b1472c32b8bc233304df12c38dab23b051dadff04af1c925ecafc6eded51308dca55c5f910ab611680fbb4632600dd97", 0xf6, r0) add_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)="45f4ee6adb2c2afc0a623b819cad633238c63c2b82a884d45916918c936249102dd3fc7567d58c5e3edd0bf04489b09044f6684a1cb0831f7b308321ec4cd34bf1ad7dd1b0542b2facc7c3828e9b29f0564ca2e2af96ff4887c7a58d98d13a55eae537120e4b1733db696c60fe616b4feede1cfd5cae9ec9d05896f83a9fb18a2a2112060c137b6bb3cd3c1758819ccd94ef6eefadeddb48612e6f9ad26c11908e8493", 0xa3, r1) (async) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffb, 0xfffffffffffffffa, 0x1) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f0000000000)) 19:12:25 executing program 5: socketpair(0x0, 0xe, 0x5, &(0x7f0000000380)) 19:12:25 executing program 1: r0 = add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) add_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="64e5aea31fc97a05dd28dab24a3ab637269560a2662e41353c7b66bc0aa372d8f96868162c354394f44c8402f5732cfe6ed8195900e1ad249b79514dc452e21a02ec55003be8be4b02b1e30949e3e74315dc880b429e1b4e9f59c5b4e2054567", 0x60, r0) 19:12:25 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='.request_key_auth\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)="6d862fe53ce2efd84bd696eef29043362c6559b62efc7af6f205dfd249264cf0931e0adc178daed89e123bf4bb10b08f43bc3a092f7bdc791c395763ab1e7746e024c8b4ec4120f58be8c02424b7409bf2758dd17c734a84e931", 0x5a, 0xfffffffffffffff8) r1 = add_key(&(0x7f0000000300)='user\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)="afbcd1b2775eaf550b9071b84ee7020e38c14d117d22896825fe4b030246d278b1514f143e791bfdf9a82d5a6e6db614fc6b5086ee3658d54b96d879dc05953452cf66d1206cf11929a31307c8ba155e4dc74a23655f55152c241a7f1963042e0f663f3ec60d5fc8ef1811658d25cdcfa42224d49918c445ebf4780285aef249bcfe869f4cb15c27d5dfa30a2d76f805193d4356d5a00f1261bce95c3bf5708155ba19ece4f60b197fe89ffedf7ef7ef8803a2049ee3da46706814cef2ce5af54b394ff74cd4b1472c32b8bc233304df12c38dab23b051dadff04af1c925ecafc6eded51308dca55c5f910ab611680fbb4632600dd97", 0xf6, r0) add_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)="45f4ee6adb2c2afc0a623b819cad633238c63c2b82a884d45916918c936249102dd3fc7567d58c5e3edd0bf04489b09044f6684a1cb0831f7b308321ec4cd34bf1ad7dd1b0542b2facc7c3828e9b29f0564ca2e2af96ff4887c7a58d98d13a55eae537120e4b1733db696c60fe616b4feede1cfd5cae9ec9d05896f83a9fb18a2a2112060c137b6bb3cd3c1758819ccd94ef6eefadeddb48612e6f9ad26c11908e8493", 0xa3, r1) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffb, 0xfffffffffffffffa, 0x1) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f0000000000)) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) add_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key(&(0x7f00000000c0)='.request_key_auth\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)="6d862fe53ce2efd84bd696eef29043362c6559b62efc7af6f205dfd249264cf0931e0adc178daed89e123bf4bb10b08f43bc3a092f7bdc791c395763ab1e7746e024c8b4ec4120f58be8c02424b7409bf2758dd17c734a84e931", 0x5a, 0xfffffffffffffff8) (async) add_key(&(0x7f0000000300)='user\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)="afbcd1b2775eaf550b9071b84ee7020e38c14d117d22896825fe4b030246d278b1514f143e791bfdf9a82d5a6e6db614fc6b5086ee3658d54b96d879dc05953452cf66d1206cf11929a31307c8ba155e4dc74a23655f55152c241a7f1963042e0f663f3ec60d5fc8ef1811658d25cdcfa42224d49918c445ebf4780285aef249bcfe869f4cb15c27d5dfa30a2d76f805193d4356d5a00f1261bce95c3bf5708155ba19ece4f60b197fe89ffedf7ef7ef8803a2049ee3da46706814cef2ce5af54b394ff74cd4b1472c32b8bc233304df12c38dab23b051dadff04af1c925ecafc6eded51308dca55c5f910ab611680fbb4632600dd97", 0xf6, r0) (async) add_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)="45f4ee6adb2c2afc0a623b819cad633238c63c2b82a884d45916918c936249102dd3fc7567d58c5e3edd0bf04489b09044f6684a1cb0831f7b308321ec4cd34bf1ad7dd1b0542b2facc7c3828e9b29f0564ca2e2af96ff4887c7a58d98d13a55eae537120e4b1733db696c60fe616b4feede1cfd5cae9ec9d05896f83a9fb18a2a2112060c137b6bb3cd3c1758819ccd94ef6eefadeddb48612e6f9ad26c11908e8493", 0xa3, r1) (async) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffb, 0xfffffffffffffffa, 0x1) (async) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f0000000000)) (async) 19:12:25 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x9000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) [ 2405.735378][ T7052] FAULT_INJECTION: forcing a failure. [ 2405.735378][ T7052] name failslab, interval 1, probability 0, space 0, times 0 [ 2405.809454][ T7052] CPU: 1 PID: 7052 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2405.818090][ T7052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2405.828172][ T7052] Call Trace: [ 2405.831470][ T7052] [ 2405.834419][ T7052] dump_stack_lvl+0x1e3/0x2cb [ 2405.839124][ T7052] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2405.844784][ T7052] ? panic+0x84d/0x84d [ 2405.848884][ T7052] ? __might_sleep+0xc0/0xc0 [ 2405.853518][ T7052] should_fail+0x38a/0x4c0 19:12:25 executing program 5: socketpair(0x0, 0x0, 0x5, &(0x7f0000000380)) [ 2405.857963][ T7052] should_failslab+0x5/0x20 [ 2405.862483][ T7052] slab_pre_alloc_hook+0x53/0xc0 [ 2405.867447][ T7052] ? copy_mm+0x8d2/0x1370 [ 2405.871794][ T7052] kmem_cache_alloc+0x3f/0x280 [ 2405.876582][ T7052] copy_mm+0x8d2/0x1370 [ 2405.880764][ T7052] ? lockdep_softirqs_off+0x420/0x420 [ 2405.883005][ T1377] ieee802154 phy0 wpan0: encryption failed: -22 [ 2405.886166][ T7052] ? copy_signal+0x630/0x630 [ 2405.892563][ T1377] ieee802154 phy1 wpan1: encryption failed: -22 [ 2405.896994][ T7052] ? __init_rwsem+0x11e/0x160 [ 2405.907887][ T7052] ? copy_signal+0x529/0x630 [ 2405.912499][ T7052] copy_process+0x1816/0x3ef0 [ 2405.917227][ T7052] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2405.922362][ T7052] ? _copy_from_user+0x10f/0x170 [ 2405.927500][ T7052] kernel_clone+0x210/0x960 [ 2405.932022][ T7052] ? create_io_thread+0x1e0/0x1e0 [ 2405.937078][ T7052] __se_sys_clone3+0x3e1/0x430 [ 2405.941860][ T7052] ? __x64_sys_clone3+0x60/0x60 [ 2405.946759][ T7052] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2405.952785][ T7052] ? lockdep_hardirqs_on+0x94/0x130 [ 2405.958009][ T7052] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2405.964011][ T7052] do_syscall_64+0x3d/0xb0 [ 2405.968447][ T7052] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2405.974368][ T7052] RIP: 0033:0x7fa1e449cae9 [ 2405.978810][ T7052] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2405.998431][ T7052] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2406.006863][ T7052] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2406.014857][ T7052] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2406.022847][ T7052] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2406.030835][ T7052] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2406.038820][ T7052] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2406.046829][ T7052] 19:12:26 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) r0 = getpgrp(0xffffffffffffffff) (async) getsockopt$PNPIPE_INITSTATE(0xffffffffffffffff, 0x113, 0x4, &(0x7f0000000300), &(0x7f0000000340)=0x4) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r0, 0x0, 0x0], 0x9}, 0x58) (async) mq_notify(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x16, 0x4, @tid=r0}) 19:12:26 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x3f, 0x20000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x145100, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_tracing={0x1a, 0xa, &(0x7f0000000080)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x1}, @generic={0x9f, 0x6, 0x4, 0x0, 0x80000001}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffffb}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x8000}, @generic={0x2, 0x1, 0x2, 0x6, 0x5}, @ldst={0x1, 0x3, 0x2, 0x3, 0x6, 0x20, 0xfffffffffffffffc}], &(0x7f0000000100)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f0000000140)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000180)={0x2, 0xe, 0x0, 0x20}, 0x10, 0x1344f, r1, 0xa, &(0x7f00000001c0)=[r1, r1, r1, r1, r1, 0xffffffffffffffff], &(0x7f0000000200)=[{0x3, 0x3, 0xf, 0x8}, {0x5, 0x3, 0xe, 0x9}, {0x3, 0x2, 0x0, 0x6}, {0x1, 0x1, 0x1, 0x4}, {0x1, 0x1, 0xf, 0xc}, {0x1, 0x4, 0xe, 0x7}, {0x2, 0x3, 0xf, 0x4}, {0x3, 0x1, 0x0, 0xb}, {0x0, 0x3, 0x1, 0x2}, {0x0, 0x4, 0xf, 0x9}], 0x10, 0xffff}, 0x90) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000380)={{0x1, 0x1, 0x18, r2, {0x5ce545af}}, './file0\x00'}) 19:12:26 executing program 1: r0 = add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) add_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="64e5aea31fc97a05dd28dab24a3ab637269560a2662e41353c7b66bc0aa372d8f96868162c354394f44c8402f5732cfe6ed8195900e1ad249b79514dc452e21a02ec55003be8be4b02b1e30949e3e74315dc880b429e1b4e9f59c5b4e2054567", 0x60, r0) 19:12:26 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x10000200, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:26 executing program 5: socketpair(0x0, 0x0, 0x5, &(0x7f0000000380)) 19:12:26 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 19) 19:12:26 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x11000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:26 executing program 1: mq_open(&(0x7f0000000140)='$%\x00', 0x80, 0x20, &(0x7f0000000240)={0x3ff, 0x100000001, 0x401, 0x8000}) add_key(&(0x7f0000000200)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)='%p \x00'}, 0x20) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x6, 0x1d, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7a}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_val={0x18, 0x5, 0x2, 0x0, r0}, @jmp={0x5, 0x1, 0x3, 0x9, 0x2, 0xfffffffffffffff8, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0xd}, @printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x80}}, @ldst={0x3, 0x0, 0x4, 0x8, 0x7, 0x80}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000380)='syzkaller\x00', 0xb56, 0xd7, &(0x7f00000003c0)=""/215, 0x40f00, 0x20, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f00000004c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0xd, 0x1f, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r2, r3, r4, r0, r0], 0x0, 0x10, 0x101}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{r0}, &(0x7f0000000000), &(0x7f0000000180)='%p \x00'}, 0x20) [ 2406.545435][ T7083] FAULT_INJECTION: forcing a failure. [ 2406.545435][ T7083] name failslab, interval 1, probability 0, space 0, times 0 [ 2406.580844][ T7083] CPU: 0 PID: 7083 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2406.589385][ T7083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2406.599461][ T7083] Call Trace: [ 2406.602756][ T7083] [ 2406.605709][ T7083] dump_stack_lvl+0x1e3/0x2cb [ 2406.610422][ T7083] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2406.616083][ T7083] ? panic+0x84d/0x84d [ 2406.620180][ T7083] ? __might_sleep+0xc0/0xc0 [ 2406.624787][ T7083] ? up_write+0x133/0x4d0 [ 2406.629149][ T7083] should_fail+0x38a/0x4c0 [ 2406.633592][ T7083] should_failslab+0x5/0x20 [ 2406.638125][ T7083] slab_pre_alloc_hook+0x53/0xc0 [ 2406.643084][ T7083] ? anon_vma_fork+0xed/0x580 [ 2406.647784][ T7083] kmem_cache_alloc+0x3f/0x280 [ 2406.652580][ T7083] anon_vma_fork+0xed/0x580 [ 2406.657113][ T7083] ? dup_userfaultfd+0x9f/0x5f0 [ 2406.662041][ T7083] ? kmem_cache_alloc+0x128/0x280 [ 2406.667104][ T7083] ? copy_mm+0x8ef/0x1370 [ 2406.671460][ T7083] copy_mm+0x9f2/0x1370 [ 2406.675653][ T7083] ? copy_signal+0x630/0x630 [ 2406.680265][ T7083] ? __init_rwsem+0x11e/0x160 [ 2406.684971][ T7083] ? copy_signal+0x529/0x630 [ 2406.689586][ T7083] copy_process+0x1816/0x3ef0 19:12:26 executing program 5: socketpair(0x0, 0x0, 0x5, &(0x7f0000000380)) 19:12:26 executing program 1: mq_open(&(0x7f0000000140)='$%\x00', 0x80, 0x20, &(0x7f0000000240)={0x3ff, 0x100000001, 0x401, 0x8000}) (async) add_key(&(0x7f0000000200)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)='%p \x00'}, 0x20) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, 0x0, 0x0) (async) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, 0x0, 0x0) (async) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x6, 0x1d, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7a}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_val={0x18, 0x5, 0x2, 0x0, r0}, @jmp={0x5, 0x1, 0x3, 0x9, 0x2, 0xfffffffffffffff8, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0xd}, @printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x80}}, @ldst={0x3, 0x0, 0x4, 0x8, 0x7, 0x80}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000380)='syzkaller\x00', 0xb56, 0xd7, &(0x7f00000003c0)=""/215, 0x40f00, 0x20, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f00000004c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0xd, 0x1f, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r2, r3, r4, r0, r0], 0x0, 0x10, 0x101}, 0x90) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{r0}, &(0x7f0000000000), &(0x7f0000000180)='%p \x00'}, 0x20) 19:12:26 executing program 5: socketpair(0x0, 0xe, 0x0, &(0x7f0000000380)) [ 2406.694321][ T7083] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2406.699469][ T7083] ? _copy_from_user+0x10f/0x170 [ 2406.704440][ T7083] kernel_clone+0x210/0x960 [ 2406.708965][ T7083] ? create_io_thread+0x1e0/0x1e0 [ 2406.714035][ T7083] __se_sys_clone3+0x3e1/0x430 [ 2406.718826][ T7083] ? __x64_sys_clone3+0x60/0x60 [ 2406.723733][ T7083] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2406.729736][ T7083] ? lockdep_hardirqs_on+0x94/0x130 [ 2406.734982][ T7083] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2406.740991][ T7083] do_syscall_64+0x3d/0xb0 19:12:26 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x3f, 0x20000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x145100, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_tracing={0x1a, 0xa, &(0x7f0000000080)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x1}, @generic={0x9f, 0x6, 0x4, 0x0, 0x80000001}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffffb}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x8000}, @generic={0x2, 0x1, 0x2, 0x6, 0x5}, @ldst={0x1, 0x3, 0x2, 0x3, 0x6, 0x20, 0xfffffffffffffffc}], &(0x7f0000000100)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f0000000140)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000180)={0x2, 0xe, 0x0, 0x20}, 0x10, 0x1344f, r1, 0xa, &(0x7f00000001c0)=[r1, r1, r1, r1, r1, 0xffffffffffffffff], &(0x7f0000000200)=[{0x3, 0x3, 0xf, 0x8}, {0x5, 0x3, 0xe, 0x9}, {0x3, 0x2, 0x0, 0x6}, {0x1, 0x1, 0x1, 0x4}, {0x1, 0x1, 0xf, 0xc}, {0x1, 0x4, 0xe, 0x7}, {0x2, 0x3, 0xf, 0x4}, {0x3, 0x1, 0x0, 0xb}, {0x0, 0x3, 0x1, 0x2}, {0x0, 0x4, 0xf, 0x9}], 0x10, 0xffff}, 0x90) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000380)={{0x1, 0x1, 0x18, r2, {0x5ce545af}}, './file0\x00'}) [ 2406.745437][ T7083] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2406.751360][ T7083] RIP: 0033:0x7fa1e449cae9 [ 2406.755804][ T7083] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2406.775430][ T7083] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2406.783875][ T7083] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2406.791874][ T7083] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2406.799868][ T7083] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2406.807869][ T7083] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2406.815864][ T7083] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2406.823874][ T7083] 19:12:27 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x220c00, 0x0) 19:12:27 executing program 1: mq_open(&(0x7f0000000140)='$%\x00', 0x80, 0x20, &(0x7f0000000240)={0x3ff, 0x100000001, 0x401, 0x8000}) add_key(&(0x7f0000000200)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)='%p \x00'}, 0x20) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x6, 0x1d, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7a}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_val={0x18, 0x5, 0x2, 0x0, r0}, @jmp={0x5, 0x1, 0x3, 0x9, 0x2, 0xfffffffffffffff8, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0xd}, @printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x80}}, @ldst={0x3, 0x0, 0x4, 0x8, 0x7, 0x80}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000380)='syzkaller\x00', 0xb56, 0xd7, &(0x7f00000003c0)=""/215, 0x40f00, 0x20, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f00000004c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0xd, 0x1f, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r2, r3, r4, r0, r0], 0x0, 0x10, 0x101}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{r0}, &(0x7f0000000000), &(0x7f0000000180)='%p \x00'}, 0x20) mq_open(&(0x7f0000000140)='$%\x00', 0x80, 0x20, &(0x7f0000000240)={0x3ff, 0x100000001, 0x401, 0x8000}) (async) add_key(&(0x7f0000000200)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000100)={{}, &(0x7f0000000080), &(0x7f00000000c0)='%p \x00'}, 0x20) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (async) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (async) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, 0x0, 0x0) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (async) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, 0x0, 0x0) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (async) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x6, 0x1d, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7a}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_val={0x18, 0x5, 0x2, 0x0, r0}, @jmp={0x5, 0x1, 0x3, 0x9, 0x2, 0xfffffffffffffff8, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0xd}, @printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x80}}, @ldst={0x3, 0x0, 0x4, 0x8, 0x7, 0x80}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000380)='syzkaller\x00', 0xb56, 0xd7, &(0x7f00000003c0)=""/215, 0x40f00, 0x20, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f00000004c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0xd, 0x1f, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r2, r3, r4, r0, r0], 0x0, 0x10, 0x101}, 0x90) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{r0}, &(0x7f0000000000), &(0x7f0000000180)='%p \x00'}, 0x20) (async) 19:12:27 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x3f, 0x20000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) (async) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async, rerun: 32) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x145100, 0x0) (rerun: 32) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_tracing={0x1a, 0xa, &(0x7f0000000080)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x1}, @generic={0x9f, 0x6, 0x4, 0x0, 0x80000001}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffffb}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x8000}, @generic={0x2, 0x1, 0x2, 0x6, 0x5}, @ldst={0x1, 0x3, 0x2, 0x3, 0x6, 0x20, 0xfffffffffffffffc}], &(0x7f0000000100)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f0000000140)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000180)={0x2, 0xe, 0x0, 0x20}, 0x10, 0x1344f, r1, 0xa, &(0x7f00000001c0)=[r1, r1, r1, r1, r1, 0xffffffffffffffff], &(0x7f0000000200)=[{0x3, 0x3, 0xf, 0x8}, {0x5, 0x3, 0xe, 0x9}, {0x3, 0x2, 0x0, 0x6}, {0x1, 0x1, 0x1, 0x4}, {0x1, 0x1, 0xf, 0xc}, {0x1, 0x4, 0xe, 0x7}, {0x2, 0x3, 0xf, 0x4}, {0x3, 0x1, 0x0, 0xb}, {0x0, 0x3, 0x1, 0x2}, {0x0, 0x4, 0xf, 0x9}], 0x10, 0xffff}, 0x90) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000380)={{0x1, 0x1, 0x18, r2, {0x5ce545af}}, './file0\x00'}) 19:12:27 executing program 5: socketpair(0x0, 0xe, 0x0, 0x0) 19:12:27 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:27 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 20) 19:12:27 executing program 5: socketpair(0x0, 0xe, 0x0, 0x0) [ 2407.138077][ T7111] FAULT_INJECTION: forcing a failure. [ 2407.138077][ T7111] name failslab, interval 1, probability 0, space 0, times 0 [ 2407.190596][ T7111] CPU: 1 PID: 7111 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2407.199153][ T7111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2407.209228][ T7111] Call Trace: [ 2407.212526][ T7111] [ 2407.215474][ T7111] dump_stack_lvl+0x1e3/0x2cb [ 2407.220181][ T7111] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2407.225825][ T7111] ? panic+0x84d/0x84d [ 2407.229904][ T7111] ? __might_sleep+0xc0/0xc0 [ 2407.234529][ T7111] should_fail+0x38a/0x4c0 [ 2407.238990][ T7111] should_failslab+0x5/0x20 [ 2407.243512][ T7111] slab_pre_alloc_hook+0x53/0xc0 [ 2407.248478][ T7111] __kmalloc+0x6e/0x300 [ 2407.252654][ T7111] ? security_task_alloc+0x3f/0x120 [ 2407.257882][ T7111] security_task_alloc+0x3f/0x120 [ 2407.262930][ T7111] copy_process+0x1664/0x3ef0 [ 2407.267653][ T7111] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2407.272802][ T7111] ? _copy_from_user+0x10f/0x170 [ 2407.277768][ T7111] kernel_clone+0x210/0x960 [ 2407.282279][ T7111] ? create_io_thread+0x1e0/0x1e0 [ 2407.287320][ T7111] __se_sys_clone3+0x3e1/0x430 [ 2407.292085][ T7111] ? __x64_sys_clone3+0x60/0x60 [ 2407.296949][ T7111] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2407.302925][ T7111] ? lockdep_hardirqs_on+0x94/0x130 [ 2407.308129][ T7111] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2407.314112][ T7111] do_syscall_64+0x3d/0xb0 [ 2407.318525][ T7111] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2407.324415][ T7111] RIP: 0033:0x7fa1e449cae9 [ 2407.328827][ T7111] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2407.348513][ T7111] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2407.356933][ T7111] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2407.364902][ T7111] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2407.372868][ T7111] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2407.380926][ T7111] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 19:12:27 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) 19:12:27 executing program 1: add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) 19:12:27 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x1ffff000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) [ 2407.388905][ T7111] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2407.396891][ T7111] 19:12:27 executing program 5: socketpair(0x0, 0xe, 0x0, 0x0) 19:12:27 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 21) [ 2407.571733][ T7138] FAULT_INJECTION: forcing a failure. [ 2407.571733][ T7138] name failslab, interval 1, probability 0, space 0, times 0 [ 2407.598335][ T7138] CPU: 1 PID: 7138 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2407.606911][ T7138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2407.616978][ T7138] Call Trace: [ 2407.620269][ T7138] [ 2407.623214][ T7138] dump_stack_lvl+0x1e3/0x2cb [ 2407.627922][ T7138] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2407.633580][ T7138] ? panic+0x84d/0x84d [ 2407.637674][ T7138] ? __might_sleep+0xc0/0xc0 [ 2407.642285][ T7138] should_fail+0x38a/0x4c0 [ 2407.646727][ T7138] should_failslab+0x5/0x20 [ 2407.651253][ T7138] slab_pre_alloc_hook+0x53/0xc0 [ 2407.656219][ T7138] kmem_cache_alloc_trace+0x49/0x290 [ 2407.661525][ T7138] ? alloc_fdtable+0xab/0x280 [ 2407.666230][ T7138] alloc_fdtable+0xab/0x280 [ 2407.670760][ T7138] dup_fd+0x82e/0xc50 [ 2407.674900][ T7138] copy_files+0xe6/0x200 [ 2407.679167][ T7138] ? apparmor_task_alloc+0x7c/0x230 [ 2407.684390][ T7138] ? dup_task_struct+0xb60/0xb60 [ 2407.689350][ T7138] ? apparmor_task_alloc+0x1bd/0x230 [ 2407.694681][ T7138] ? copy_semundo+0x3e/0x230 [ 2407.699297][ T7138] copy_process+0x16ba/0x3ef0 [ 2407.704030][ T7138] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2407.709258][ T7138] ? _copy_from_user+0x10f/0x170 [ 2407.714231][ T7138] kernel_clone+0x210/0x960 [ 2407.718769][ T7138] ? create_io_thread+0x1e0/0x1e0 [ 2407.723835][ T7138] __se_sys_clone3+0x3e1/0x430 [ 2407.728642][ T7138] ? __x64_sys_clone3+0x60/0x60 [ 2407.733548][ T7138] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2407.739551][ T7138] ? lockdep_hardirqs_on+0x94/0x130 [ 2407.744776][ T7138] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2407.750760][ T7138] do_syscall_64+0x3d/0xb0 [ 2407.755223][ T7138] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2407.761120][ T7138] RIP: 0033:0x7fa1e449cae9 [ 2407.765529][ T7138] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2407.785128][ T7138] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2407.793563][ T7138] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2407.801528][ T7138] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2407.809490][ T7138] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2407.817452][ T7138] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2407.825426][ T7138] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2407.833401][ T7138] 19:12:27 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x220c00, 0x0) (async) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x220c00, 0x0) 19:12:27 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) 19:12:27 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x20000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:27 executing program 1: add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) 19:12:27 executing program 5: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpgrp(0xffffffffffffffff) getsockopt$PNPIPE_INITSTATE(0xffffffffffffffff, 0x113, 0x4, &(0x7f0000000300), &(0x7f0000000340)=0x4) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r0, 0x0, 0x0], 0x9}, 0x58) mq_notify(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x16, 0x4, @tid=r0}) 19:12:27 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 22) 19:12:27 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) (async) 19:12:27 executing program 1: add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) [ 2407.948935][ T7149] FAULT_INJECTION: forcing a failure. [ 2407.948935][ T7149] name failslab, interval 1, probability 0, space 0, times 0 [ 2408.034762][ T7149] CPU: 1 PID: 7149 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2408.043309][ T7149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2408.053380][ T7149] Call Trace: [ 2408.056672][ T7149] [ 2408.059624][ T7149] dump_stack_lvl+0x1e3/0x2cb [ 2408.064328][ T7149] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2408.069991][ T7149] ? panic+0x84d/0x84d [ 2408.074084][ T7149] ? __might_sleep+0xc0/0xc0 [ 2408.078791][ T7149] should_fail+0x38a/0x4c0 [ 2408.083325][ T7149] should_failslab+0x5/0x20 [ 2408.087854][ T7149] slab_pre_alloc_hook+0x53/0xc0 [ 2408.092821][ T7149] kmem_cache_alloc_trace+0x49/0x290 [ 2408.098129][ T7149] ? alloc_fdtable+0xab/0x280 [ 2408.102829][ T7149] alloc_fdtable+0xab/0x280 [ 2408.107373][ T7149] dup_fd+0x82e/0xc50 [ 2408.111384][ T7149] copy_files+0xe6/0x200 [ 2408.115643][ T7149] ? apparmor_task_alloc+0x7c/0x230 [ 2408.120956][ T7149] ? dup_task_struct+0xb60/0xb60 [ 2408.125912][ T7149] ? apparmor_task_alloc+0x1bd/0x230 [ 2408.131217][ T7149] ? copy_semundo+0x3e/0x230 [ 2408.136304][ T7149] copy_process+0x16ba/0x3ef0 [ 2408.141023][ T7149] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2408.146165][ T7149] ? _copy_from_user+0x10f/0x170 [ 2408.151132][ T7149] kernel_clone+0x210/0x960 [ 2408.155663][ T7149] ? create_io_thread+0x1e0/0x1e0 [ 2408.160722][ T7149] __se_sys_clone3+0x3e1/0x430 [ 2408.165512][ T7149] ? __x64_sys_clone3+0x60/0x60 [ 2408.170409][ T7149] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2408.176404][ T7149] ? lockdep_hardirqs_on+0x94/0x130 [ 2408.181631][ T7149] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2408.187639][ T7149] do_syscall_64+0x3d/0xb0 [ 2408.192082][ T7149] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2408.198028][ T7149] RIP: 0033:0x7fa1e449cae9 [ 2408.202463][ T7149] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2408.222084][ T7149] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 19:12:28 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x40000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:28 executing program 1: add_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) 19:12:28 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000000)='keyring\x00', &(0x7f0000000040)=',\x1c\x1c#:!\x00') [ 2408.230519][ T7149] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2408.238515][ T7149] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2408.246507][ T7149] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2408.254504][ T7149] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2408.262492][ T7149] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2408.270584][ T7149] 19:12:28 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x220c00, 0x0) (async) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x220c00, 0x0) 19:12:28 executing program 1: add_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) (async) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) 19:12:28 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) (async) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000000)='keyring\x00', &(0x7f0000000040)=',\x1c\x1c#:!\x00') 19:12:28 executing program 1: add_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) (async) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) (async) 19:12:28 executing program 5: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x220c00, 0x0) 19:12:28 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async, rerun: 64) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (rerun: 64) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) (async, rerun: 32) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000000)='keyring\x00', &(0x7f0000000040)=',\x1c\x1c#:!\x00') (rerun: 32) 19:12:28 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 23) 19:12:28 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x41000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:28 executing program 1: add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) r1 = getuid() r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_persistent(0x16, r1, r2) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r0) 19:12:28 executing program 3: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) r1 = add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000080)="cccc49d6a1dfb389516b1a15cadcc95dbb97d672a7242df4a16f41b6e9dbd76271a9d431243e02becde758e0692412c04b47650dd22a32cb5dd2ecd01860b82b209987d1b1328e917377feca82701c7ee17b289109236a0b2bfe7105106b234bb11b3c174e14f0de86b7168a4f8412ca395c613a18b24d284796354d67dbce4bda4167d47cfbf37fb554ac6ea72bbd554b87d882b004b462c0d6d9018030e03bf5e7082c4573623b8b401da6ed88c4fe03484fbdf45e9fcba5c76493f676542cace386ecbb4411e667e5ae86fff8f0706f26506e", 0xd4, r0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r4 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$negate(0xd, r1, 0x8, r4) r5 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$unlink(0x18, r3, r5) [ 2408.627570][ T7190] FAULT_INJECTION: forcing a failure. [ 2408.627570][ T7190] name failslab, interval 1, probability 0, space 0, times 0 [ 2408.667160][ T7190] CPU: 0 PID: 7190 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2408.675707][ T7190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2408.685781][ T7190] Call Trace: [ 2408.689107][ T7190] [ 2408.692056][ T7190] dump_stack_lvl+0x1e3/0x2cb [ 2408.696795][ T7190] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2408.702473][ T7190] ? panic+0x84d/0x84d [ 2408.706571][ T7190] ? __might_sleep+0xc0/0xc0 [ 2408.711188][ T7190] ? rcu_is_watching+0x11/0xa0 [ 2408.715977][ T7190] ? __alloc_pages+0x334/0x700 [ 2408.720778][ T7190] should_fail+0x38a/0x4c0 [ 2408.725238][ T7190] should_failslab+0x5/0x20 [ 2408.729756][ T7190] slab_pre_alloc_hook+0x53/0xc0 [ 2408.734719][ T7190] ? __pmd_alloc+0x136/0x850 [ 2408.739336][ T7190] kmem_cache_alloc+0x3f/0x280 [ 2408.744134][ T7190] __pmd_alloc+0x136/0x850 [ 2408.748578][ T7190] ? __pud_alloc+0x210/0x210 [ 2408.753199][ T7190] ? _raw_spin_unlock+0x24/0x40 [ 2408.758079][ T7190] ? __pud_alloc+0x1d1/0x210 [ 2408.762698][ T7190] ? handle_mm_fault+0x5950/0x5950 [ 2408.767849][ T7190] copy_page_range+0x3bbc/0x43b0 [ 2408.772808][ T7190] ? __lock_acquire+0x1295/0x1ff0 19:12:28 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x847c0fff, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:28 executing program 1: add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) (async, rerun: 32) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (rerun: 32) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) (async) r1 = getuid() r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_persistent(0x16, r1, r2) (async) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r0) [ 2408.777894][ T7190] ? rcu_lock_acquire+0x30/0x30 [ 2408.782834][ T7190] ? pfn_valid+0x1d0/0x1d0 [ 2408.787276][ T7190] ? up_write+0x133/0x4d0 [ 2408.791635][ T7190] ? __up_read+0x690/0x690 [ 2408.796079][ T7190] ? memset+0x1f/0x40 [ 2408.800087][ T7190] ? anon_vma_interval_tree_insert+0x429/0x4a0 [ 2408.806268][ T7190] ? vma_interval_tree_augment_rotate+0x1c0/0x1c0 [ 2408.812814][ T7190] copy_mm+0xc64/0x1370 [ 2408.817125][ T7190] ? copy_signal+0x630/0x630 [ 2408.821740][ T7190] ? __init_rwsem+0x11e/0x160 [ 2408.826443][ T7190] ? copy_signal+0x529/0x630 [ 2408.831051][ T7190] copy_process+0x1816/0x3ef0 [ 2408.835788][ T7190] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2408.840923][ T7190] ? _copy_from_user+0x10f/0x170 [ 2408.845891][ T7190] kernel_clone+0x210/0x960 [ 2408.850423][ T7190] ? create_io_thread+0x1e0/0x1e0 [ 2408.855493][ T7190] __se_sys_clone3+0x3e1/0x430 [ 2408.860279][ T7190] ? __x64_sys_clone3+0x60/0x60 [ 2408.865188][ T7190] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2408.871195][ T7190] ? lockdep_hardirqs_on+0x94/0x130 19:12:28 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000080)=0x2) socketpair(0x11, 0x1, 0x80000000, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000040)=0x401) socket$rds(0x15, 0x5, 0x0) setsockopt$inet_dccp_int(r0, 0x21, 0xa, &(0x7f0000000000)=0x81, 0x4) syz_clone3(&(0x7f0000000100)={0xf6000000, 0x0, 0x0, 0x0, {0x200}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) 19:12:28 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x847e4fff, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) [ 2408.876422][ T7190] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2408.882418][ T7190] do_syscall_64+0x3d/0xb0 [ 2408.886857][ T7190] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2408.892772][ T7190] RIP: 0033:0x7fa1e449cae9 [ 2408.897203][ T7190] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2408.916829][ T7190] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 19:12:28 executing program 3: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) (async) r1 = add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000080)="cccc49d6a1dfb389516b1a15cadcc95dbb97d672a7242df4a16f41b6e9dbd76271a9d431243e02becde758e0692412c04b47650dd22a32cb5dd2ecd01860b82b209987d1b1328e917377feca82701c7ee17b289109236a0b2bfe7105106b234bb11b3c174e14f0de86b7168a4f8412ca395c613a18b24d284796354d67dbce4bda4167d47cfbf37fb554ac6ea72bbd554b87d882b004b462c0d6d9018030e03bf5e7082c4573623b8b401da6ed88c4fe03484fbdf45e9fcba5c76493f676542cace386ecbb4411e667e5ae86fff8f0706f26506e", 0xd4, r0) (async) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) (async, rerun: 32) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async, rerun: 32) r4 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r4) (async) keyctl$negate(0xd, r1, 0x8, r4) r5 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$unlink(0x18, r3, r5) [ 2408.925262][ T7190] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2408.933266][ T7190] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2408.941254][ T7190] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2408.949255][ T7190] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2408.957245][ T7190] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2408.965247][ T7190] 19:12:28 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0xf0ffffff, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:29 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x41000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:29 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000080)=0x2) (async) socketpair(0x11, 0x1, 0x80000000, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) (async) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000040)=0x401) socket$rds(0x15, 0x5, 0x0) (async) setsockopt$inet_dccp_int(r0, 0x21, 0xa, &(0x7f0000000000)=0x81, 0x4) (async) syz_clone3(&(0x7f0000000100)={0xf6000000, 0x0, 0x0, 0x0, {0x200}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) 19:12:29 executing program 1: add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) r1 = getuid() r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_persistent(0x16, r1, r2) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r0) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) (async) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) (async) getuid() (async) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) (async) keyctl$get_persistent(0x16, r1, r2) (async) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r0) (async) 19:12:29 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 24) 19:12:29 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0xf5ffffff, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:29 executing program 3: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) r1 = add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000080)="cccc49d6a1dfb389516b1a15cadcc95dbb97d672a7242df4a16f41b6e9dbd76271a9d431243e02becde758e0692412c04b47650dd22a32cb5dd2ecd01860b82b209987d1b1328e917377feca82701c7ee17b289109236a0b2bfe7105106b234bb11b3c174e14f0de86b7168a4f8412ca395c613a18b24d284796354d67dbce4bda4167d47cfbf37fb554ac6ea72bbd554b87d882b004b462c0d6d9018030e03bf5e7082c4573623b8b401da6ed88c4fe03484fbdf45e9fcba5c76493f676542cace386ecbb4411e667e5ae86fff8f0706f26506e", 0xd4, r0) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r4 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$negate(0xd, r1, 0x8, r4) r5 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$unlink(0x18, r3, r5) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) (async) add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000080)="cccc49d6a1dfb389516b1a15cadcc95dbb97d672a7242df4a16f41b6e9dbd76271a9d431243e02becde758e0692412c04b47650dd22a32cb5dd2ecd01860b82b209987d1b1328e917377feca82701c7ee17b289109236a0b2bfe7105106b234bb11b3c174e14f0de86b7168a4f8412ca395c613a18b24d284796354d67dbce4bda4167d47cfbf37fb554ac6ea72bbd554b87d882b004b462c0d6d9018030e03bf5e7082c4573623b8b401da6ed88c4fe03484fbdf45e9fcba5c76493f676542cace386ecbb4411e667e5ae86fff8f0706f26506e", 0xd4, r0) (async) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) (async) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r4) (async) keyctl$negate(0xd, r1, 0x8, r4) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) (async) keyctl$unlink(0x18, r3, r5) (async) [ 2409.114096][ T7228] FAULT_INJECTION: forcing a failure. [ 2409.114096][ T7228] name failslab, interval 1, probability 0, space 0, times 0 [ 2409.159669][ T7228] CPU: 0 PID: 7228 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2409.168221][ T7228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2409.178298][ T7228] Call Trace: [ 2409.181593][ T7228] [ 2409.184539][ T7228] dump_stack_lvl+0x1e3/0x2cb [ 2409.189244][ T7228] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2409.194899][ T7228] ? panic+0x84d/0x84d [ 2409.198991][ T7228] ? memset+0x1f/0x40 [ 2409.203002][ T7228] should_fail+0x38a/0x4c0 19:12:29 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x60, 0x39, 0x60, 0x65, 0x66, 0x66, 0x38, 0x66, 0x39, 0x30, 0x66, 0x32, 0x39, 0x34, 0x66, 0x64]}, &(0x7f0000000080)={0x0, "0f8150b19d067295bc27c1ecf655255da6f707105f2ba8647c1ccd6ac92cf85359e0efb1b931b58cc2239fa337583442d3cc29fa22f07dfa893fa72be754f208", 0x17}, 0x48, 0xfffffffffffffffc) keyctl$unlink(0x18, 0x0, r0) add_key(&(0x7f0000000300)='blacklist\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)="6b3ea0a7c1b086c290d03f5ad90147", 0xf, 0xfffffffffffffffa) keyctl$reject(0x13, r0, 0x3, 0x8, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x37, 0x62, 0x35, 0x62, 0x64, 0x33, 0x60, 0x35, 0x39, 0x31, 0x5c, 0x33, 0x35, 0x31, 0x36, 0x39]}, &(0x7f0000000180)={0x0, "29d0c27a9ccd6aaaade2f74c9a236b86bfa6544610eabdeae10264262b784bde5d0d2d1b1a240d1e3309898f8d912f5d888d22c05f5757b71d55af106bf96ec1", 0x3c}, 0x48, r0) r2 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$search(0xa, r1, &(0x7f0000000200)='big_key\x00', &(0x7f0000000240)={'syz', 0x0}, r2) 19:12:29 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000080)=0x2) (async) socketpair(0x11, 0x1, 0x80000000, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000040)=0x401) (async) socket$rds(0x15, 0x5, 0x0) setsockopt$inet_dccp_int(r0, 0x21, 0xa, &(0x7f0000000000)=0x81, 0x4) syz_clone3(&(0x7f0000000100)={0xf6000000, 0x0, 0x0, 0x0, {0x200}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) 19:12:29 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0xfbffffff, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) [ 2409.207447][ T7228] should_failslab+0x5/0x20 [ 2409.211964][ T7228] slab_pre_alloc_hook+0x53/0xc0 [ 2409.217075][ T7228] ? copy_fs_struct+0x4a/0x260 [ 2409.221916][ T7228] kmem_cache_alloc+0x3f/0x280 [ 2409.226701][ T7228] ? apparmor_task_alloc+0x7c/0x230 [ 2409.231943][ T7228] copy_fs_struct+0x4a/0x260 [ 2409.236562][ T7228] copy_fs+0x6d/0x140 [ 2409.240573][ T7228] copy_process+0x16e5/0x3ef0 [ 2409.245307][ T7228] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2409.250457][ T7228] ? _copy_from_user+0x10f/0x170 [ 2409.255422][ T7228] kernel_clone+0x210/0x960 19:12:29 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x60, 0x39, 0x60, 0x65, 0x66, 0x66, 0x38, 0x66, 0x39, 0x30, 0x66, 0x32, 0x39, 0x34, 0x66, 0x64]}, &(0x7f0000000080)={0x0, "0f8150b19d067295bc27c1ecf655255da6f707105f2ba8647c1ccd6ac92cf85359e0efb1b931b58cc2239fa337583442d3cc29fa22f07dfa893fa72be754f208", 0x17}, 0x48, 0xfffffffffffffffc) keyctl$unlink(0x18, 0x0, r0) (async) add_key(&(0x7f0000000300)='blacklist\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)="6b3ea0a7c1b086c290d03f5ad90147", 0xf, 0xfffffffffffffffa) (async) keyctl$reject(0x13, r0, 0x3, 0x8, r0) (async, rerun: 32) r1 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x37, 0x62, 0x35, 0x62, 0x64, 0x33, 0x60, 0x35, 0x39, 0x31, 0x5c, 0x33, 0x35, 0x31, 0x36, 0x39]}, &(0x7f0000000180)={0x0, "29d0c27a9ccd6aaaade2f74c9a236b86bfa6544610eabdeae10264262b784bde5d0d2d1b1a240d1e3309898f8d912f5d888d22c05f5757b71d55af106bf96ec1", 0x3c}, 0x48, r0) (rerun: 32) r2 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$search(0xa, r1, &(0x7f0000000200)='big_key\x00', &(0x7f0000000240)={'syz', 0x0}, r2) [ 2409.259951][ T7228] ? create_io_thread+0x1e0/0x1e0 [ 2409.265010][ T7228] __se_sys_clone3+0x3e1/0x430 [ 2409.269797][ T7228] ? __x64_sys_clone3+0x60/0x60 [ 2409.274694][ T7228] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2409.280694][ T7228] ? lockdep_hardirqs_on+0x94/0x130 [ 2409.285917][ T7228] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2409.291920][ T7228] do_syscall_64+0x3d/0xb0 [ 2409.296364][ T7228] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2409.302316][ T7228] RIP: 0033:0x7fa1e449cae9 19:12:29 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x60, 0x39, 0x60, 0x65, 0x66, 0x66, 0x38, 0x66, 0x39, 0x30, 0x66, 0x32, 0x39, 0x34, 0x66, 0x64]}, &(0x7f0000000080)={0x0, "0f8150b19d067295bc27c1ecf655255da6f707105f2ba8647c1ccd6ac92cf85359e0efb1b931b58cc2239fa337583442d3cc29fa22f07dfa893fa72be754f208", 0x17}, 0x48, 0xfffffffffffffffc) keyctl$unlink(0x18, 0x0, r0) (async) add_key(&(0x7f0000000300)='blacklist\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)="6b3ea0a7c1b086c290d03f5ad90147", 0xf, 0xfffffffffffffffa) (async) keyctl$reject(0x13, r0, 0x3, 0x8, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x37, 0x62, 0x35, 0x62, 0x64, 0x33, 0x60, 0x35, 0x39, 0x31, 0x5c, 0x33, 0x35, 0x31, 0x36, 0x39]}, &(0x7f0000000180)={0x0, "29d0c27a9ccd6aaaade2f74c9a236b86bfa6544610eabdeae10264262b784bde5d0d2d1b1a240d1e3309898f8d912f5d888d22c05f5757b71d55af106bf96ec1", 0x3c}, 0x48, r0) r2 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$search(0xa, r1, &(0x7f0000000200)='big_key\x00', &(0x7f0000000240)={'syz', 0x0}, r2) [ 2409.306748][ T7228] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2409.326458][ T7228] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2409.334896][ T7228] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2409.342891][ T7228] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2409.350877][ T7228] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 19:12:29 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0xff0f0100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) [ 2409.358866][ T7228] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2409.366853][ T7228] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2409.374858][ T7228] 19:12:29 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x40000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:29 executing program 1: r0 = add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) ioctl$MEDIA_IOC_ENUM_ENTITIES(0xffffffffffffffff, 0xc1007c01, &(0x7f0000000240)) r1 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r0) add_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="5687c5ee27c17c2afa349a59831c213076b140edc85bdb7ccfc805fdb18e00acdb1edc82f79526499fd3e56251a065c481f70bae7a8cf1441f50f7d59a2acf10569b5c1874556e7d127107d1fe31b14ab978f44f54c02a9e9c96ebe43bd5df75fdee29a7736be201cb123b21fa946266b5f154a2d4593bbfb4ab6736623a1347cc702ff5e1a0be7ab177ed", 0x8b, r1) 19:12:29 executing program 4: r0 = syz_clone3(&(0x7f0000000000)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = getpgid(r0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz1\x00', 0x200002, 0x0) syz_clone3(&(0x7f00000002c0)={0x2000000, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), {0x18}, &(0x7f0000000140)=""/89, 0x59, &(0x7f00000001c0)=""/116, &(0x7f0000000240)=[r1], 0x1, {r2}}, 0x58) 19:12:29 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x1}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x4}, 0x48) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000000)={0xd373, 0x8000000000000000, 0x0, 0xfffffffffffffffc}, 0x0) 19:12:29 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 25) 19:12:29 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0xff0f7c84, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) [ 2409.598070][ T7269] FAULT_INJECTION: forcing a failure. [ 2409.598070][ T7269] name failslab, interval 1, probability 0, space 0, times 0 [ 2409.616330][ T7269] CPU: 1 PID: 7269 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2409.624861][ T7269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2409.634943][ T7269] Call Trace: [ 2409.638229][ T7269] [ 2409.641170][ T7269] dump_stack_lvl+0x1e3/0x2cb 19:12:29 executing program 1: r0 = add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) ioctl$MEDIA_IOC_ENUM_ENTITIES(0xffffffffffffffff, 0xc1007c01, &(0x7f0000000240)) (async) r1 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r0) add_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="5687c5ee27c17c2afa349a59831c213076b140edc85bdb7ccfc805fdb18e00acdb1edc82f79526499fd3e56251a065c481f70bae7a8cf1441f50f7d59a2acf10569b5c1874556e7d127107d1fe31b14ab978f44f54c02a9e9c96ebe43bd5df75fdee29a7736be201cb123b21fa946266b5f154a2d4593bbfb4ab6736623a1347cc702ff5e1a0be7ab177ed", 0x8b, r1) 19:12:29 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0xff4f7e84, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) [ 2409.645878][ T7269] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2409.651551][ T7269] ? panic+0x84d/0x84d [ 2409.655645][ T7269] ? __might_sleep+0xc0/0xc0 [ 2409.660259][ T7269] ? rcu_is_watching+0x11/0xa0 [ 2409.665056][ T7269] should_fail+0x38a/0x4c0 [ 2409.669500][ T7269] should_failslab+0x5/0x20 [ 2409.674033][ T7269] slab_pre_alloc_hook+0x53/0xc0 [ 2409.678996][ T7269] ? ptlock_alloc+0x1c/0x60 [ 2409.683526][ T7269] kmem_cache_alloc+0x3f/0x280 [ 2409.688335][ T7269] ptlock_alloc+0x1c/0x60 [ 2409.692691][ T7269] pte_alloc_one+0xd1/0x360 19:12:29 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0xfffffff0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) [ 2409.697236][ T7269] ? pfn_modify_allowed+0x2f0/0x2f0 [ 2409.702452][ T7269] ? _raw_spin_unlock+0x24/0x40 [ 2409.707319][ T7269] ? __pmd_alloc+0x6e8/0x850 [ 2409.711935][ T7269] ? __pud_alloc+0x210/0x210 [ 2409.716571][ T7269] __pte_alloc+0x75/0x210 [ 2409.720927][ T7269] ? free_pgtables+0x2a0/0x2a0 [ 2409.725724][ T7269] copy_page_range+0x37cc/0x43b0 [ 2409.730683][ T7269] ? __lock_acquire+0x1295/0x1ff0 [ 2409.735785][ T7269] ? pfn_valid+0x1d0/0x1d0 [ 2409.740231][ T7269] ? up_write+0x133/0x4d0 19:12:29 executing program 1: r0 = add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) (async) ioctl$MEDIA_IOC_ENUM_ENTITIES(0xffffffffffffffff, 0xc1007c01, &(0x7f0000000240)) r1 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r0) add_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="5687c5ee27c17c2afa349a59831c213076b140edc85bdb7ccfc805fdb18e00acdb1edc82f79526499fd3e56251a065c481f70bae7a8cf1441f50f7d59a2acf10569b5c1874556e7d127107d1fe31b14ab978f44f54c02a9e9c96ebe43bd5df75fdee29a7736be201cb123b21fa946266b5f154a2d4593bbfb4ab6736623a1347cc702ff5e1a0be7ab177ed", 0x8b, r1) [ 2409.744591][ T7269] ? __up_read+0x690/0x690 [ 2409.749031][ T7269] ? memset+0x1f/0x40 [ 2409.753039][ T7269] ? vma_interval_tree_augment_rotate+0x1c0/0x1c0 [ 2409.759504][ T7269] copy_mm+0xc64/0x1370 [ 2409.763706][ T7269] ? copy_signal+0x630/0x630 [ 2409.768325][ T7269] ? __init_rwsem+0x11e/0x160 [ 2409.773040][ T7269] ? copy_signal+0x529/0x630 [ 2409.777654][ T7269] copy_process+0x1816/0x3ef0 [ 2409.782387][ T7269] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2409.787526][ T7269] ? _copy_from_user+0x10f/0x170 [ 2409.792496][ T7269] kernel_clone+0x210/0x960 19:12:29 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0xfffffff5, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) [ 2409.797057][ T7269] ? create_io_thread+0x1e0/0x1e0 [ 2409.802136][ T7269] __se_sys_clone3+0x3e1/0x430 [ 2409.806924][ T7269] ? __x64_sys_clone3+0x60/0x60 [ 2409.811824][ T7269] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2409.818020][ T7269] ? lockdep_hardirqs_on+0x94/0x130 [ 2409.823246][ T7269] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2409.829254][ T7269] do_syscall_64+0x3d/0xb0 [ 2409.833699][ T7269] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2409.839616][ T7269] RIP: 0033:0x7fa1e449cae9 19:12:29 executing program 1: add_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) [ 2409.844053][ T7269] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2409.863679][ T7269] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2409.872118][ T7269] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2409.880111][ T7269] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2409.888096][ T7269] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2409.896079][ T7269] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2409.904086][ T7269] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2409.912092][ T7269] 19:12:30 executing program 5: r0 = syz_clone3(&(0x7f0000000000)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = getpgid(r0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz1\x00', 0x200002, 0x0) syz_clone3(&(0x7f00000002c0)={0x2000000, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), {0x18}, &(0x7f0000000140)=""/89, 0x59, &(0x7f00000001c0)=""/116, &(0x7f0000000240)=[r1], 0x1, {r2}}, 0x58) 19:12:30 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0xfffffffb, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:30 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x1}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x4}, 0x48) (async) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000000)={0xd373, 0x8000000000000000, 0x0, 0xfffffffffffffffc}, 0x0) 19:12:30 executing program 1: add_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) (async) 19:12:30 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 26) 19:12:30 executing program 4: r0 = syz_clone3(&(0x7f0000000000)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = getpgid(r0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz1\x00', 0x200002, 0x0) syz_clone3(&(0x7f00000002c0)={0x2000000, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), {0x18}, &(0x7f0000000140)=""/89, 0x59, &(0x7f00000001c0)=""/116, &(0x7f0000000240)=[r1], 0x1, {r2}}, 0x58) (async) syz_clone3(&(0x7f00000002c0)={0x2000000, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), {0x18}, &(0x7f0000000140)=""/89, 0x59, &(0x7f00000001c0)=""/116, &(0x7f0000000240)=[r1], 0x1, {r2}}, 0x58) 19:12:30 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x100000800, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:30 executing program 1: add_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) 19:12:30 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x1}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x4}, 0x48) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x4}, 0x48) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000000)={0xd373, 0x8000000000000000, 0x0, 0xfffffffffffffffc}, 0x0) [ 2410.175083][ T7304] FAULT_INJECTION: forcing a failure. [ 2410.175083][ T7304] name failslab, interval 1, probability 0, space 0, times 0 [ 2410.217074][ T7304] CPU: 1 PID: 7304 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2410.225621][ T7304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2410.235693][ T7304] Call Trace: [ 2410.238990][ T7304] [ 2410.241934][ T7304] dump_stack_lvl+0x1e3/0x2cb [ 2410.246651][ T7304] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2410.252314][ T7304] ? panic+0x84d/0x84d [ 2410.256416][ T7304] ? __might_sleep+0xc0/0xc0 [ 2410.261042][ T7304] ? do_raw_spin_lock+0x14a/0x370 [ 2410.266097][ T7304] should_fail+0x38a/0x4c0 [ 2410.270542][ T7304] should_failslab+0x5/0x20 [ 2410.275071][ T7304] slab_pre_alloc_hook+0x53/0xc0 [ 2410.280036][ T7304] ? copy_sighand+0x50/0x230 [ 2410.284651][ T7304] kmem_cache_alloc+0x3f/0x280 [ 2410.289437][ T7304] ? _raw_spin_unlock+0x24/0x40 [ 2410.294314][ T7304] copy_sighand+0x50/0x230 [ 2410.298759][ T7304] copy_process+0x1710/0x3ef0 [ 2410.303486][ T7304] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2410.308625][ T7304] ? _copy_from_user+0x10f/0x170 19:12:30 executing program 1: r0 = add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$reject(0x13, r1, 0x401, 0x5, r0) [ 2410.313677][ T7304] kernel_clone+0x210/0x960 [ 2410.318208][ T7304] ? dma_resv_get_fences+0x880/0x10d0 [ 2410.323674][ T7304] ? create_io_thread+0x1e0/0x1e0 [ 2410.328740][ T7304] __se_sys_clone3+0x3e1/0x430 [ 2410.333529][ T7304] ? __x64_sys_clone3+0x60/0x60 [ 2410.338431][ T7304] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2410.344430][ T7304] ? lockdep_hardirqs_on+0x94/0x130 [ 2410.349662][ T7304] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2410.355670][ T7304] do_syscall_64+0x3d/0xb0 [ 2410.360115][ T7304] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2410.366039][ T7304] RIP: 0033:0x7fa1e449cae9 [ 2410.370477][ T7304] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2410.390202][ T7304] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2410.398644][ T7304] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2410.406636][ T7304] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 19:12:30 executing program 1: r0 = add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$reject(0x13, r1, 0x401, 0x5, r0) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) (async) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) (async) keyctl$reject(0x13, r1, 0x401, 0x5, r0) (async) [ 2410.414625][ T7304] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2410.422608][ T7304] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2410.430597][ T7304] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2410.438600][ T7304] 19:12:30 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x1b1151f000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:30 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0xfffffff0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:30 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0xee00, 0xffffffffffffffff) 19:12:30 executing program 1: add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) (async) r0 = add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$reject(0x13, r1, 0x401, 0x5, r0) 19:12:30 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x29cb03398000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:30 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 27) 19:12:30 executing program 4: r0 = syz_clone3(&(0x7f0000000000)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = getpgid(r0) (async) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz1\x00', 0x200002, 0x0) syz_clone3(&(0x7f00000002c0)={0x2000000, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), {0x18}, &(0x7f0000000140)=""/89, 0x59, &(0x7f00000001c0)=""/116, &(0x7f0000000240)=[r1], 0x1, {r2}}, 0x58) 19:12:30 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) keyctl$get_persistent(0x16, 0xee00, 0xffffffffffffffff) [ 2410.877811][ T7337] FAULT_INJECTION: forcing a failure. [ 2410.877811][ T7337] name failslab, interval 1, probability 0, space 0, times 0 19:12:30 executing program 1: add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file0\x00'}) 19:12:30 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x400000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:30 executing program 5: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0xee00, 0xffffffffffffffff) [ 2410.956400][ T7337] CPU: 1 PID: 7337 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2410.964952][ T7337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2410.975036][ T7337] Call Trace: [ 2410.978332][ T7337] [ 2410.981271][ T7337] dump_stack_lvl+0x1e3/0x2cb [ 2410.985972][ T7337] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2410.991635][ T7337] ? panic+0x84d/0x84d [ 2410.995726][ T7337] ? __might_sleep+0xc0/0xc0 [ 2411.000341][ T7337] should_fail+0x38a/0x4c0 19:12:31 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x553a22949000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:31 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0xee00, 0xffffffffffffffff) [ 2411.004779][ T7337] should_failslab+0x5/0x20 [ 2411.009305][ T7337] slab_pre_alloc_hook+0x53/0xc0 [ 2411.014273][ T7337] ? copy_signal+0x51/0x630 [ 2411.018810][ T7337] kmem_cache_alloc+0x3f/0x280 [ 2411.023599][ T7337] copy_signal+0x51/0x630 [ 2411.027955][ T7337] copy_process+0x17bb/0x3ef0 [ 2411.032683][ T7337] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2411.037839][ T7337] ? _copy_from_user+0x10f/0x170 [ 2411.042800][ T7337] kernel_clone+0x210/0x960 [ 2411.047342][ T7337] ? create_io_thread+0x1e0/0x1e0 19:12:31 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x7000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) [ 2411.052403][ T7337] __se_sys_clone3+0x3e1/0x430 [ 2411.057196][ T7337] ? __x64_sys_clone3+0x60/0x60 [ 2411.062090][ T7337] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2411.068085][ T7337] ? lockdep_hardirqs_on+0x94/0x130 [ 2411.073313][ T7337] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2411.079775][ T7337] do_syscall_64+0x3d/0xb0 [ 2411.084224][ T7337] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2411.090153][ T7337] RIP: 0033:0x7fa1e449cae9 19:12:31 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="f31b88659d466f97e70523de7ef08cbcc8b0b4baf0f884a8996ce8b00cfee6cdd12249379974a88496fb58d2f74b44725e6a729e45176831b9df515ebf6e904b6cbe770a8dff5a197f465c2bcd36e23fc067da70391d4196fb19275b4c8e50f531f4f3c4d51466012dae00b59d5edeb725fa8a739205f26b3fd86bae5aa6650365f00a57c60a2ceaa30b5e0f04087842b28d5df9b7db6dfcaa1b0cd77d761e2fbced1976041ba3d9cdee2039d9f3c4a89eda968cd36826f82aaa1539a87abf20eba0aab96233c430bff98e3d7657908c7e82873ed0328cf87e75c9d659b35d6137ea473fc0a687", 0xfffffffffffffcf3, 0xfffffffffffffff9) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$unlink(0x9, r0, r2) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$link(0x8, r3, r4) keyctl$link(0x8, r0, r1) keyctl$clear(0x7, r0) 19:12:31 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x2001000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) [ 2411.094587][ T7337] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2411.114235][ T7337] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2411.122674][ T7337] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2411.130669][ T7337] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2411.138659][ T7337] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2411.146743][ T7337] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2411.155424][ T7337] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2411.163431][ T7337] 19:12:31 executing program 1: add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file0\x00'}) (rerun: 64) 19:12:31 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 28) [ 2411.453466][ T7367] FAULT_INJECTION: forcing a failure. [ 2411.453466][ T7367] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2411.467004][ T7367] CPU: 0 PID: 7367 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2411.475531][ T7367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2411.485607][ T7367] Call Trace: [ 2411.488897][ T7367] [ 2411.491833][ T7367] dump_stack_lvl+0x1e3/0x2cb [ 2411.496537][ T7367] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2411.502182][ T7367] ? panic+0x84d/0x84d [ 2411.506259][ T7367] ? __lock_acquire+0x1295/0x1ff0 [ 2411.511295][ T7367] should_fail+0x38a/0x4c0 [ 2411.515725][ T7367] prepare_alloc_pages+0x1db/0x5b0 [ 2411.520850][ T7367] __alloc_pages+0x14f/0x700 [ 2411.525451][ T7367] ? __rmqueue_pcplist+0x2030/0x2030 [ 2411.530753][ T7367] ? lockdep_init_map_type+0x9d/0x8d0 [ 2411.536138][ T7367] ? lockdep_unregister_key+0x5b0/0x5b0 [ 2411.541680][ T7367] ? lockdep_softirqs_off+0x420/0x420 [ 2411.547053][ T7367] ? alloc_pages+0x458/0x570 [ 2411.551654][ T7367] __get_free_pages+0x8/0x30 [ 2411.556242][ T7367] pgd_alloc+0x1d/0x1c0 [ 2411.560397][ T7367] mm_init+0x51d/0x830 [ 2411.564473][ T7367] copy_mm+0x1d0/0x1370 [ 2411.568623][ T7367] ? lockdep_softirqs_off+0x420/0x420 [ 2411.574008][ T7367] ? copy_signal+0x630/0x630 [ 2411.578602][ T7367] ? __init_rwsem+0x11e/0x160 [ 2411.583283][ T7367] ? copy_signal+0x529/0x630 [ 2411.587871][ T7367] copy_process+0x1816/0x3ef0 [ 2411.593348][ T7367] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2411.598472][ T7367] ? _copy_from_user+0x10f/0x170 [ 2411.603425][ T7367] kernel_clone+0x210/0x960 [ 2411.607927][ T7367] ? create_io_thread+0x1e0/0x1e0 [ 2411.612959][ T7367] __se_sys_clone3+0x3e1/0x430 [ 2411.617723][ T7367] ? __x64_sys_clone3+0x60/0x60 [ 2411.622586][ T7367] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2411.628562][ T7367] ? lockdep_hardirqs_on+0x94/0x130 [ 2411.633776][ T7367] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2411.639755][ T7367] do_syscall_64+0x3d/0xb0 [ 2411.644170][ T7367] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2411.650059][ T7367] RIP: 0033:0x7fa1e449cae9 [ 2411.654470][ T7367] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2411.674074][ T7367] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2411.682514][ T7367] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2411.690491][ T7367] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 19:12:31 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$negate(0xd, r0, 0x1, 0xfffffffffffffff9) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "25e984f9f0c354e56210822c9b68b7f51794b5f1553a7f5213bb8b7ef30c21deac7aa09a23ae2c2822f28cb7ab8f75ac2c715978119d59f0657827f218ed4cab", 0x13}, 0x48, r1) 19:12:31 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x2020000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:31 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) r0 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="f31b88659d466f97e70523de7ef08cbcc8b0b4baf0f884a8996ce8b00cfee6cdd12249379974a88496fb58d2f74b44725e6a729e45176831b9df515ebf6e904b6cbe770a8dff5a197f465c2bcd36e23fc067da70391d4196fb19275b4c8e50f531f4f3c4d51466012dae00b59d5edeb725fa8a739205f26b3fd86bae5aa6650365f00a57c60a2ceaa30b5e0f04087842b28d5df9b7db6dfcaa1b0cd77d761e2fbced1976041ba3d9cdee2039d9f3c4a89eda968cd36826f82aaa1539a87abf20eba0aab96233c430bff98e3d7657908c7e82873ed0328cf87e75c9d659b35d6137ea473fc0a687", 0xfffffffffffffcf3, 0xfffffffffffffff9) (async) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$unlink(0x9, r0, r2) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) (async) r4 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r4) (async) keyctl$link(0x8, r3, r4) (async) keyctl$link(0x8, r0, r1) (async) keyctl$clear(0x7, r0) 19:12:31 executing program 1: add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file0\x00'}) 19:12:31 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x2001000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) [ 2411.699088][ T7367] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2411.707058][ T7367] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2411.715113][ T7367] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2411.723090][ T7367] 19:12:31 executing program 1: r0 = add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) r1 = add_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="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", 0x1000, r0) keyctl$negate(0xd, r1, 0x0, r0) 19:12:31 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x8000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:31 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) r0 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="f31b88659d466f97e70523de7ef08cbcc8b0b4baf0f884a8996ce8b00cfee6cdd12249379974a88496fb58d2f74b44725e6a729e45176831b9df515ebf6e904b6cbe770a8dff5a197f465c2bcd36e23fc067da70391d4196fb19275b4c8e50f531f4f3c4d51466012dae00b59d5edeb725fa8a739205f26b3fd86bae5aa6650365f00a57c60a2ceaa30b5e0f04087842b28d5df9b7db6dfcaa1b0cd77d761e2fbced1976041ba3d9cdee2039d9f3c4a89eda968cd36826f82aaa1539a87abf20eba0aab96233c430bff98e3d7657908c7e82873ed0328cf87e75c9d659b35d6137ea473fc0a687", 0xfffffffffffffcf3, 0xfffffffffffffff9) (async) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) (async) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r2) (async) keyctl$unlink(0x9, r0, r2) (async) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) (async) r4 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$link(0x8, r3, r4) (async) keyctl$link(0x8, r0, r1) (async) keyctl$clear(0x7, r0) 19:12:31 executing program 5: r0 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r0, 0x0, 0x0], 0x9}, 0x58) mq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffff, 0x0, @tid=r0}) 19:12:31 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 29) 19:12:31 executing program 1: r0 = add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) r1 = add_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="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", 0x1000, r0) keyctl$negate(0xd, r1, 0x0, r0) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) (async) add_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="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", 0x1000, r0) (async) keyctl$negate(0xd, r1, 0x0, r0) (async) 19:12:31 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x8000001000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) [ 2411.973298][ T7395] FAULT_INJECTION: forcing a failure. [ 2411.973298][ T7395] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2412.078340][ T7395] CPU: 1 PID: 7395 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2412.086897][ T7395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2412.097003][ T7395] Call Trace: [ 2412.100300][ T7395] [ 2412.103241][ T7395] dump_stack_lvl+0x1e3/0x2cb [ 2412.107959][ T7395] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2412.113627][ T7395] ? panic+0x84d/0x84d [ 2412.117725][ T7395] ? __lock_acquire+0x1295/0x1ff0 [ 2412.122790][ T7395] should_fail+0x38a/0x4c0 [ 2412.127237][ T7395] prepare_alloc_pages+0x1db/0x5b0 [ 2412.132915][ T7395] __alloc_pages+0x14f/0x700 [ 2412.137577][ T7395] ? __rmqueue_pcplist+0x2030/0x2030 [ 2412.142883][ T7395] ? lockdep_init_map_type+0x9d/0x8d0 [ 2412.148294][ T7395] ? lockdep_unregister_key+0x5b0/0x5b0 [ 2412.153863][ T7395] ? lockdep_softirqs_off+0x420/0x420 [ 2412.159272][ T7395] ? alloc_pages+0x458/0x570 [ 2412.163895][ T7395] __get_free_pages+0x8/0x30 [ 2412.168514][ T7395] pgd_alloc+0x1d/0x1c0 [ 2412.172695][ T7395] mm_init+0x51d/0x830 [ 2412.176785][ T7395] copy_mm+0x1d0/0x1370 [ 2412.180960][ T7395] ? lockdep_softirqs_off+0x420/0x420 [ 2412.186366][ T7395] ? copy_signal+0x630/0x630 [ 2412.190982][ T7395] ? __init_rwsem+0x11e/0x160 [ 2412.195679][ T7395] ? copy_signal+0x529/0x630 [ 2412.200286][ T7395] copy_process+0x1816/0x3ef0 [ 2412.205004][ T7395] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2412.210145][ T7395] ? _copy_from_user+0x10f/0x170 [ 2412.215113][ T7395] kernel_clone+0x210/0x960 [ 2412.219657][ T7395] ? create_io_thread+0x1e0/0x1e0 [ 2412.224722][ T7395] __se_sys_clone3+0x3e1/0x430 [ 2412.229516][ T7395] ? __x64_sys_clone3+0x60/0x60 [ 2412.234417][ T7395] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2412.240411][ T7395] ? lockdep_hardirqs_on+0x94/0x130 [ 2412.245627][ T7395] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2412.251626][ T7395] do_syscall_64+0x3d/0xb0 [ 2412.256061][ T7395] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2412.261970][ T7395] RIP: 0033:0x7fa1e449cae9 [ 2412.266394][ T7395] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2412.286015][ T7395] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2412.294450][ T7395] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2412.302439][ T7395] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2412.310430][ T7395] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2412.318426][ T7395] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 19:12:32 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$negate(0xd, r0, 0x1, 0xfffffffffffffff9) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "25e984f9f0c354e56210822c9b68b7f51794b5f1553a7f5213bb8b7ef30c21deac7aa09a23ae2c2822f28cb7ab8f75ac2c715978119d59f0657827f218ed4cab", 0x13}, 0x48, r1) 19:12:32 executing program 3: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @vsock={0x28, 0x0, 0xffffffff}, @qipcrtr={0x2a, 0x7d69073f12f93943, 0x1}, @l2tp={0x2, 0x0, @multicast1, 0x2}, 0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='veth0_to_hsr\x00', 0xf0c8, 0x8, 0x1f}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890c, &(0x7f0000000040)={0x0, @nfc={0x27, 0x0, 0xffffffffffffffff, 0x4}, @sco, @vsock={0x28, 0x0, 0xffffffff, @host}, 0x40, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)='caif0\x00', 0x8, 0x5, 0x8000}) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180), 0x20000, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380), 0xbebdb0f3fc684b7, 0x0) ioctl$SNDCTL_TMR_STOP(r2, 0x5403) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000240)={@broadcast, @broadcast}, &(0x7f0000000280)=0xc) getsockopt$inet_dccp_int(r1, 0x21, 0xa, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 19:12:32 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x10100000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:32 executing program 1: r0 = add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) add_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="f0af4acd79f306eb71d2df926993936959dba04c326371bedfdcc2bfee221fe704eba09c6dfd861b097c0ca76046b869ca3905515486bece14fa92f894e909fd8c527a24c3c8c5d53769c2d650b22f98438f405590bae7baacbe79db9e9770bb92de9233a07c54f425ed50cd008a2cd8e1ca14b4091a94c51cbc84837cbb77c59583a70f3cf29ec2b909c24b09ca4ad804b8c5768245460eca3f5704f2ff003d21c242339e6b0608bc6ca5fba279cc385d8fd917a7b363ad14cc9b25f85c8583f788e246c39c8e777cab5bba201ef4b014c2c34fe5863cff2b8ecc7bb8c19aabc4da99436ffa206083522474cd7644a44c1a9e3dfc5b62f304c0df5b62bc10c97b85e2cd10a82da3d146c164d201814b0eee639b607a4138616fe490bab28149d0207737696f2e8b7766d75da4cb899afad72d735774e575ef44757dc64074e99b0156f70b8f42a9ded7e32c4db5ff643c675b22bc4f9dd6a3ae0ffa2cccfa6e92fe94a66ccba146e249038f6f81ef5eec0f9f682b6be98da9d909cbdadd150e04139b5deceebf5fdd201b5aaba715ad16fe1e6b03e5894eff7fd37d25f59b02ae27922361f1adfed7dd215dfe0c6fa3b0b9a6787a3e760e44701bffa343665458b733b38c604a7beea1fbe5c86bf9cab91b450ec84150149e23df8f90ed526d0937a14a0bc78ab96fbe3b0eb7ac0751d3cb65d5730847d1f7add85232ddce924d2a0dbe25aba81fa71974a977639879129afd72657d5629aadfe7d7fe329e83be4f7b3498e3cea12422b0981992f1d40dfaa31d6c2576dde33846f485e660ff48c4cf2146f1c37b10ac9d101aba4b9c6c4cce6a4eb33a80e4d6e5b625991def148734d415c33a0ea88340798dc0365349324bc709dd898122a409f1b28f69f4498cac0c65b287f20ab6806a119247e0480a65f0e4abbcd4596f19af44b5a5a2009123e134c8bac1b8c2552330558ddf92ef7d23de49ab59bc51b8bff46fc8018242ec46f5ce329cfb953d1b89d01c471f6c6b3dcd21256738722477a140308f4e612a81016603091e606fe85adbc65626cfae248f52d555f9c6c32d0db8ea281416ff03417a10043d9da87bccfe152b222641b5718958bceb433e6c05fce78f01f4e0c10ff3f5d2d4059908f5f3e3b245829e61bad5e3fa2ff19e6959b33db5afa73e13178d85fa2f07ad146aca8aac1ae601cc7ca9e4c83bf00700cd2b84c7224e1ade127c560cc7a53bb7b7a7e52cde7722954f56fb9b7e8d13fb2b0f090774c16ab437376901e7f902adbd3b2a64cb77ff03814b2777377f3347ab857be2e19e02708026549bab3c9c6665431ae2095bb3df30d29f5e70c7bd82ef2bc41fdd2695e9ee7f8f8da2c0e02841e4cdb41121ab18b2de5cdc75056017f99edf215bbaca582c8d80038854cdd01fb7ee478d6ccd2e668bb50389f1de94ddf6dd747eb9f210153c50ad321b24c13a7d5b9ae1bb8f7941b7885574599c4cbf32536ee356dacd16bc05465de62906d7ffc6a1aa4703a9025f0893f5b3952af54861eceae7ccaa28458f52b86aff551560051181147cb21b5f5f7da70859dff1395dd8d627a4277724c88ce1af997e6365a4966120c17f5c68a600ebaf7d3aea562aa47b5aabbb781ef820be2e262d8d1de3160117ded6daad144c3a2eee88931d3b72289b9846f545c63823d4904d01f722e72eaf085023baa7397291f2c2ff82332e693e30c9a26ae148e2b1414a42267f0e5228ee9ec77800b232abb293b8aad91741be2e11ca3ad06692f67072aa407e272bc0abae03e962d973a1031185c459eed9b04e01f7214c6dc6de140eea6bd56f63fcdcd059c0960dfeeadb1831037fddddce018447745384eab275261cdb7a72db4f93a8ee3c233db9825eca46088f1502d5c90410066926f3649cef06bb9e87bb990b5cfcfe9a88187b980d0dff891a288017bd2c2c639d1a4f8325de07657ffe17dd16b0d0e0b4cf1f1c9e7b4bf5a58a42e1d072513b7a0685b8732ecd0970271abc66915b1827115c977fe1cbd393be3f2af66460a74453e74258521ec955592a6714efd90d02282bd45d7985be4536488d1bcd7ac66fdfad49aa69e5af12a68bd37f209e065fd5f6ac6d594b2df3cfbcdd25d5307ae8ac34596fcee20ea48e40c2af5cf2b107e5c53d1bf8262260c62d302cd558840d160f076855a0a762498c907fd49680bc358361043aae8bb296f9e6ca50e84e39cede131cfdffb791ff89e6b462a451c9894bca6fc4fcfdd62da5a7c0366f3fab9287527e8134501c81cf03308fc509f217d2f97ae6e3301d40aea921994dabcca33c3dd38b699a6bd5b7f95975b581d8f6b79b4258327648d5d9e5f3d3b5173e9bf926f49e42eca0ec8eebe4307be4302e9cafadbb8fb9f357f4c5e4ac20aed19211b1ade0e7dc54a73af24555c3dd4f4cadc73492aff6a07dfe51df39b866eeb2c1a938c31d1c1f65f8c7ea83737ab21f5ce83300938a2b6c51474c9e18bec48efb23398b3d622f0aae93b7d2ea7db4179abdec8c0a5537402787b7f5232ad5dc75133e131a0e510fcf7e54e67d91f69e09d207eb89ce10a0795533e9b5df626d77cda42ab9bddddb8597ad43519a80e58071cbc7d616f84f2d9ab0ee330ae4bff9bd74af43232896d954aaa99848b24c9598d843da2229cdcfd1fa51dc33cfd12ce1e4e5bb5394191d7f03e12f5ba9b77e556fd60a477739d73b41cec8396c8a6cddb81ed3a451976982d42ff6f3d1c0fac36dfd2d57ef75b692fbea99a1d895ca8cb5695a17758d6350c1e347a8c74d2b1ebfac690104d4bff81e72b960f89fd0d3a63cf72ff5b85a1402b0196c360ece602583b8c2a76247c93a3bbfee8137d7d016000903b14528b8d8a8b640cf21257b05045ed0206f35a4f7177a2ed09c59f30f0b565fae61a83c769102255200b1d38cc4d160459a9dea4cceadec70a4e7b33bec9a9b749c74f975d1f014b4581ae427ef58ac8c9ab8aa6ddebd3a47b53eef40add67ba53911ddf7a3a03af0aafc15b59bd2a4ea56c7052a032da65fc254fdee78ea3d6cb65e4fa691d299685332301b93706eea8dffe7cfec2f682988ca9b536e8e9c46001f8c9ee51f91c3b754dba2b41ba9d2f73f29b8436fa28558137845a14d4ad8be79e622c0f48cb9aa8f4572999a7758233784e90f8e134c038bfea92847d5d7bccd196dd4f39257b03a132cd8b24005ce9d4ee7b8c758082f34c2fe677058af354d2bfab620f01c1de7858ba6bafd5ba50b0d64f85688d2e1d2d35bece1b3785b617bfabbf5ca7b7e648e85bf01f7dcacb387752ff7f1d814aaea96aae1f1c53d62876ec049600bcd8c1bb4ce76c507c6e3c0978e8fb5a2b07c546f655287b73a2d707d585b7151e1722b7c4a020dbbccc0c9d21acd761766be3b28d0a923b4b9d51beba794244568945be97746fadee60c91395b703407df21d65bd4504e4a7025ad2a2187b04ea9f99662298587eb739bd07bd1ef0451bd75c98ae6d84440ab4be9d2508c22ef1bf0ebbb1fc47718a8907438fff3c45de68c732b2eed2e9175a23a66196a38cbca59fad4b46fbe0eaef80ee7360d5f1cc38df332007d04d86e50727edeac981902f2a2bf2cbe5fce65c848169357f885e7aa9ceee6bd308bbff6ccf1aca11dd6feff9180c5eee688385480edb41bee694c510bca7deff6af37c1b6378f9c2d00a674cf6d4f6c88530c079cc32daecb97e39da21cbed2280b307fbc684ece5fd6c82c8159ce3573f7eddf2588f8872c0eabd48236d3aab16f6309375ad4402076c8394b00fa30eebe51a422ea999305c82d1bd0488312bb9652df81622970258d21c448c6b481dce8031a938ce75cce668c993a4439a52ac0fd5192741b0ce0ae4dd22b645d8ac29b07b075ec00f7ebe54318df63a55d312d76f736060a985c179017a7069b9dd8bc915d7226968294c09665ac686350b5bf2e3b96f407c8d117719e30a84eaa4ffb179809b5ed8131f02c7a38430d76961e484cea090a1f11a3152c1c36885e1653c244e0db7fbfed2161fca9bac79bc5a25551c254e146729ea4607de47dbdf4c44c85a86effe7a45c34697336dea81cbea0380153e31ecae97e682949d6bc2ece163ee4b4bed7a140a99c886d3a81aecf5868d9e07ec203ab7339594237ca875e23eb7e6751c6183421b3d0f5e1ebf62c20d913e233f99fd25448d09fbf491a827a13770ff2de13d6097534ae193c3817167398ebe859adafd9b81585474660f781c623ad419123466c88fbfc0d813e7c70239c1c81243c537a9f0156aa9f3c1739073092763ea03c3867737c56eae748e23e8794ae46d03eba2cc8d6edea3c295bffb668e30b198e8d3a29168192eafa47016b594210704de117355708848e3faebc84eafdce7df72f88574a23b7ef8bf6fdaaf946b78bb77b5bd15e2986a9749b6439f8624162362c97937e6181966315be03871a9700a64fd7299ff53d768286e94e95abdca4b2931b560f070647eec4e32f9055dcad9f403b1c4d5c2009e623d9568dfc6c2b4ffc7e04d7312d79be1fd9230d037ec6bfa8f0211f616a3e0233bd9c4190ff918270f7648e71e7544a01367bc5de51b5dc028ace02e38d3325f63bfc9072156859845ceee830f8b6c400b820f8ed6108ec80b789f52dfc3f9020930d35b086ec696f4ae7856866368ef7bb6a5a029ccbc100812e27fd33d3ea6375cb6ff07cad5dd7f470017b18aa397aed73d174c3b96760b99e87a0442ef2abbdee6b512ef5b465c07bdbb53ab20537e5c28e825ae60d0fd78ff3e8fc7381e86924407cda78221d27c435afde46d8af315840c13359d4d55c40e128b07daefb1e74f1084c882c21871b36158c5bbece71f358b5bc80b9dfb051df6e1d5a0932a4bfaf5043fd0e9ceaf5e3e921c35f37e52e37d46f0acfb07a63819526f2c644c84823f5a7dbfb291c27ffc77e28df3a3510805f5be80fea99403b4aa0b56b89e5eb3a9c7f925e788af80984915c8c8ed01c7a5376c0dc93dd9e26b3b756dab07f1f72bf0696299f50ac6ae123285f693375412f505940b23fe9a6ce82e8b0a26fcb5c391572d43734304763364ae95efb61b3c99e2c8715ed7ab748dc102b009e9bb563970a26f05cb5ac08dfc09e1547da6f908e816f536717267bf152ec0c687739cd23961f748253e5decf4455bf70fdd2874d18324fe6feb11feb08a1d865993c4bdbc1e60eff73c17312abc4af6678b701789a6a4457df23bba4cb0a7b525bf12732b4b04236fa75965da85107dc9e0567dbfb786a6e491f6992965ec470de907837a5376743f8c4032b890885484f63baf54e2bd252bb1c3c3e00afc989cabb5d030d7b2b41a94742928e7a4eb87541164a1fd39a94d8542a8e778065e45e18e67ec5bc5b97b5d0542c7676b3d48c22f185c63f1ac0700ed520265c1c06740540c0d2ca3817ce5b8e23cde9e71d35aaaeeef1755f063713d4975b41255a8cd4c832f7b0e303d6aab0ffa111e4219688166c848add7952e2a8476fe132237d8af67cf7f1ba3bed7f8cb18049a877c27ad599e496a1a2a95019b1b9a7cb8be0ee4e35aaf027c0e879cac925828f4b370e00054222a0ac861405a10556829ed1c9e5f62dff2bbf32945e6da902f03ee1de4b0e40c387d12ae3710ade91bb2b1d1ae0dffe18a02ea3f8fdaf6b45901db1a0c4d10b7b93a724217581da8426fa3958b043226fb2ed88d1a897fdcf20bce18077ddbcec2b7d2117659d9cc01f0d68c5841458bbbd9078c176edeeaf66931b3288f14e7637be194af647f3bb", 0x1000, r0) (async) r1 = add_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="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", 0x1000, r0) keyctl$negate(0xd, r1, 0x0, r0) 19:12:32 executing program 5: r0 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r0, 0x0, 0x0], 0x9}, 0x58) mq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffff, 0x0, @tid=r0}) [ 2412.326414][ T7395] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2412.334417][ T7395] 19:12:32 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, &(0x7f0000000200)={0x1, [0x0]}) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) r2 = add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)="50dff9de8f3bbad997e3e25d0820a9912e07d8c414aa131da08a8462ea5077cdc1e0b91e7d257fa9d2a24dbd4705d19907179d3082825e324f0280639a1009a3a9c9959b15c57ea3b1f2a5ff3baff09ab05e1b17cd2244d60f594807ab402a6a", 0x60, 0xffffffffffffffff) keyctl$reject(0x13, r1, 0x8, 0x80, r2) add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0xfffffffffffffea4, r1) 19:12:32 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x70000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:32 executing program 3: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) (async) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) (async) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @vsock={0x28, 0x0, 0xffffffff}, @qipcrtr={0x2a, 0x7d69073f12f93943, 0x1}, @l2tp={0x2, 0x0, @multicast1, 0x2}, 0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='veth0_to_hsr\x00', 0xf0c8, 0x8, 0x1f}) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890c, &(0x7f0000000040)={0x0, @nfc={0x27, 0x0, 0xffffffffffffffff, 0x4}, @sco, @vsock={0x28, 0x0, 0xffffffff, @host}, 0x40, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)='caif0\x00', 0x8, 0x5, 0x8000}) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) (async) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180), 0x20000, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380), 0xbebdb0f3fc684b7, 0x0) ioctl$SNDCTL_TMR_STOP(r2, 0x5403) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000240)={@broadcast, @broadcast}, &(0x7f0000000280)=0xc) (async) getsockopt$inet_dccp_int(r1, 0x21, 0xa, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 19:12:32 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 30) 19:12:32 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) (async) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, &(0x7f0000000200)={0x1, [0x0]}) (async) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) (async) r2 = add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)="50dff9de8f3bbad997e3e25d0820a9912e07d8c414aa131da08a8462ea5077cdc1e0b91e7d257fa9d2a24dbd4705d19907179d3082825e324f0280639a1009a3a9c9959b15c57ea3b1f2a5ff3baff09ab05e1b17cd2244d60f594807ab402a6a", 0x60, 0xffffffffffffffff) keyctl$reject(0x13, r1, 0x8, 0x80, r2) (async) add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0xfffffffffffffea4, r1) 19:12:32 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x803903cb290000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:32 executing program 3: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) (async) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) (async) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) (async) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @vsock={0x28, 0x0, 0xffffffff}, @qipcrtr={0x2a, 0x7d69073f12f93943, 0x1}, @l2tp={0x2, 0x0, @multicast1, 0x2}, 0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='veth0_to_hsr\x00', 0xf0c8, 0x8, 0x1f}) (async, rerun: 32) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (rerun: 32) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) (async) ioctl$sock_SIOCDELRT(r1, 0x890c, &(0x7f0000000040)={0x0, @nfc={0x27, 0x0, 0xffffffffffffffff, 0x4}, @sco, @vsock={0x28, 0x0, 0xffffffff, @host}, 0x40, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)='caif0\x00', 0x8, 0x5, 0x8000}) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) (async) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180), 0x20000, 0x0) (async) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380), 0xbebdb0f3fc684b7, 0x0) ioctl$SNDCTL_TMR_STOP(r2, 0x5403) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000240)={@broadcast, @broadcast}, &(0x7f0000000280)=0xc) (async) getsockopt$inet_dccp_int(r1, 0x21, 0xa, &(0x7f00000001c0), &(0x7f0000000200)=0x4) [ 2412.602313][ T7428] FAULT_INJECTION: forcing a failure. [ 2412.602313][ T7428] name failslab, interval 1, probability 0, space 0, times 0 [ 2412.663997][ T7428] CPU: 0 PID: 7428 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2412.672549][ T7428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2412.682623][ T7428] Call Trace: [ 2412.685923][ T7428] [ 2412.688875][ T7428] dump_stack_lvl+0x1e3/0x2cb [ 2412.693591][ T7428] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2412.699260][ T7428] ? panic+0x84d/0x84d [ 2412.703373][ T7428] ? rcu_lock_acquire+0x30/0x30 [ 2412.708251][ T7428] ? __lock_acquire+0x1ff0/0x1ff0 [ 2412.713306][ T7428] should_fail+0x38a/0x4c0 [ 2412.717761][ T7428] should_failslab+0x5/0x20 [ 2412.722292][ T7428] slab_pre_alloc_hook+0x53/0xc0 [ 2412.727258][ T7428] ? anon_vma_clone+0x9d/0x4e0 [ 2412.732045][ T7428] kmem_cache_alloc+0x3f/0x280 [ 2412.736840][ T7428] anon_vma_clone+0x9d/0x4e0 [ 2412.741466][ T7428] anon_vma_fork+0x8c/0x580 [ 2412.745989][ T7428] ? dup_userfaultfd+0x9f/0x5f0 [ 2412.750857][ T7428] ? kmem_cache_alloc+0x128/0x280 [ 2412.755901][ T7428] ? copy_mm+0x8ef/0x1370 [ 2412.760261][ T7428] copy_mm+0x9f2/0x1370 [ 2412.764462][ T7428] ? copy_signal+0x630/0x630 [ 2412.769167][ T7428] ? __init_rwsem+0x11e/0x160 [ 2412.773877][ T7428] ? copy_signal+0x529/0x630 [ 2412.778499][ T7428] copy_process+0x1816/0x3ef0 [ 2412.783228][ T7428] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2412.788374][ T7428] ? _copy_from_user+0x10f/0x170 [ 2412.793344][ T7428] kernel_clone+0x210/0x960 [ 2412.797876][ T7428] ? create_io_thread+0x1e0/0x1e0 [ 2412.802948][ T7428] __se_sys_clone3+0x3e1/0x430 [ 2412.807741][ T7428] ? __x64_sys_clone3+0x60/0x60 [ 2412.812659][ T7428] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2412.818669][ T7428] ? lockdep_hardirqs_on+0x94/0x130 [ 2412.823903][ T7428] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2412.830002][ T7428] do_syscall_64+0x3d/0xb0 [ 2412.834448][ T7428] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2412.840367][ T7428] RIP: 0033:0x7fa1e449cae9 [ 2412.844809][ T7428] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2412.864434][ T7428] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2412.872877][ T7428] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2412.880882][ T7428] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2412.888872][ T7428] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2412.896862][ T7428] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2412.904854][ T7428] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2412.912958][ T7428] 19:12:33 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$negate(0xd, r0, 0x1, 0xfffffffffffffff9) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "25e984f9f0c354e56210822c9b68b7f51794b5f1553a7f5213bb8b7ef30c21deac7aa09a23ae2c2822f28cb7ab8f75ac2c715978119d59f0657827f218ed4cab", 0x13}, 0x48, r1) 19:12:33 executing program 5: r0 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r0, 0x0, 0x0], 0x9}, 0x58) mq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffff, 0x0, @tid=r0}) 19:12:33 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x9094223a550000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:33 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, &(0x7f0000000200)={0x1, [0x0]}) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) r2 = add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)="50dff9de8f3bbad997e3e25d0820a9912e07d8c414aa131da08a8462ea5077cdc1e0b91e7d257fa9d2a24dbd4705d19907179d3082825e324f0280639a1009a3a9c9959b15c57ea3b1f2a5ff3baff09ab05e1b17cd2244d60f594807ab402a6a", 0x60, 0xffffffffffffffff) keyctl$reject(0x13, r1, 0x8, 0x80, r2) add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0xfffffffffffffea4, r1) 19:12:33 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$reject(0x13, r1, 0x401, 0x200, r0) r2 = add_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="722248ca67d767f7450c11de33cd2a2d242d213e4daad165d6f850d51171a7934a84f22d07a1aae71fb7f903ee9f85327dc512c8ccf9cd3025612305c6c39ee25c3de98f2cc6c3cb3cda0b16110ad13acc5f5a3dfb204a80c2f6967d4b301637485f0179030d13", 0x67, 0xfffffffffffffff9) keyctl$negate(0xd, r0, 0x8, r2) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$restrict_keyring(0x1d, r5, &(0x7f0000000340)='keyring\x00', &(0x7f0000000380)='$\x9f:$}!\x00') keyctl$KEYCTL_MOVE(0x1e, r3, r4, r0, 0x1) r6 = add_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)="68891340bcda6599338e4b7dc5c2e4449a0dca7b257bb0783c67cb017d5897f0cdc9", 0x22, 0xfffffffffffffff8) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r7) keyctl$search(0xa, r0, &(0x7f00000002c0)='.dead\x00', &(0x7f0000000300)={'syz', 0x2}, r7) keyctl$search(0xa, r0, &(0x7f0000000080)='rxrpc_s\x00', &(0x7f00000000c0)={'syz', 0x2}, r6) 19:12:33 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 31) 19:12:33 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$reject(0x13, r1, 0x401, 0x200, r0) r2 = add_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="722248ca67d767f7450c11de33cd2a2d242d213e4daad165d6f850d51171a7934a84f22d07a1aae71fb7f903ee9f85327dc512c8ccf9cd3025612305c6c39ee25c3de98f2cc6c3cb3cda0b16110ad13acc5f5a3dfb204a80c2f6967d4b301637485f0179030d13", 0x67, 0xfffffffffffffff9) keyctl$negate(0xd, r0, 0x8, r2) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$restrict_keyring(0x1d, r5, &(0x7f0000000340)='keyring\x00', &(0x7f0000000380)='$\x9f:$}!\x00') keyctl$KEYCTL_MOVE(0x1e, r3, r4, r0, 0x1) r6 = add_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)="68891340bcda6599338e4b7dc5c2e4449a0dca7b257bb0783c67cb017d5897f0cdc9", 0x22, 0xfffffffffffffff8) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r7) keyctl$search(0xa, r0, &(0x7f00000002c0)='.dead\x00', &(0x7f0000000300)={'syz', 0x2}, r7) keyctl$search(0xa, r0, &(0x7f0000000080)='rxrpc_s\x00', &(0x7f00000000c0)={'syz', 0x2}, r6) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) (async) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) (async) keyctl$reject(0x13, r1, 0x401, 0x200, r0) (async) add_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="722248ca67d767f7450c11de33cd2a2d242d213e4daad165d6f850d51171a7934a84f22d07a1aae71fb7f903ee9f85327dc512c8ccf9cd3025612305c6c39ee25c3de98f2cc6c3cb3cda0b16110ad13acc5f5a3dfb204a80c2f6967d4b301637485f0179030d13", 0x67, 0xfffffffffffffff9) (async) keyctl$negate(0xd, r0, 0x8, r2) (async) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) (async) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r4) (async) keyctl$restrict_keyring(0x1d, r5, &(0x7f0000000340)='keyring\x00', &(0x7f0000000380)='$\x9f:$}!\x00') (async) keyctl$KEYCTL_MOVE(0x1e, r3, r4, r0, 0x1) (async) add_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)="68891340bcda6599338e4b7dc5c2e4449a0dca7b257bb0783c67cb017d5897f0cdc9", 0x22, 0xfffffffffffffff8) (async) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r7) (async) keyctl$search(0xa, r0, &(0x7f00000002c0)='.dead\x00', &(0x7f0000000300)={'syz', 0x2}, r7) (async) keyctl$search(0xa, r0, &(0x7f0000000080)='rxrpc_s\x00', &(0x7f00000000c0)={'syz', 0x2}, r6) (async) 19:12:33 executing program 1: add_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) [ 2413.071533][ T7449] FAULT_INJECTION: forcing a failure. [ 2413.071533][ T7449] name failslab, interval 1, probability 0, space 0, times 0 [ 2413.131307][ T7449] CPU: 0 PID: 7449 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2413.140138][ T7449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2413.150214][ T7449] Call Trace: [ 2413.153519][ T7449] [ 2413.156472][ T7449] dump_stack_lvl+0x1e3/0x2cb [ 2413.161184][ T7449] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2413.166844][ T7449] ? panic+0x84d/0x84d [ 2413.170933][ T7449] ? __might_sleep+0xc0/0xc0 [ 2413.175645][ T7449] should_fail+0x38a/0x4c0 [ 2413.180097][ T7449] should_failslab+0x5/0x20 [ 2413.184627][ T7449] slab_pre_alloc_hook+0x53/0xc0 [ 2413.189596][ T7449] ? copy_mm+0x8d2/0x1370 [ 2413.193949][ T7449] kmem_cache_alloc+0x3f/0x280 [ 2413.198742][ T7449] copy_mm+0x8d2/0x1370 [ 2413.202949][ T7449] ? copy_signal+0x630/0x630 [ 2413.207563][ T7449] ? __init_rwsem+0x11e/0x160 [ 2413.212275][ T7449] ? copy_signal+0x529/0x630 [ 2413.216887][ T7449] copy_process+0x1816/0x3ef0 [ 2413.221625][ T7449] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2413.226760][ T7449] ? _copy_from_user+0x10f/0x170 [ 2413.231737][ T7449] kernel_clone+0x210/0x960 [ 2413.236294][ T7449] ? f2fs_gc+0x19f0/0x1ad0 [ 2413.240820][ T7449] ? create_io_thread+0x1e0/0x1e0 [ 2413.245887][ T7449] __se_sys_clone3+0x3e1/0x430 [ 2413.250675][ T7449] ? __x64_sys_clone3+0x60/0x60 [ 2413.255585][ T7449] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2413.261688][ T7449] ? lockdep_hardirqs_on+0x94/0x130 [ 2413.266921][ T7449] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2413.272929][ T7449] do_syscall_64+0x3d/0xb0 [ 2413.277378][ T7449] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2413.283297][ T7449] RIP: 0033:0x7fa1e449cae9 [ 2413.287741][ T7449] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2413.307373][ T7449] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2413.315815][ T7449] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2413.323811][ T7449] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 19:12:33 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0xf051111b000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:33 executing program 5: r0 = getpgrp(0xffffffffffffffff) mq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffff, 0x0, @tid=r0}) 19:12:33 executing program 5: mq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffff}) [ 2413.331818][ T7449] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2413.339812][ T7449] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2413.347801][ T7449] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2413.355814][ T7449] 19:12:33 executing program 1: add_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) (async) 19:12:33 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_clone3(&(0x7f0000001240)={0x80000000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x3b}, &(0x7f00000000c0)=""/4096, 0x1000, &(0x7f00000010c0)=""/139, &(0x7f0000001180)}, 0x58) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:12:33 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0xf0ff1f00000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:33 executing program 5: mq_notify(0xffffffffffffffff, 0x0) 19:12:33 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) (async) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) (async) keyctl$reject(0x13, r1, 0x401, 0x200, r0) (async) r2 = add_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="722248ca67d767f7450c11de33cd2a2d242d213e4daad165d6f850d51171a7934a84f22d07a1aae71fb7f903ee9f85327dc512c8ccf9cd3025612305c6c39ee25c3de98f2cc6c3cb3cda0b16110ad13acc5f5a3dfb204a80c2f6967d4b301637485f0179030d13", 0x67, 0xfffffffffffffff9) keyctl$negate(0xd, r0, 0x8, r2) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$restrict_keyring(0x1d, r5, &(0x7f0000000340)='keyring\x00', &(0x7f0000000380)='$\x9f:$}!\x00') keyctl$KEYCTL_MOVE(0x1e, r3, r4, r0, 0x1) (async) r6 = add_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)="68891340bcda6599338e4b7dc5c2e4449a0dca7b257bb0783c67cb017d5897f0cdc9", 0x22, 0xfffffffffffffff8) (async, rerun: 32) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (rerun: 32) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r7) (async) keyctl$search(0xa, r0, &(0x7f00000002c0)='.dead\x00', &(0x7f0000000300)={'syz', 0x2}, r7) (async) keyctl$search(0xa, r0, &(0x7f0000000080)='rxrpc_s\x00', &(0x7f00000000c0)={'syz', 0x2}, r6) 19:12:33 executing program 1: add_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) (async) 19:12:33 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 32) 19:12:33 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x100000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:33 executing program 5: mq_notify(0xffffffffffffffff, 0x0) 19:12:33 executing program 1: syz_genetlink_get_family_id$nfc(0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000040), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_GET_DEVICE(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000580)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0000c70c"], 0x24}}, 0x0) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) 19:12:33 executing program 3: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x60080, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000080)=ANY=[@ANYBLOB="62bc9d9e1e5b40cc4bd677fca503304e01c9e8d051f6d5bfeb0179a40300f804000000b29b00d24992800000d3aaf28bcc751bc520387139a2ff03000000000000008247c77693b12856344ba1a28f9573748a22228c3562db357600efa4f9823ab8abb1"]) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) [ 2413.561975][ T7484] FAULT_INJECTION: forcing a failure. [ 2413.561975][ T7484] name failslab, interval 1, probability 0, space 0, times 0 [ 2413.623944][ T7484] CPU: 1 PID: 7484 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2413.633204][ T7484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2413.643279][ T7484] Call Trace: [ 2413.646576][ T7484] [ 2413.649522][ T7484] dump_stack_lvl+0x1e3/0x2cb [ 2413.654332][ T7484] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2413.660000][ T7484] ? panic+0x84d/0x84d [ 2413.664097][ T7484] ? __might_sleep+0xc0/0xc0 [ 2413.668709][ T7484] ? up_write+0x133/0x4d0 [ 2413.673070][ T7484] should_fail+0x38a/0x4c0 [ 2413.677517][ T7484] should_failslab+0x5/0x20 [ 2413.682048][ T7484] slab_pre_alloc_hook+0x53/0xc0 [ 2413.687013][ T7484] ? anon_vma_fork+0xed/0x580 [ 2413.691718][ T7484] kmem_cache_alloc+0x3f/0x280 [ 2413.696545][ T7484] anon_vma_fork+0xed/0x580 [ 2413.701072][ T7484] ? dup_userfaultfd+0x9f/0x5f0 [ 2413.705955][ T7484] ? kmem_cache_alloc+0x128/0x280 [ 2413.711010][ T7484] ? copy_mm+0x8ef/0x1370 [ 2413.715372][ T7484] copy_mm+0x9f2/0x1370 [ 2413.719576][ T7484] ? copy_signal+0x630/0x630 19:12:33 executing program 5: mq_notify(0xffffffffffffffff, 0x0) 19:12:33 executing program 1: syz_genetlink_get_family_id$nfc(0x0, 0xffffffffffffffff) (async, rerun: 32) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (rerun: 32) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000040), r0) (async, rerun: 64) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (rerun: 64) sendmsg$NFC_CMD_GET_DEVICE(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000580)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0000c70c"], 0x24}}, 0x0) (async, rerun: 32) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) (rerun: 32) [ 2413.724196][ T7484] ? __init_rwsem+0x11e/0x160 [ 2413.728911][ T7484] ? copy_signal+0x529/0x630 [ 2413.733535][ T7484] copy_process+0x1816/0x3ef0 [ 2413.738281][ T7484] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2413.743432][ T7484] ? _copy_from_user+0x10f/0x170 [ 2413.748402][ T7484] kernel_clone+0x210/0x960 [ 2413.752940][ T7484] ? create_io_thread+0x1e0/0x1e0 [ 2413.758012][ T7484] __se_sys_clone3+0x3e1/0x430 [ 2413.762815][ T7484] ? __x64_sys_clone3+0x60/0x60 [ 2413.767730][ T7484] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2413.773749][ T7484] ? lockdep_hardirqs_on+0x94/0x130 [ 2413.778990][ T7484] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2413.785004][ T7484] do_syscall_64+0x3d/0xb0 [ 2413.789489][ T7484] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2413.795405][ T7484] RIP: 0033:0x7fa1e449cae9 [ 2413.799857][ T7484] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2413.819492][ T7484] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2413.827936][ T7484] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2413.835936][ T7484] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2413.843940][ T7484] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2413.851938][ T7484] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2413.859935][ T7484] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2413.867952][ T7484] 19:12:34 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) (async) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) (async) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_clone3(&(0x7f0000001240)={0x80000000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x3b}, &(0x7f00000000c0)=""/4096, 0x1000, &(0x7f00000010c0)=""/139, &(0x7f0000001180)}, 0x58) (async) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:12:34 executing program 3: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x60080, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000080)=ANY=[@ANYBLOB="62bc9d9e1e5b40cc4bd677fca503304e01c9e8d051f6d5bfeb0179a40300f804000000b29b00d24992800000d3aaf28bcc751bc520387139a2ff03000000000000008247c77693b12856344ba1a28f9573748a22228c3562db357600efa4f9823ab8abb1"]) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) (async) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x60080, 0x0) (async) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000080)=ANY=[@ANYBLOB="62bc9d9e1e5b40cc4bd677fca503304e01c9e8d051f6d5bfeb0179a40300f804000000b29b00d24992800000d3aaf28bcc751bc520387139a2ff03000000000000008247c77693b12856344ba1a28f9573748a22228c3562db357600efa4f9823ab8abb1"]) (async) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) 19:12:34 executing program 5: mq_notify(0xffffffffffffffff, &(0x7f0000000040)) 19:12:34 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x200000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:34 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 33) 19:12:34 executing program 5: mq_notify(0xffffffffffffffff, &(0x7f0000000040)) 19:12:34 executing program 3: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) (async) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x60080, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000080)=ANY=[@ANYBLOB="62bc9d9e1e5b40cc4bd677fca503304e01c9e8d051f6d5bfeb0179a40300f804000000b29b00d24992800000d3aaf28bcc751bc520387139a2ff03000000000000008247c77693b12856344ba1a28f9573748a22228c3562db357600efa4f9823ab8abb1"]) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) 19:12:34 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x700000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:34 executing program 5: mq_notify(0xffffffffffffffff, &(0x7f0000000040)) 19:12:34 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x800000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:34 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) [ 2414.459591][ T7539] FAULT_INJECTION: forcing a failure. [ 2414.459591][ T7539] name failslab, interval 1, probability 0, space 0, times 0 [ 2414.488839][ T7539] CPU: 1 PID: 7539 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2414.497391][ T7539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2414.507475][ T7539] Call Trace: [ 2414.510774][ T7539] [ 2414.513810][ T7539] dump_stack_lvl+0x1e3/0x2cb [ 2414.518526][ T7539] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2414.524204][ T7539] ? panic+0x84d/0x84d [ 2414.528331][ T7539] ? __might_sleep+0xc0/0xc0 [ 2414.532958][ T7539] should_fail+0x38a/0x4c0 [ 2414.537423][ T7539] should_failslab+0x5/0x20 [ 2414.542079][ T7539] slab_pre_alloc_hook+0x53/0xc0 [ 2414.547051][ T7539] ? anon_vma_fork+0x1ff/0x580 [ 2414.551846][ T7539] kmem_cache_alloc+0x3f/0x280 [ 2414.556686][ T7539] anon_vma_fork+0x1ff/0x580 [ 2414.561410][ T7539] ? dup_userfaultfd+0x9f/0x5f0 [ 2414.566384][ T7539] ? kmem_cache_alloc+0x128/0x280 [ 2414.571444][ T7539] copy_mm+0x9f2/0x1370 [ 2414.575650][ T7539] ? copy_signal+0x630/0x630 [ 2414.580270][ T7539] ? __init_rwsem+0x11e/0x160 [ 2414.584976][ T7539] ? copy_signal+0x529/0x630 [ 2414.589590][ T7539] copy_process+0x1816/0x3ef0 [ 2414.594430][ T7539] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2414.599572][ T7539] ? _copy_from_user+0x10f/0x170 [ 2414.604551][ T7539] kernel_clone+0x210/0x960 [ 2414.609095][ T7539] ? create_io_thread+0x1e0/0x1e0 [ 2414.614164][ T7539] __se_sys_clone3+0x3e1/0x430 [ 2414.618952][ T7539] ? __x64_sys_clone3+0x60/0x60 [ 2414.623858][ T7539] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2414.629861][ T7539] ? lockdep_hardirqs_on+0x94/0x130 [ 2414.635090][ T7539] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2414.641095][ T7539] do_syscall_64+0x3d/0xb0 [ 2414.645538][ T7539] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2414.651461][ T7539] RIP: 0033:0x7fa1e449cae9 [ 2414.655901][ T7539] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2414.675527][ T7539] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2414.683968][ T7539] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2414.691960][ T7539] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2414.700053][ T7539] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2414.708051][ T7539] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2414.716039][ T7539] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2414.724049][ T7539] 19:12:34 executing program 1: syz_genetlink_get_family_id$nfc(0x0, 0xffffffffffffffff) (async) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000040), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_GET_DEVICE(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000580)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0000c70c"], 0x24}}, 0x0) (async) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) 19:12:34 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) 19:12:34 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_clone3(&(0x7f0000001240)={0x80000000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x3b}, &(0x7f00000000c0)=""/4096, 0x1000, &(0x7f00000010c0)=""/139, &(0x7f0000001180)}, 0x58) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:12:34 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x900000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:34 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) (async, rerun: 64) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async, rerun: 64) syz_clone3(&(0x7f0000001240)={0x80000000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x3b}, &(0x7f00000000c0)=""/4096, 0x1000, &(0x7f00000010c0)=""/139, &(0x7f0000001180)}, 0x58) (async) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:12:34 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 34) 19:12:34 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) 19:12:34 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x1100000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:34 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="4d8a52f241674ec6f68c6768c4941fc68530adbe581232d6027c438fe086092f53612eaa94a77b5c1b1d091f8c8e714c61864850d729fdaf7878", 0x3a, 0xffffffffffffffff) keyctl$link(0x8, r0, 0xfffffffffffffff9) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$link(0x8, r1, 0xfffffffffffffff8) 19:12:34 executing program 1: add_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x59, 0xfffffffffffffff9) 19:12:34 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x1f00000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) [ 2414.943346][ T7566] FAULT_INJECTION: forcing a failure. [ 2414.943346][ T7566] name failslab, interval 1, probability 0, space 0, times 0 [ 2415.012362][ T7566] CPU: 1 PID: 7566 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2415.020909][ T7566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2415.030987][ T7566] Call Trace: [ 2415.034282][ T7566] [ 2415.037230][ T7566] dump_stack_lvl+0x1e3/0x2cb [ 2415.041937][ T7566] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2415.047593][ T7566] ? panic+0x84d/0x84d [ 2415.051709][ T7566] ? __might_sleep+0xc0/0xc0 [ 2415.056450][ T7566] ? up_write+0x133/0x4d0 [ 2415.060815][ T7566] should_fail+0x38a/0x4c0 [ 2415.065262][ T7566] should_failslab+0x5/0x20 [ 2415.069784][ T7566] slab_pre_alloc_hook+0x53/0xc0 [ 2415.074767][ T7566] ? anon_vma_fork+0xed/0x580 [ 2415.079471][ T7566] kmem_cache_alloc+0x3f/0x280 [ 2415.084269][ T7566] anon_vma_fork+0xed/0x580 [ 2415.088790][ T7566] ? dup_userfaultfd+0x9f/0x5f0 [ 2415.093660][ T7566] ? kmem_cache_alloc+0x128/0x280 [ 2415.098726][ T7566] ? copy_mm+0x8ef/0x1370 [ 2415.103203][ T7566] copy_mm+0x9f2/0x1370 [ 2415.107401][ T7566] ? copy_signal+0x630/0x630 [ 2415.112015][ T7566] ? __init_rwsem+0x11e/0x160 [ 2415.116718][ T7566] ? copy_signal+0x529/0x630 [ 2415.121333][ T7566] copy_process+0x1816/0x3ef0 [ 2415.126064][ T7566] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2415.131204][ T7566] ? _copy_from_user+0x10f/0x170 [ 2415.136175][ T7566] kernel_clone+0x210/0x960 [ 2415.140715][ T7566] ? create_io_thread+0x1e0/0x1e0 [ 2415.145793][ T7566] __se_sys_clone3+0x3e1/0x430 [ 2415.150582][ T7566] ? __x64_sys_clone3+0x60/0x60 [ 2415.155491][ T7566] ? syscall_enter_from_user_mode+0x2e/0x230 19:12:35 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="4d8a52f241674ec6f68c6768c4941fc68530adbe581232d6027c438fe086092f53612eaa94a77b5c1b1d091f8c8e714c61864850d729fdaf7878", 0x3a, 0xffffffffffffffff) keyctl$link(0x8, r0, 0xfffffffffffffff9) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$link(0x8, r1, 0xfffffffffffffff8) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="4d8a52f241674ec6f68c6768c4941fc68530adbe581232d6027c438fe086092f53612eaa94a77b5c1b1d091f8c8e714c61864850d729fdaf7878", 0x3a, 0xffffffffffffffff) (async) keyctl$link(0x8, r0, 0xfffffffffffffff9) (async) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) (async) keyctl$link(0x8, r1, 0xfffffffffffffff8) (async) [ 2415.161493][ T7566] ? lockdep_hardirqs_on+0x94/0x130 [ 2415.166723][ T7566] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2415.172739][ T7566] do_syscall_64+0x3d/0xb0 [ 2415.177192][ T7566] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2415.183113][ T7566] RIP: 0033:0x7fa1e449cae9 [ 2415.187649][ T7566] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 19:12:35 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="4d8a52f241674ec6f68c6768c4941fc68530adbe581232d6027c438fe086092f53612eaa94a77b5c1b1d091f8c8e714c61864850d729fdaf7878", 0x3a, 0xffffffffffffffff) keyctl$link(0x8, r0, 0xfffffffffffffff9) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$link(0x8, r1, 0xfffffffffffffff8) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="4d8a52f241674ec6f68c6768c4941fc68530adbe581232d6027c438fe086092f53612eaa94a77b5c1b1d091f8c8e714c61864850d729fdaf7878", 0x3a, 0xffffffffffffffff) (async) keyctl$link(0x8, r0, 0xfffffffffffffff9) (async) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) (async) keyctl$link(0x8, r1, 0xfffffffffffffff8) (async) [ 2415.207377][ T7566] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2415.215833][ T7566] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2415.223827][ T7566] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2415.231827][ T7566] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2415.239824][ T7566] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2415.247917][ T7566] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2415.255933][ T7566] 19:12:35 executing program 1: add_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x59, 0xfffffffffffffff9) 19:12:35 executing program 5: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$negate(0xd, r0, 0x1, 0xfffffffffffffff9) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "25e984f9f0c354e56210822c9b68b7f51794b5f1553a7f5213bb8b7ef30c21deac7aa09a23ae2c2822f28cb7ab8f75ac2c715978119d59f0657827f218ed4cab", 0x13}, 0x48, r1) 19:12:35 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x2000000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:35 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 35) 19:12:35 executing program 1: add_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x59, 0xfffffffffffffff9) 19:12:35 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0xfffffffffffffc84) accept4$phonet_pipe(r0, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x80000) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:12:35 executing program 3: r0 = msgget(0x1, 0x200) msgctl$IPC_RMID(r0, 0x0) r1 = msgget(0x1, 0x200) msgctl$IPC_RMID(r1, 0x0) r2 = msgget(0x1, 0x200) msgctl$IPC_RMID(r2, 0x0) msgctl$IPC_RMID(r2, 0x0) 19:12:35 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x4000000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:35 executing program 1: add_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) 19:12:35 executing program 3: r0 = msgget(0x1, 0x200) msgctl$IPC_RMID(r0, 0x0) (async) r1 = msgget(0x1, 0x200) msgctl$IPC_RMID(r1, 0x0) (async) r2 = msgget(0x1, 0x200) msgctl$IPC_RMID(r2, 0x0) msgctl$IPC_RMID(r2, 0x0) 19:12:35 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x4100000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) [ 2415.680916][ T7603] FAULT_INJECTION: forcing a failure. [ 2415.680916][ T7603] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2415.757344][ T7603] CPU: 1 PID: 7603 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2415.765899][ T7603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2415.775981][ T7603] Call Trace: [ 2415.779332][ T7603] [ 2415.782285][ T7603] dump_stack_lvl+0x1e3/0x2cb [ 2415.787000][ T7603] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2415.792663][ T7603] ? panic+0x84d/0x84d [ 2415.796786][ T7603] should_fail+0x38a/0x4c0 [ 2415.801244][ T7603] prepare_alloc_pages+0x1db/0x5b0 [ 2415.806390][ T7603] __alloc_pages+0x14f/0x700 [ 2415.811009][ T7603] ? __rmqueue_pcplist+0x2030/0x2030 [ 2415.816349][ T7603] ? __pud_alloc+0x1d1/0x210 [ 2415.820974][ T7603] ? alloc_pages+0x458/0x570 [ 2415.825595][ T7603] __pmd_alloc+0xb6/0x850 [ 2415.829957][ T7603] ? do_raw_spin_unlock+0x137/0x8b0 [ 2415.835186][ T7603] ? __pud_alloc+0x210/0x210 [ 2415.839808][ T7603] ? _raw_spin_unlock+0x24/0x40 [ 2415.844682][ T7603] ? __pud_alloc+0x1d1/0x210 [ 2415.849310][ T7603] ? handle_mm_fault+0x5950/0x5950 [ 2415.854461][ T7603] copy_page_range+0x3bbc/0x43b0 [ 2415.859430][ T7603] ? __lock_acquire+0x1295/0x1ff0 [ 2415.864528][ T7603] ? rcu_lock_acquire+0x30/0x30 [ 2415.869406][ T7603] ? pfn_valid+0x1d0/0x1d0 [ 2415.873847][ T7603] ? up_write+0x133/0x4d0 [ 2415.878215][ T7603] ? __up_read+0x690/0x690 [ 2415.882658][ T7603] ? memset+0x1f/0x40 [ 2415.886679][ T7603] ? anon_vma_interval_tree_insert+0x429/0x4a0 [ 2415.892865][ T7603] ? vma_interval_tree_augment_rotate+0x1c0/0x1c0 [ 2415.899326][ T7603] ? vma_gap_callbacks_rotate+0x1e4/0x1f0 [ 2415.905088][ T7603] copy_mm+0xc64/0x1370 [ 2415.909297][ T7603] ? copy_signal+0x630/0x630 [ 2415.913914][ T7603] ? __init_rwsem+0x11e/0x160 [ 2415.918624][ T7603] ? copy_signal+0x529/0x630 [ 2415.923240][ T7603] copy_process+0x1816/0x3ef0 [ 2415.928062][ T7603] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2415.933577][ T7603] ? _copy_from_user+0x10f/0x170 [ 2415.938548][ T7603] kernel_clone+0x210/0x960 [ 2415.943084][ T7603] ? create_io_thread+0x1e0/0x1e0 [ 2415.948160][ T7603] __se_sys_clone3+0x3e1/0x430 [ 2415.952985][ T7603] ? __x64_sys_clone3+0x60/0x60 19:12:35 executing program 1: add_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) 19:12:35 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0xf0ffffff00000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:35 executing program 5: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$negate(0xd, r0, 0x1, 0xfffffffffffffff9) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "25e984f9f0c354e56210822c9b68b7f51794b5f1553a7f5213bb8b7ef30c21deac7aa09a23ae2c2822f28cb7ab8f75ac2c715978119d59f0657827f218ed4cab", 0x13}, 0x48, r1) [ 2415.957902][ T7603] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2415.963918][ T7603] ? lockdep_hardirqs_on+0x94/0x130 [ 2415.969155][ T7603] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2415.975181][ T7603] do_syscall_64+0x3d/0xb0 [ 2415.979683][ T7603] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2415.985600][ T7603] RIP: 0033:0x7fa1e449cae9 [ 2415.990042][ T7603] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2416.009664][ T7603] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2416.018102][ T7603] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2416.026182][ T7603] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2416.034178][ T7603] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2416.042176][ T7603] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2416.050165][ T7603] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 19:12:36 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 36) [ 2416.058186][ T7603] 19:12:36 executing program 1: add_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) 19:12:36 executing program 3: r0 = msgget(0x1, 0x200) msgctl$IPC_RMID(r0, 0x0) r1 = msgget(0x1, 0x200) msgctl$IPC_RMID(r1, 0x0) (async) msgctl$IPC_RMID(r1, 0x0) r2 = msgget(0x1, 0x200) msgctl$IPC_RMID(r2, 0x0) (async) msgctl$IPC_RMID(r2, 0x0) msgctl$IPC_RMID(r2, 0x0) [ 2416.137689][ T7623] FAULT_INJECTION: forcing a failure. [ 2416.137689][ T7623] name failslab, interval 1, probability 0, space 0, times 0 [ 2416.226312][ T7623] CPU: 1 PID: 7623 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2416.234976][ T7623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2416.245034][ T7623] Call Trace: [ 2416.248308][ T7623] [ 2416.251236][ T7623] dump_stack_lvl+0x1e3/0x2cb [ 2416.255917][ T7623] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2416.261635][ T7623] ? panic+0x84d/0x84d [ 2416.265701][ T7623] ? __might_sleep+0xc0/0xc0 [ 2416.270303][ T7623] ? rcu_is_watching+0x11/0xa0 [ 2416.275088][ T7623] ? __alloc_pages+0x334/0x700 [ 2416.279861][ T7623] should_fail+0x38a/0x4c0 [ 2416.284289][ T7623] should_failslab+0x5/0x20 [ 2416.288793][ T7623] slab_pre_alloc_hook+0x53/0xc0 [ 2416.293730][ T7623] ? __pmd_alloc+0x136/0x850 [ 2416.298324][ T7623] kmem_cache_alloc+0x3f/0x280 [ 2416.303099][ T7623] __pmd_alloc+0x136/0x850 [ 2416.307520][ T7623] ? __pud_alloc+0x210/0x210 [ 2416.312110][ T7623] ? _raw_spin_unlock+0x24/0x40 [ 2416.316958][ T7623] ? __pud_alloc+0x1d1/0x210 [ 2416.321546][ T7623] ? handle_mm_fault+0x5950/0x5950 [ 2416.326667][ T7623] copy_page_range+0x3bbc/0x43b0 [ 2416.331708][ T7623] ? __lock_acquire+0x1295/0x1ff0 [ 2416.336758][ T7623] ? rcu_lock_acquire+0x30/0x30 [ 2416.341602][ T7623] ? pfn_valid+0x1d0/0x1d0 [ 2416.346022][ T7623] ? up_write+0x133/0x4d0 [ 2416.350353][ T7623] ? __up_read+0x690/0x690 [ 2416.354773][ T7623] ? memset+0x1f/0x40 [ 2416.358775][ T7623] ? anon_vma_interval_tree_insert+0x429/0x4a0 [ 2416.364923][ T7623] ? vma_interval_tree_augment_rotate+0x1c0/0x1c0 [ 2416.371367][ T7623] copy_mm+0xc64/0x1370 [ 2416.375534][ T7623] ? copy_signal+0x630/0x630 [ 2416.380123][ T7623] ? __init_rwsem+0x11e/0x160 [ 2416.384800][ T7623] ? copy_signal+0x529/0x630 [ 2416.389388][ T7623] copy_process+0x1816/0x3ef0 [ 2416.394103][ T7623] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2416.399211][ T7623] ? _copy_from_user+0x10f/0x170 [ 2416.404149][ T7623] kernel_clone+0x210/0x960 [ 2416.408656][ T7623] ? create_io_thread+0x1e0/0x1e0 [ 2416.413694][ T7623] __se_sys_clone3+0x3e1/0x430 [ 2416.418455][ T7623] ? __x64_sys_clone3+0x60/0x60 [ 2416.423322][ T7623] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2416.429305][ T7623] ? lockdep_hardirqs_on+0x94/0x130 [ 2416.434852][ T7623] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2416.440835][ T7623] do_syscall_64+0x3d/0xb0 [ 2416.445251][ T7623] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2416.451141][ T7623] RIP: 0033:0x7fa1e449cae9 [ 2416.455553][ T7623] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2416.475155][ T7623] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2416.483565][ T7623] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2416.491532][ T7623] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2416.499508][ T7623] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2416.507471][ T7623] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2416.515442][ T7623] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2416.523431][ T7623] 19:12:36 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0xf5ffffff00000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:36 executing program 1: add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x98, 0xfffffffffffffff8) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc4}, &(0x7f0000000100)={0x0, "99bf335b9fb4d3a2790d69f2b13a8ecaebed2a7362c9b6529a5700df83fc0ac04f8fdc050000004e7a49168d6fd8734764f9000000000000000000000200", 0x3f}, 0x48, r0) 19:12:36 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0xfffffffffffffc84) accept4$phonet_pipe(r0, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x80000) (async) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:12:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) accept$alg(r1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) 19:12:36 executing program 1: add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x98, 0xfffffffffffffff8) (async) add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x98, 0xfffffffffffffff8) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc4}, &(0x7f0000000100)={0x0, "99bf335b9fb4d3a2790d69f2b13a8ecaebed2a7362c9b6529a5700df83fc0ac04f8fdc050000004e7a49168d6fd8734764f9000000000000000000000200", 0x3f}, 0x48, r0) 19:12:36 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0xfbffffff00000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:36 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 37) 19:12:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) accept$alg(r1, 0x0, 0x0) (async) accept$alg(r0, 0x0, 0x0) 19:12:36 executing program 5: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$negate(0xd, r0, 0x1, 0xfffffffffffffff9) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "25e984f9f0c354e56210822c9b68b7f51794b5f1553a7f5213bb8b7ef30c21deac7aa09a23ae2c2822f28cb7ab8f75ac2c715978119d59f0657827f218ed4cab", 0x13}, 0x48, r1) 19:12:36 executing program 1: add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x98, 0xfffffffffffffff8) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc4}, &(0x7f0000000100)={0x0, "99bf335b9fb4d3a2790d69f2b13a8ecaebed2a7362c9b6529a5700df83fc0ac04f8fdc050000004e7a49168d6fd8734764f9000000000000000000000200", 0x3f}, 0x48, r0) 19:12:36 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0xff0f010000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) [ 2416.706147][ T7644] FAULT_INJECTION: forcing a failure. [ 2416.706147][ T7644] name failslab, interval 1, probability 0, space 0, times 0 19:12:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) accept$alg(r1, 0x0, 0x0) (async) accept$alg(r1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) 19:12:36 executing program 1: syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000180)=@in={0x2, 0x4e24, @multicast2}, 0x0, 0x0, 0x1}) r0 = syz_io_uring_setup(0x753d, &(0x7f0000000080)={0x0, 0x6a8d, 0x2000, 0x3, 0x7d}, &(0x7f0000000100), &(0x7f0000000140)) io_uring_setup(0x4efb, &(0x7f0000000240)={0x0, 0x8cd5, 0x764, 0x3, 0x125, 0x0, r0}) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) 19:12:36 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0xff0f7c8400000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) [ 2416.859103][ T7644] CPU: 1 PID: 7644 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2416.867747][ T7644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2416.877823][ T7644] Call Trace: [ 2416.881113][ T7644] [ 2416.884059][ T7644] dump_stack_lvl+0x1e3/0x2cb [ 2416.888764][ T7644] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2416.894421][ T7644] ? panic+0x84d/0x84d [ 2416.898516][ T7644] ? __might_sleep+0xc0/0xc0 [ 2416.903148][ T7644] ? rcu_is_watching+0x11/0xa0 [ 2416.907936][ T7644] ? __alloc_pages+0x334/0x700 [ 2416.912725][ T7644] should_fail+0x38a/0x4c0 [ 2416.917168][ T7644] should_failslab+0x5/0x20 [ 2416.921688][ T7644] slab_pre_alloc_hook+0x53/0xc0 [ 2416.926653][ T7644] ? __pmd_alloc+0x136/0x850 [ 2416.931270][ T7644] kmem_cache_alloc+0x3f/0x280 [ 2416.936409][ T7644] __pmd_alloc+0x136/0x850 [ 2416.940851][ T7644] ? __pud_alloc+0x210/0x210 [ 2416.945463][ T7644] ? _raw_spin_unlock+0x24/0x40 [ 2416.950332][ T7644] ? __pud_alloc+0x1d1/0x210 [ 2416.954958][ T7644] ? handle_mm_fault+0x5950/0x5950 [ 2416.960109][ T7644] copy_page_range+0x3bbc/0x43b0 [ 2416.965071][ T7644] ? __lock_acquire+0x1295/0x1ff0 [ 2416.970160][ T7644] ? rcu_lock_acquire+0x30/0x30 [ 2416.975034][ T7644] ? pfn_valid+0x1d0/0x1d0 [ 2416.979469][ T7644] ? up_write+0x133/0x4d0 [ 2416.983833][ T7644] ? __up_read+0x690/0x690 [ 2416.988281][ T7644] ? memset+0x1f/0x40 [ 2416.992284][ T7644] ? anon_vma_interval_tree_insert+0x429/0x4a0 [ 2416.998463][ T7644] ? vma_interval_tree_augment_rotate+0x1c0/0x1c0 [ 2417.004933][ T7644] copy_mm+0xc64/0x1370 [ 2417.009134][ T7644] ? copy_signal+0x630/0x630 [ 2417.013744][ T7644] ? __init_rwsem+0x11e/0x160 [ 2417.018443][ T7644] ? copy_signal+0x529/0x630 [ 2417.023056][ T7644] copy_process+0x1816/0x3ef0 [ 2417.027786][ T7644] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2417.032927][ T7644] ? _copy_from_user+0x10f/0x170 [ 2417.037894][ T7644] kernel_clone+0x210/0x960 [ 2417.042413][ T7644] ? create_io_thread+0x1e0/0x1e0 [ 2417.047457][ T7644] __se_sys_clone3+0x3e1/0x430 [ 2417.052233][ T7644] ? __x64_sys_clone3+0x60/0x60 [ 2417.057108][ T7644] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2417.063090][ T7644] ? lockdep_hardirqs_on+0x94/0x130 [ 2417.068292][ T7644] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2417.074273][ T7644] do_syscall_64+0x3d/0xb0 [ 2417.078715][ T7644] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2417.084616][ T7644] RIP: 0033:0x7fa1e449cae9 [ 2417.089033][ T7644] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2417.108822][ T7644] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2417.117242][ T7644] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2417.125210][ T7644] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2417.133178][ T7644] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2417.141164][ T7644] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2417.149127][ T7644] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2417.157103][ T7644] 19:12:37 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0xfffffffffffffc84) (async) accept4$phonet_pipe(r0, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x80000) (async) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:12:37 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f00000000c0)={0x80000000, &(0x7f0000000000)=[{0x80000000}], &(0x7f0000000040)}) semtimedop(0x0, &(0x7f0000000400)=[{}], 0x1, 0x0) ioctl$MEDIA_IOC_G_TOPOLOGY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000580)={0x0, 0x2, 0x0, &(0x7f0000000100)=[{}, {}], 0x3, 0x0, &(0x7f00000001c0)=[{}, {}, {}], 0x4, 0x0, &(0x7f0000000340)=[{}, {0x0, 0x80000000, 0x0, {0x0}}, {}, {}], 0xa, 0x0, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000640)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$MEDIA_IOC_G_TOPOLOGY(r2, 0xc0487c04, &(0x7f0000000d00)={0x0, 0x3, 0x0, &(0x7f0000000680)=[{}, {}, {}], 0xa, 0x0, &(0x7f00000007c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x1, 0x0, &(0x7f0000000c40)=[{}], 0x3, 0x0, &(0x7f0000000c80)=[{}, {}, {}]}) ioctl$MEDIA_IOC_SETUP_LINK(0xffffffffffffffff, 0xc0347c03, &(0x7f0000000600)={{0x80000000, 0x0, 0x2, [0x40, 0x8]}, {r0, r1, 0x2, [0x8, 0x80000000]}, 0x10000000, [0x40, 0x9]}) 19:12:37 executing program 1: syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000180)=@in={0x2, 0x4e24, @multicast2}, 0x0, 0x0, 0x1}) r0 = syz_io_uring_setup(0x753d, &(0x7f0000000080)={0x0, 0x6a8d, 0x2000, 0x3, 0x7d}, &(0x7f0000000100), &(0x7f0000000140)) io_uring_setup(0x4efb, &(0x7f0000000240)={0x0, 0x8cd5, 0x764, 0x3, 0x125, 0x0, r0}) (async) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) 19:12:37 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0xff4f7e8400000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:37 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 38) [ 2417.424805][ T7666] FAULT_INJECTION: forcing a failure. [ 2417.424805][ T7666] name failslab, interval 1, probability 0, space 0, times 0 19:12:37 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0xffffffff00000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) [ 2417.541223][ T7666] CPU: 0 PID: 7666 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2417.549773][ T7666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2417.559851][ T7666] Call Trace: [ 2417.563157][ T7666] [ 2417.566104][ T7666] dump_stack_lvl+0x1e3/0x2cb [ 2417.570806][ T7666] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2417.576463][ T7666] ? panic+0x84d/0x84d [ 2417.580560][ T7666] ? __might_sleep+0xc0/0xc0 [ 2417.585193][ T7666] ? rcu_is_watching+0x11/0xa0 [ 2417.589993][ T7666] should_fail+0x38a/0x4c0 [ 2417.594436][ T7666] should_failslab+0x5/0x20 [ 2417.598961][ T7666] slab_pre_alloc_hook+0x53/0xc0 [ 2417.603924][ T7666] ? ptlock_alloc+0x1c/0x60 [ 2417.608467][ T7666] kmem_cache_alloc+0x3f/0x280 [ 2417.613261][ T7666] ptlock_alloc+0x1c/0x60 [ 2417.617614][ T7666] pte_alloc_one+0xd1/0x360 [ 2417.622143][ T7666] ? pfn_modify_allowed+0x2f0/0x2f0 [ 2417.627369][ T7666] ? _raw_spin_unlock+0x24/0x40 [ 2417.632239][ T7666] ? __pmd_alloc+0x6e8/0x850 [ 2417.636852][ T7666] ? __pud_alloc+0x210/0x210 [ 2417.641469][ T7666] __pte_alloc+0x75/0x210 [ 2417.645830][ T7666] ? free_pgtables+0x2a0/0x2a0 [ 2417.650633][ T7666] copy_page_range+0x37cc/0x43b0 [ 2417.655609][ T7666] ? __lock_acquire+0x1295/0x1ff0 [ 2417.660703][ T7666] ? pfn_valid+0x1d0/0x1d0 [ 2417.665145][ T7666] ? up_write+0x133/0x4d0 [ 2417.669506][ T7666] ? __up_read+0x690/0x690 [ 2417.673956][ T7666] ? memset+0x1f/0x40 [ 2417.677956][ T7666] ? vma_interval_tree_augment_rotate+0x1c0/0x1c0 [ 2417.684428][ T7666] ? vma_gap_callbacks_rotate+0x1e4/0x1f0 19:12:37 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0xfffffffffffffc84) accept4$phonet_pipe(r0, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x80000) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:12:37 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f00000000c0)={0x80000000, &(0x7f0000000000)=[{0x80000000}], &(0x7f0000000040)}) semtimedop(0x0, &(0x7f0000000400)=[{}], 0x1, 0x0) (async, rerun: 32) ioctl$MEDIA_IOC_G_TOPOLOGY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000580)={0x0, 0x2, 0x0, &(0x7f0000000100)=[{}, {}], 0x3, 0x0, &(0x7f00000001c0)=[{}, {}, {}], 0x4, 0x0, &(0x7f0000000340)=[{}, {0x0, 0x80000000, 0x0, {0x0}}, {}, {}], 0xa, 0x0, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000640)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$MEDIA_IOC_G_TOPOLOGY(r2, 0xc0487c04, &(0x7f0000000d00)={0x0, 0x3, 0x0, &(0x7f0000000680)=[{}, {}, {}], 0xa, 0x0, &(0x7f00000007c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x1, 0x0, &(0x7f0000000c40)=[{}], 0x3, 0x0, &(0x7f0000000c80)=[{}, {}, {}]}) (async) ioctl$MEDIA_IOC_SETUP_LINK(0xffffffffffffffff, 0xc0347c03, &(0x7f0000000600)={{0x80000000, 0x0, 0x2, [0x40, 0x8]}, {r0, r1, 0x2, [0x8, 0x80000000]}, 0x10000000, [0x40, 0x9]}) 19:12:37 executing program 1: syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000180)=@in={0x2, 0x4e24, @multicast2}, 0x0, 0x0, 0x1}) syz_io_uring_setup(0x753d, &(0x7f0000000080)={0x0, 0x6a8d, 0x2000, 0x3, 0x7d}, &(0x7f0000000100), &(0x7f0000000140)) (async) r0 = syz_io_uring_setup(0x753d, &(0x7f0000000080)={0x0, 0x6a8d, 0x2000, 0x3, 0x7d}, &(0x7f0000000100), &(0x7f0000000140)) io_uring_setup(0x4efb, &(0x7f0000000240)={0x0, 0x8cd5, 0x764, 0x3, 0x125, 0x0, r0}) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x3f, 0xfffffffffffffff8) 19:12:37 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:37 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) [ 2417.690181][ T7666] copy_mm+0xc64/0x1370 [ 2417.694370][ T7666] ? copy_signal+0x630/0x630 [ 2417.698984][ T7666] ? __init_rwsem+0x11e/0x160 [ 2417.703683][ T7666] ? copy_signal+0x529/0x630 [ 2417.708302][ T7666] copy_process+0x1816/0x3ef0 [ 2417.713034][ T7666] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2417.718178][ T7666] ? _copy_from_user+0x10f/0x170 [ 2417.723143][ T7666] kernel_clone+0x210/0x960 [ 2417.727687][ T7666] ? create_io_thread+0x1e0/0x1e0 [ 2417.732774][ T7666] __se_sys_clone3+0x3e1/0x430 [ 2417.737566][ T7666] ? __x64_sys_clone3+0x60/0x60 [ 2417.742476][ T7666] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2417.748483][ T7666] ? lockdep_hardirqs_on+0x94/0x130 [ 2417.753711][ T7666] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2417.759732][ T7666] do_syscall_64+0x3d/0xb0 [ 2417.764191][ T7666] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2417.770106][ T7666] RIP: 0033:0x7fa1e449cae9 19:12:37 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {0x7}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) [ 2417.774540][ T7666] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2417.794190][ T7666] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2417.802770][ T7666] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2417.810768][ T7666] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2417.818762][ T7666] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2417.826750][ T7666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2417.834740][ T7666] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2417.842747][ T7666] 19:12:37 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) add_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r0) 19:12:37 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f00000000c0)={0x80000000, &(0x7f0000000000)=[{0x80000000}], &(0x7f0000000040)}) (async) semtimedop(0x0, &(0x7f0000000400)=[{}], 0x1, 0x0) ioctl$MEDIA_IOC_G_TOPOLOGY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000580)={0x0, 0x2, 0x0, &(0x7f0000000100)=[{}, {}], 0x3, 0x0, &(0x7f00000001c0)=[{}, {}, {}], 0x4, 0x0, &(0x7f0000000340)=[{}, {0x0, 0x80000000, 0x0, {0x0}}, {}, {}], 0xa, 0x0, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000640)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$MEDIA_IOC_G_TOPOLOGY(r2, 0xc0487c04, &(0x7f0000000d00)={0x0, 0x3, 0x0, &(0x7f0000000680)=[{}, {}, {}], 0xa, 0x0, &(0x7f00000007c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x1, 0x0, &(0x7f0000000c40)=[{}], 0x3, 0x0, &(0x7f0000000c80)=[{}, {}, {}]}) (async) ioctl$MEDIA_IOC_SETUP_LINK(0xffffffffffffffff, 0xc0347c03, &(0x7f0000000600)={{0x80000000, 0x0, 0x2, [0x40, 0x8]}, {r0, r1, 0x2, [0x8, 0x80000000]}, 0x10000000, [0x40, 0x9]}) 19:12:37 executing program 4: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r1, 0x0, 0x0], 0x9}, 0x58) r2 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r2, 0x0, 0x0], 0x9}, 0x58) r3 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r3, 0x0, 0x0], 0x9}, 0x58) r4 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r4, 0x0, 0x0], 0x9}, 0x58) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, 0x0, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000004c0)=0xc) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000480)=ANY=[@ANYBLOB="010000004b70a2e4f47cb001fddcd85085a3c76b2678154b8d43dfff1d4109", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) syz_clone3(&(0x7f00000002c0)={0x200010000, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), {0x1a}, &(0x7f0000000140)=""/72, 0x48, &(0x7f00000001c0)=""/76, &(0x7f0000000240)=[r1, r2, r0, r0, r3, r4, r0, r0], 0x8, {r6}}, 0x58) r7 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r7, 0x0, 0x0], 0x9}, 0x58) r8 = socket$phonet_pipe(0x23, 0x5, 0x2) accept4$phonet_pipe(r8, &(0x7f0000000380), &(0x7f00000003c0)=0x10, 0x800) sched_rr_get_interval(r7, &(0x7f0000000340)) 19:12:37 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {0x8}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:38 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 39) 19:12:38 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_VENDOR(r3, &(0x7f0000002540)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000002500)={&(0x7f0000001480)={0x14}, 0x14}}, 0x0) r4 = syz_genetlink_get_family_id$nfc(&(0x7f0000000140), r0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000180)=0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0x0) sendmsg$NFC_CMD_DEV_UP(r3, &(0x7f0000000280)={&(0x7f0000000100), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r4, 0x200, 0x70bd25, 0x25dfdbfb, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r5}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r6}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000010}, 0xa000) keyctl$unlink(0x18, r2, r2) [ 2418.105366][ T7711] FAULT_INJECTION: forcing a failure. [ 2418.105366][ T7711] name failslab, interval 1, probability 0, space 0, times 0 [ 2418.148042][ T7711] CPU: 0 PID: 7711 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2418.156593][ T7711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2418.166763][ T7711] Call Trace: [ 2418.170057][ T7711] [ 2418.173001][ T7711] dump_stack_lvl+0x1e3/0x2cb [ 2418.177716][ T7711] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2418.183381][ T7711] ? panic+0x84d/0x84d [ 2418.188053][ T7711] ? __might_sleep+0xc0/0xc0 [ 2418.192673][ T7711] ? rcu_is_watching+0x11/0xa0 [ 2418.197466][ T7711] should_fail+0x38a/0x4c0 [ 2418.201914][ T7711] should_failslab+0x5/0x20 [ 2418.206437][ T7711] slab_pre_alloc_hook+0x53/0xc0 [ 2418.211409][ T7711] ? ptlock_alloc+0x1c/0x60 [ 2418.215967][ T7711] kmem_cache_alloc+0x3f/0x280 [ 2418.220758][ T7711] ptlock_alloc+0x1c/0x60 [ 2418.225109][ T7711] pte_alloc_one+0xd1/0x360 [ 2418.229638][ T7711] ? pfn_modify_allowed+0x2f0/0x2f0 [ 2418.234857][ T7711] ? _raw_spin_unlock+0x24/0x40 [ 2418.239724][ T7711] ? __pmd_alloc+0x6e8/0x850 [ 2418.244343][ T7711] ? __pud_alloc+0x210/0x210 [ 2418.248960][ T7711] __pte_alloc+0x75/0x210 [ 2418.253315][ T7711] ? free_pgtables+0x2a0/0x2a0 [ 2418.258116][ T7711] copy_page_range+0x37cc/0x43b0 [ 2418.263086][ T7711] ? __lock_acquire+0x1295/0x1ff0 [ 2418.268176][ T7711] ? pfn_valid+0x1d0/0x1d0 [ 2418.272611][ T7711] ? up_write+0x133/0x4d0 [ 2418.276965][ T7711] ? __up_read+0x690/0x690 [ 2418.281385][ T7711] ? memset+0x1f/0x40 [ 2418.285374][ T7711] ? vma_interval_tree_augment_rotate+0x1c0/0x1c0 [ 2418.291837][ T7711] copy_mm+0xc64/0x1370 [ 2418.295999][ T7711] ? copy_signal+0x630/0x630 [ 2418.300588][ T7711] ? __init_rwsem+0x11e/0x160 [ 2418.305283][ T7711] ? copy_signal+0x529/0x630 [ 2418.309873][ T7711] copy_process+0x1816/0x3ef0 [ 2418.314566][ T7711] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2418.319680][ T7711] ? _copy_from_user+0x10f/0x170 [ 2418.324636][ T7711] kernel_clone+0x210/0x960 [ 2418.329146][ T7711] ? create_io_thread+0x1e0/0x1e0 [ 2418.334188][ T7711] __se_sys_clone3+0x3e1/0x430 [ 2418.338946][ T7711] ? __x64_sys_clone3+0x60/0x60 [ 2418.343819][ T7711] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2418.349795][ T7711] ? lockdep_hardirqs_on+0x94/0x130 [ 2418.355004][ T7711] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2418.360998][ T7711] do_syscall_64+0x3d/0xb0 [ 2418.365412][ T7711] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2418.371302][ T7711] RIP: 0033:0x7fa1e449cae9 [ 2418.375711][ T7711] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 19:12:38 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x4100000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:38 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) (async) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) add_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r0) 19:12:38 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {0x9}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:38 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_VENDOR(r3, &(0x7f0000002540)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000002500)={&(0x7f0000001480)={0x14}, 0x14}}, 0x0) r4 = syz_genetlink_get_family_id$nfc(&(0x7f0000000140), r0) (async) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000180)=0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0x0) sendmsg$NFC_CMD_DEV_UP(r3, &(0x7f0000000280)={&(0x7f0000000100), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r4, 0x200, 0x70bd25, 0x25dfdbfb, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r5}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r6}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000010}, 0xa000) (async) keyctl$unlink(0x18, r2, r2) [ 2418.395311][ T7711] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2418.403742][ T7711] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2418.411820][ T7711] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2418.419799][ T7711] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2418.427761][ T7711] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2418.435725][ T7711] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2418.443704][ T7711] 19:12:38 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x2000000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:38 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) (async) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_VENDOR(r3, &(0x7f0000002540)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000002500)={&(0x7f0000001480)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$nfc(&(0x7f0000000140), r0) (async) r4 = syz_genetlink_get_family_id$nfc(&(0x7f0000000140), r0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000180)) (async) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000180)=0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0x0) sendmsg$NFC_CMD_DEV_UP(r3, &(0x7f0000000280)={&(0x7f0000000100), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r4, 0x200, 0x70bd25, 0x25dfdbfb, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r5}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r6}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000010}, 0xa000) keyctl$unlink(0x18, r2, r2) 19:12:38 executing program 4: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) (async) r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) r1 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r1, 0x0, 0x0], 0x9}, 0x58) (async) r2 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r2, 0x0, 0x0], 0x9}, 0x58) (async) r3 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r3, 0x0, 0x0], 0x9}, 0x58) r4 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r4, 0x0, 0x0], 0x9}, 0x58) (async) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, 0x0, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000004c0)=0xc) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000480)=ANY=[@ANYBLOB="010000004b70a2e4f47cb001fddcd85085a3c76b2678154b8d43dfff1d4109", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) syz_clone3(&(0x7f00000002c0)={0x200010000, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), {0x1a}, &(0x7f0000000140)=""/72, 0x48, &(0x7f00000001c0)=""/76, &(0x7f0000000240)=[r1, r2, r0, r0, r3, r4, r0, r0], 0x8, {r6}}, 0x58) (async) r7 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r7, 0x0, 0x0], 0x9}, 0x58) r8 = socket$phonet_pipe(0x23, 0x5, 0x2) accept4$phonet_pipe(r8, &(0x7f0000000380), &(0x7f00000003c0)=0x10, 0x800) sched_rr_get_interval(r7, &(0x7f0000000340)) 19:12:38 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r0) (async) add_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r0) 19:12:38 executing program 5: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r1, 0x0, 0x0], 0x9}, 0x58) r2 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r2, 0x0, 0x0], 0x9}, 0x58) r3 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r3, 0x0, 0x0], 0x9}, 0x58) r4 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r4, 0x0, 0x0], 0x9}, 0x58) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, 0x0, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000004c0)=0xc) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000480)=ANY=[@ANYBLOB="010000004b70a2e4f47cb001fddcd85085a3c76b2678154b8d43dfff1d4109", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) syz_clone3(&(0x7f00000002c0)={0x200010000, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), {0x1a}, &(0x7f0000000140)=""/72, 0x48, &(0x7f00000001c0)=""/76, &(0x7f0000000240)=[r1, r2, r0, r0, r3, r4, r0, r0], 0x8, {r6}}, 0x58) r7 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r7, 0x0, 0x0], 0x9}, 0x58) r8 = socket$phonet_pipe(0x23, 0x5, 0x2) accept4$phonet_pipe(r8, &(0x7f0000000380), &(0x7f00000003c0)=0x10, 0x800) sched_rr_get_interval(r7, &(0x7f0000000340)) 19:12:38 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {0x11}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:38 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 40) 19:12:38 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r1, 0x1) 19:12:38 executing program 1: add_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 19:12:38 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {0x41}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:38 executing program 1: add_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) (async) 19:12:38 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r1, 0x1) 19:12:38 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {0x70}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:38 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000001300)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r1, 0x1) [ 2418.885350][ T7752] FAULT_INJECTION: forcing a failure. [ 2418.885350][ T7752] name failslab, interval 1, probability 0, space 0, times 0 [ 2418.940836][ T7752] CPU: 0 PID: 7752 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2418.949377][ T7752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2418.959487][ T7752] Call Trace: [ 2418.962787][ T7752] [ 2418.965745][ T7752] dump_stack_lvl+0x1e3/0x2cb [ 2418.970464][ T7752] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2418.976129][ T7752] ? panic+0x84d/0x84d [ 2418.980230][ T7752] ? __might_sleep+0xc0/0xc0 [ 2418.984953][ T7752] should_fail+0x38a/0x4c0 [ 2418.989402][ T7752] should_failslab+0x5/0x20 [ 2418.993936][ T7752] slab_pre_alloc_hook+0x53/0xc0 [ 2418.998911][ T7752] ? copy_mm+0x8d2/0x1370 [ 2419.003262][ T7752] kmem_cache_alloc+0x3f/0x280 [ 2419.008078][ T7752] ? vma_gap_callbacks_rotate+0x1e4/0x1f0 [ 2419.013829][ T7752] copy_mm+0x8d2/0x1370 [ 2419.018026][ T7752] ? copy_signal+0x630/0x630 [ 2419.022650][ T7752] ? __init_rwsem+0x11e/0x160 [ 2419.027351][ T7752] ? copy_signal+0x529/0x630 [ 2419.031963][ T7752] copy_process+0x1816/0x3ef0 [ 2419.036693][ T7752] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2419.041834][ T7752] ? _copy_from_user+0x10f/0x170 [ 2419.046804][ T7752] kernel_clone+0x210/0x960 [ 2419.051354][ T7752] ? create_io_thread+0x1e0/0x1e0 [ 2419.056447][ T7752] __se_sys_clone3+0x3e1/0x430 [ 2419.061230][ T7752] ? __x64_sys_clone3+0x60/0x60 [ 2419.066140][ T7752] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2419.072314][ T7752] ? lockdep_hardirqs_on+0x94/0x130 [ 2419.077536][ T7752] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2419.083673][ T7752] do_syscall_64+0x3d/0xb0 [ 2419.088127][ T7752] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2419.094074][ T7752] RIP: 0033:0x7fa1e449cae9 [ 2419.098517][ T7752] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2419.118150][ T7752] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2419.126593][ T7752] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 19:12:39 executing program 4: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) (async) r0 = syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) r1 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r1, 0x0, 0x0], 0x9}, 0x58) (async) r2 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r2, 0x0, 0x0], 0x9}, 0x58) (async) r3 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r3, 0x0, 0x0], 0x9}, 0x58) (async) r4 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r4, 0x0, 0x0], 0x9}, 0x58) (async) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, 0x0, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000004c0)=0xc) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000480)=ANY=[@ANYBLOB="010000004b70a2e4f47cb001fddcd85085a3c76b2678154b8d43dfff1d4109", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) syz_clone3(&(0x7f00000002c0)={0x200010000, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), {0x1a}, &(0x7f0000000140)=""/72, 0x48, &(0x7f00000001c0)=""/76, &(0x7f0000000240)=[r1, r2, r0, r0, r3, r4, r0, r0], 0x8, {r6}}, 0x58) (async) r7 = getpgrp(0xffffffffffffffff) syz_clone3(&(0x7f0000000280)={0x80000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/99, 0x63, &(0x7f0000000140)=""/194, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, r7, 0x0, 0x0], 0x9}, 0x58) (async) r8 = socket$phonet_pipe(0x23, 0x5, 0x2) accept4$phonet_pipe(r8, &(0x7f0000000380), &(0x7f00000003c0)=0x10, 0x800) (async) sched_rr_get_interval(r7, &(0x7f0000000340)) 19:12:39 executing program 1: add_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) [ 2419.134932][ T7752] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2419.143271][ T7752] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2419.151262][ T7752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2419.159263][ T7752] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2419.167277][ T7752] 19:12:39 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x8000001000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:39 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "80358f274af1d3105604faf0f885d2cc15d27afe7d522b27642771b62a224f395cee4af16052088aba3c5c6deba3ce9bd79f2ed1dcf95f2b0bf8e203cb178446", 0x11}, 0x48, 0xfffffffffffffff9) r1 = add_key(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)="05c9cb2c10427bd4c09933da2ee32b45b18abc00de5af3c053a497d651f54828aac30648884dd6822bffb93f7de8e36c07fbecd0ffef80e9bec10c9da0ab10926cf88d8ca023a6914576e39443138c118decdfa6a09cb32ac9dccf75657fc4350729cc69ccba321b24d3652dbb7f6df958b4461cf2ddfc48ff97bceb906c4f0aa10b7c07c6bb942cc48fe575b285813359103b6156a207a2791c2ff072117305989ca2e9f1cf5bd21dca50c509ffd885908170bb2ed282cc00a86c4d6a8465d396e5fac89186740826d24ba22ef626d938e21bb69a7d110f60ad1b46fb5e2189261d33973d05f7d2852808e5c49c5ced784f1f2c0ed453cb", 0xf8, 0xfffffffffffffff8) keyctl$search(0xa, r0, &(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'syz', 0x1}, r1) 19:12:39 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {0x700}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:39 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 41) 19:12:39 executing program 1: mq_timedreceive(0xffffffffffffffff, &(0x7f0000000080)=""/222, 0xde, 0x9, &(0x7f0000000180)={0x77359400}) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, &(0x7f0000000200)=ANY=[@ANYBLOB="0300000000000000000000000000000083"]) add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x4c, 0xfffffffffffffffe) 19:12:39 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {0x900}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) [ 2419.293438][ T7774] FAULT_INJECTION: forcing a failure. [ 2419.293438][ T7774] name failslab, interval 1, probability 0, space 0, times 0 19:12:39 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "80358f274af1d3105604faf0f885d2cc15d27afe7d522b27642771b62a224f395cee4af16052088aba3c5c6deba3ce9bd79f2ed1dcf95f2b0bf8e203cb178446", 0x11}, 0x48, 0xfffffffffffffff9) (async) r1 = add_key(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)="05c9cb2c10427bd4c09933da2ee32b45b18abc00de5af3c053a497d651f54828aac30648884dd6822bffb93f7de8e36c07fbecd0ffef80e9bec10c9da0ab10926cf88d8ca023a6914576e39443138c118decdfa6a09cb32ac9dccf75657fc4350729cc69ccba321b24d3652dbb7f6df958b4461cf2ddfc48ff97bceb906c4f0aa10b7c07c6bb942cc48fe575b285813359103b6156a207a2791c2ff072117305989ca2e9f1cf5bd21dca50c509ffd885908170bb2ed282cc00a86c4d6a8465d396e5fac89186740826d24ba22ef626d938e21bb69a7d110f60ad1b46fb5e2189261d33973d05f7d2852808e5c49c5ced784f1f2c0ed453cb", 0xf8, 0xfffffffffffffff8) keyctl$search(0xa, r0, &(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'syz', 0x1}, r1) 19:12:39 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {0x1100}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) [ 2419.339315][ T7774] CPU: 0 PID: 7774 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2419.347873][ T7774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2419.357945][ T7774] Call Trace: [ 2419.361245][ T7774] [ 2419.364187][ T7774] dump_stack_lvl+0x1e3/0x2cb [ 2419.368898][ T7774] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2419.374583][ T7774] ? panic+0x84d/0x84d [ 2419.378680][ T7774] ? __might_sleep+0xc0/0xc0 [ 2419.383314][ T7774] should_fail+0x38a/0x4c0 [ 2419.387763][ T7774] should_failslab+0x5/0x20 [ 2419.392291][ T7774] slab_pre_alloc_hook+0x53/0xc0 [ 2419.397250][ T7774] ? copy_mm+0x8d2/0x1370 [ 2419.401587][ T7774] kmem_cache_alloc+0x3f/0x280 [ 2419.406368][ T7774] ? vma_gap_callbacks_rotate+0x1e4/0x1f0 [ 2419.412116][ T7774] copy_mm+0x8d2/0x1370 [ 2419.416310][ T7774] ? copy_signal+0x630/0x630 [ 2419.420918][ T7774] ? __init_rwsem+0x11e/0x160 [ 2419.425618][ T7774] ? copy_signal+0x529/0x630 [ 2419.430227][ T7774] copy_process+0x1816/0x3ef0 [ 2419.434954][ T7774] ? pidfd_show_fdinfo+0x2e0/0x2e0 19:12:39 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {0x1f00}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) [ 2419.440088][ T7774] ? _copy_from_user+0x10f/0x170 [ 2419.445051][ T7774] kernel_clone+0x210/0x960 [ 2419.449705][ T7774] ? create_io_thread+0x1e0/0x1e0 [ 2419.454787][ T7774] __se_sys_clone3+0x3e1/0x430 [ 2419.459574][ T7774] ? __x64_sys_clone3+0x60/0x60 [ 2419.464480][ T7774] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2419.470481][ T7774] ? lockdep_hardirqs_on+0x94/0x130 [ 2419.475706][ T7774] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2419.481714][ T7774] do_syscall_64+0x3d/0xb0 19:12:39 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {0x2000}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) [ 2419.486163][ T7774] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2419.492081][ T7774] RIP: 0033:0x7fa1e449cae9 [ 2419.496516][ T7774] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2419.516137][ T7774] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2419.524574][ T7774] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2419.532560][ T7774] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2419.540557][ T7774] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2419.548545][ T7774] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2419.556533][ T7774] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2419.564542][ T7774] 19:12:39 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {0x10035}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:12:39 executing program 3: keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "80358f274af1d3105604faf0f885d2cc15d27afe7d522b27642771b62a224f395cee4af16052088aba3c5c6deba3ce9bd79f2ed1dcf95f2b0bf8e203cb178446", 0x11}, 0x48, 0xfffffffffffffff9) r1 = add_key(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)="05c9cb2c10427bd4c09933da2ee32b45b18abc00de5af3c053a497d651f54828aac30648884dd6822bffb93f7de8e36c07fbecd0ffef80e9bec10c9da0ab10926cf88d8ca023a6914576e39443138c118decdfa6a09cb32ac9dccf75657fc4350729cc69ccba321b24d3652dbb7f6df958b4461cf2ddfc48ff97bceb906c4f0aa10b7c07c6bb942cc48fe575b285813359103b6156a207a2791c2ff072117305989ca2e9f1cf5bd21dca50c509ffd885908170bb2ed282cc00a86c4d6a8465d396e5fac89186740826d24ba22ef626d938e21bb69a7d110f60ad1b46fb5e2189261d33973d05f7d2852808e5c49c5ced784f1f2c0ed453cb", 0xf8, 0xfffffffffffffff8) keyctl$search(0xa, r0, &(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'syz', 0x1}, r1) keyctl$unlink(0x18, 0x0, 0xffffffffffffffff) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "80358f274af1d3105604faf0f885d2cc15d27afe7d522b27642771b62a224f395cee4af16052088aba3c5c6deba3ce9bd79f2ed1dcf95f2b0bf8e203cb178446", 0x11}, 0x48, 0xfffffffffffffff9) (async) add_key(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)="05c9cb2c10427bd4c09933da2ee32b45b18abc00de5af3c053a497d651f54828aac30648884dd6822bffb93f7de8e36c07fbecd0ffef80e9bec10c9da0ab10926cf88d8ca023a6914576e39443138c118decdfa6a09cb32ac9dccf75657fc4350729cc69ccba321b24d3652dbb7f6df958b4461cf2ddfc48ff97bceb906c4f0aa10b7c07c6bb942cc48fe575b285813359103b6156a207a2791c2ff072117305989ca2e9f1cf5bd21dca50c509ffd885908170bb2ed282cc00a86c4d6a8465d396e5fac89186740826d24ba22ef626d938e21bb69a7d110f60ad1b46fb5e2189261d33973d05f7d2852808e5c49c5ced784f1f2c0ed453cb", 0xf8, 0xfffffffffffffff8) (async) keyctl$search(0xa, r0, &(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'syz', 0x1}, r1) (async) 19:12:39 executing program 1: mq_timedreceive(0xffffffffffffffff, &(0x7f0000000080)=""/222, 0xde, 0x9, &(0x7f0000000180)={0x77359400}) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, &(0x7f0000000200)=ANY=[@ANYBLOB="0300000000000000000000000000000083"]) (async) add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x4c, 0xfffffffffffffffe) 19:12:39 executing program 5: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x4100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:39 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {0x4000}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) 19:12:39 executing program 0: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) (fail_nth: 42) 19:12:39 executing program 1: mq_timedreceive(0xffffffffffffffff, &(0x7f0000000080)=""/222, 0xde, 0x9, &(0x7f0000000180)={0x77359400}) (async) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, &(0x7f0000000200)=ANY=[@ANYBLOB="0300000000000000000000000000000083"]) add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x4c, 0xfffffffffffffffe) 19:12:39 executing program 3: keyctl$unlink(0x18, 0x0, 0x0) 19:12:39 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {0x4100}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) [ 2419.711427][ T7811] FAULT_INJECTION: forcing a failure. [ 2419.711427][ T7811] name failslab, interval 1, probability 0, space 0, times 0 [ 2419.770941][ T7811] CPU: 0 PID: 7811 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2419.779483][ T7811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2419.789559][ T7811] Call Trace: [ 2419.792856][ T7811] [ 2419.795802][ T7811] dump_stack_lvl+0x1e3/0x2cb [ 2419.800505][ T7811] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2419.806162][ T7811] ? panic+0x84d/0x84d [ 2419.810254][ T7811] ? __might_sleep+0xc0/0xc0 [ 2419.814865][ T7811] ? rcu_is_watching+0x11/0xa0 19:12:39 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {0x10035}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {0x10035}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) 19:12:39 executing program 5: getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) socketpair(0x26, 0xe, 0x5, &(0x7f0000000380)={0xffffffffffffffff}) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e23}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x4c810) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r2, 0x10000000) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x5, 0x1, 0x3f, 0x9, 0x10, r2, 0x61, '\x00', r0, r3, 0x0, 0x2}, 0x48) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, 0x0, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) 19:12:39 executing program 4: syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {0x10035}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {0x10035}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) [ 2419.819655][ T7811] ? __alloc_pages+0x334/0x700 [ 2419.824463][ T7811] should_fail+0x38a/0x4c0 [ 2419.828917][ T7811] should_failslab+0x5/0x20 [ 2419.833442][ T7811] slab_pre_alloc_hook+0x53/0xc0 [ 2419.838429][ T7811] ? __pmd_alloc+0x136/0x850 [ 2419.843045][ T7811] kmem_cache_alloc+0x3f/0x280 [ 2419.847849][ T7811] __pmd_alloc+0x136/0x850 [ 2419.852305][ T7811] ? __pud_alloc+0x210/0x210 [ 2419.856934][ T7811] ? _raw_spin_unlock+0x24/0x40 [ 2419.861814][ T7811] ? __pud_alloc+0x1d1/0x210 [ 2419.866440][ T7811] ? handle_mm_fault+0x5950/0x5950 19:12:39 executing program 4: getsockopt$PNPIPE_INITSTATE(0xffffffffffffffff, 0x113, 0x4, &(0x7f0000000000), &(0x7f0000000140)=0x4) ioctl$IMDELTIMER(0xffffffffffffffff, 0x80044941, &(0x7f0000000200)=0x3) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) setsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, &(0x7f00000001c0), 0x4) r1 = accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000040)='./file0\x00', 0x0, 0x0, r1}, 0x18) setsockopt$PNPIPE_HANDLE(r1, 0x113, 0x3, &(0x7f0000000100)=0x40, 0x4) syz_clone3(&(0x7f00000011c0)={0xf6004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:12:39 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {0x7000}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) [ 2419.871595][ T7811] copy_page_range+0x3bbc/0x43b0 [ 2419.876573][ T7811] ? mark_lock+0x98/0x340 [ 2419.880973][ T7811] ? __lock_acquire+0x1ff0/0x1ff0 [ 2419.886019][ T7811] ? pfn_valid+0x1d0/0x1d0 [ 2419.890458][ T7811] ? rcu_lock_acquire+0x30/0x30 [ 2419.895333][ T7811] ? __lock_acquire+0x1ff0/0x1ff0 [ 2419.900385][ T7811] ? up_write+0x133/0x4d0 [ 2419.904767][ T7811] copy_mm+0xc64/0x1370 [ 2419.908968][ T7811] ? copy_signal+0x630/0x630 [ 2419.913583][ T7811] ? __init_rwsem+0x11e/0x160 [ 2419.918289][ T7811] ? copy_signal+0x529/0x630 [ 2419.922912][ T7811] copy_process+0x1816/0x3ef0 [ 2419.927649][ T7811] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2419.932793][ T7811] ? _copy_from_user+0x10f/0x170 [ 2419.937762][ T7811] kernel_clone+0x210/0x960 [ 2419.942294][ T7811] ? create_io_thread+0x1e0/0x1e0 [ 2419.947366][ T7811] __se_sys_clone3+0x3e1/0x430 [ 2419.952157][ T7811] ? __x64_sys_clone3+0x60/0x60 [ 2419.957062][ T7811] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2419.963065][ T7811] ? lockdep_hardirqs_on+0x94/0x130 [ 2419.968293][ T7811] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2419.974312][ T7811] do_syscall_64+0x3d/0xb0 [ 2419.978774][ T7811] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2419.984690][ T7811] RIP: 0033:0x7fa1e449cae9 [ 2419.989127][ T7811] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2420.008753][ T7811] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 19:12:40 executing program 3: keyctl$unlink(0x18, 0x0, 0x0) keyctl$unlink(0x18, 0x0, 0x0) (async) 19:12:40 executing program 1: r0 = add_key(&(0x7f0000000000)='.dead\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$link(0x8, r0, r0) [ 2420.017191][ T7811] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2420.025187][ T7811] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2420.033175][ T7811] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2420.041166][ T7811] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2420.049157][ T7811] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2420.057185][ T7811] 19:12:40 executing program 2: syz_io_uring_setup(0x886, &(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {0x10fff}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) [ 2420.093146][ T7811] ------------[ cut here ]------------ [ 2420.115453][ T7811] WARNING: CPU: 1 PID: 7811 at arch/x86/mm/pat/memtype.c:1099 untrack_pfn+0x30e/0x490 [ 2420.134043][ T7811] Modules linked in: [ 2420.138153][ T7811] CPU: 0 PID: 7811 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2420.159753][ T7811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2420.171115][ T7811] RIP: 0010:untrack_pfn+0x30e/0x490 [ 2420.177541][ T7811] Code: 8d 8c 24 a0 00 00 00 49 89 d8 e8 5d db 7e 00 49 89 dd 89 c3 31 ff 89 c6 e8 af ac 45 00 85 db 0f 84 b2 00 00 00 e8 42 a9 45 00 <0f> 0b 48 bb 00 00 00 00 00 fc ff df eb 4f 48 b8 00 00 00 00 00 fc [ 2420.197487][ T7811] RSP: 0018:ffffc9000db1f480 EFLAGS: 00010246 [ 2420.209367][ T7811] RAX: ffffffff813a790e RBX: 00000000ffffffea RCX: 0000000000040000 [ 2420.225139][ T7811] RDX: ffffc90005f11000 RSI: 000000000003ffff RDI: 0000000000040000 [ 2420.233310][ T7811] RBP: ffffc9000db1f588 R08: ffffffff813a7901 R09: ffffc9000db1f400 [ 2420.241563][ T7811] R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff1100bb7dc84 [ 2420.249602][ T7811] R13: ffffc9000db1f500 R14: dffffc0000000000 R15: ffff88805dbee420 [ 2420.257816][ T7811] FS: 00007fa1e2a1e6c0(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 [ 2420.267006][ T7811] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2420.274554][ T7811] CR2: 00007f205ac02000 CR3: 000000003cd60000 CR4: 00000000003506f0 [ 2420.283538][ T7811] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2420.291630][ T7811] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2420.299701][ T7811] Call Trace: [ 2420.303134][ T7811] [ 2420.306145][ T7811] ? __warn+0x15b/0x300 [ 2420.310394][ T7811] ? untrack_pfn+0x30e/0x490 [ 2420.315039][ T7811] ? report_bug+0x1b7/0x2e0 [ 2420.319591][ T7811] ? handle_bug+0x3d/0x70 [ 2420.324051][ T7811] ? exc_invalid_op+0x16/0x40 [ 2420.328780][ T7811] ? asm_exc_invalid_op+0x16/0x20 [ 2420.333892][ T7811] ? untrack_pfn+0x301/0x490 [ 2420.338527][ T7811] ? untrack_pfn+0x30e/0x490 [ 2420.343355][ T7811] ? untrack_pfn+0x30e/0x490 [ 2420.348077][ T7811] ? track_pfn_insert+0x90/0x90 [ 2420.353096][ T7811] ? mmu_notifier_invalidate_range_end+0xf0/0xf0 [ 2420.359560][ T7811] ? __pagevec_lru_add+0x1584/0x18d0 [ 2420.365131][ T7811] ? __lock_acquire+0x1ff0/0x1ff0 [ 2420.370589][ T7811] ? uprobe_munmap+0x17a/0x400 [ 2420.375587][ T7811] unmap_single_vma+0x1d8/0x2d0 [ 2420.382619][ T7811] unmap_vmas+0x1f8/0x390 [ 2420.387114][ T7811] ? unmap_page_range+0x2630/0x2630 [ 2420.393420][ T7811] ? tlb_gather_mmu_fullmm+0x159/0x200 [ 2420.399068][ T7811] exit_mmap+0x3b6/0x670 [ 2420.403860][ T7811] ? vm_brk+0x20/0x20 [ 2420.407990][ T7811] ? uprobe_clear_state+0x304/0x460 [ 2420.413743][ T7811] __mmput+0x112/0x3b0 [ 2420.417961][ T7811] copy_mm+0x100d/0x1370 [ 2420.422704][ T7811] ? copy_signal+0x630/0x630 [ 2420.427433][ T7811] ? __init_rwsem+0x11e/0x160 [ 2420.432632][ T7811] ? copy_signal+0x529/0x630 [ 2420.437363][ T7811] copy_process+0x1816/0x3ef0 [ 2420.442580][ T7811] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2420.447822][ T7811] ? _copy_from_user+0x10f/0x170 [ 2420.453290][ T7811] kernel_clone+0x210/0x960 [ 2420.457944][ T7811] ? create_io_thread+0x1e0/0x1e0 [ 2420.463587][ T7811] __se_sys_clone3+0x3e1/0x430 [ 2420.468491][ T7811] ? __x64_sys_clone3+0x60/0x60 [ 2420.473853][ T7811] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2420.481075][ T7811] ? lockdep_hardirqs_on+0x94/0x130 [ 2420.486457][ T7811] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2420.492660][ T7811] do_syscall_64+0x3d/0xb0 [ 2420.497210][ T7811] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2420.503935][ T7811] RIP: 0033:0x7fa1e449cae9 [ 2420.508515][ T7811] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2420.528442][ T7811] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2420.538092][ T7811] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2420.546929][ T7811] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2420.555045][ T7811] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2420.563119][ T7811] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2420.571235][ T7811] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2420.579339][ T7811] [ 2420.583894][ T7811] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 2420.591198][ T7811] CPU: 0 PID: 7811 Comm: syz-executor.0 Not tainted 5.15.138-syzkaller #0 [ 2420.599686][ T7811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2420.609730][ T7811] Call Trace: [ 2420.613001][ T7811] [ 2420.615921][ T7811] dump_stack_lvl+0x1e3/0x2cb [ 2420.620606][ T7811] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 2420.626237][ T7811] ? panic+0x84d/0x84d [ 2420.630309][ T7811] ? untrack_pfn+0x300/0x490 [ 2420.634895][ T7811] ? untrack_pfn+0x300/0x490 [ 2420.639476][ T7811] panic+0x318/0x84d [ 2420.643383][ T7811] ? __warn+0x16a/0x300 [ 2420.647561][ T7811] ? fb_is_primary_device+0xcc/0xcc [ 2420.652785][ T7811] ? untrack_pfn+0x30e/0x490 [ 2420.657385][ T7811] __warn+0x2b2/0x300 [ 2420.661365][ T7811] ? untrack_pfn+0x30e/0x490 [ 2420.665947][ T7811] report_bug+0x1b7/0x2e0 [ 2420.670267][ T7811] handle_bug+0x3d/0x70 [ 2420.674444][ T7811] exc_invalid_op+0x16/0x40 [ 2420.678968][ T7811] asm_exc_invalid_op+0x16/0x20 [ 2420.683815][ T7811] RIP: 0010:untrack_pfn+0x30e/0x490 [ 2420.689035][ T7811] Code: 8d 8c 24 a0 00 00 00 49 89 d8 e8 5d db 7e 00 49 89 dd 89 c3 31 ff 89 c6 e8 af ac 45 00 85 db 0f 84 b2 00 00 00 e8 42 a9 45 00 <0f> 0b 48 bb 00 00 00 00 00 fc ff df eb 4f 48 b8 00 00 00 00 00 fc [ 2420.708667][ T7811] RSP: 0018:ffffc9000db1f480 EFLAGS: 00010246 [ 2420.714731][ T7811] RAX: ffffffff813a790e RBX: 00000000ffffffea RCX: 0000000000040000 [ 2420.722780][ T7811] RDX: ffffc90005f11000 RSI: 000000000003ffff RDI: 0000000000040000 [ 2420.730745][ T7811] RBP: ffffc9000db1f588 R08: ffffffff813a7901 R09: ffffc9000db1f400 [ 2420.738887][ T7811] R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff1100bb7dc84 [ 2420.746863][ T7811] R13: ffffc9000db1f500 R14: dffffc0000000000 R15: ffff88805dbee420 [ 2420.754857][ T7811] ? untrack_pfn+0x301/0x490 [ 2420.759477][ T7811] ? untrack_pfn+0x30e/0x490 [ 2420.764079][ T7811] ? track_pfn_insert+0x90/0x90 [ 2420.768940][ T7811] ? mmu_notifier_invalidate_range_end+0xf0/0xf0 [ 2420.775277][ T7811] ? __pagevec_lru_add+0x1584/0x18d0 [ 2420.780567][ T7811] ? __lock_acquire+0x1ff0/0x1ff0 [ 2420.785586][ T7811] ? uprobe_munmap+0x17a/0x400 [ 2420.790376][ T7811] unmap_single_vma+0x1d8/0x2d0 [ 2420.795260][ T7811] unmap_vmas+0x1f8/0x390 [ 2420.799614][ T7811] ? unmap_page_range+0x2630/0x2630 [ 2420.804831][ T7811] ? tlb_gather_mmu_fullmm+0x159/0x200 [ 2420.810396][ T7811] exit_mmap+0x3b6/0x670 [ 2420.814632][ T7811] ? vm_brk+0x20/0x20 [ 2420.818611][ T7811] ? uprobe_clear_state+0x304/0x460 [ 2420.823802][ T7811] __mmput+0x112/0x3b0 [ 2420.827867][ T7811] copy_mm+0x100d/0x1370 [ 2420.832115][ T7811] ? copy_signal+0x630/0x630 [ 2420.836701][ T7811] ? __init_rwsem+0x11e/0x160 [ 2420.841380][ T7811] ? copy_signal+0x529/0x630 [ 2420.845989][ T7811] copy_process+0x1816/0x3ef0 [ 2420.850692][ T7811] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 2420.855809][ T7811] ? _copy_from_user+0x10f/0x170 [ 2420.860742][ T7811] kernel_clone+0x210/0x960 [ 2420.865249][ T7811] ? create_io_thread+0x1e0/0x1e0 [ 2420.870279][ T7811] __se_sys_clone3+0x3e1/0x430 [ 2420.875061][ T7811] ? __x64_sys_clone3+0x60/0x60 [ 2420.879946][ T7811] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2420.885914][ T7811] ? lockdep_hardirqs_on+0x94/0x130 [ 2420.891114][ T7811] ? syscall_enter_from_user_mode+0x2e/0x230 [ 2420.897125][ T7811] do_syscall_64+0x3d/0xb0 [ 2420.901564][ T7811] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2420.907467][ T7811] RIP: 0033:0x7fa1e449cae9 [ 2420.911874][ T7811] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2420.931471][ T7811] RSP: 002b:00007fa1e2a1df98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2420.939872][ T7811] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fa1e449cae9 [ 2420.947854][ T7811] RDX: 00007fa1e2a1dfb0 RSI: 0000000000000058 RDI: 00007fa1e2a1dfb0 [ 2420.955847][ T7811] RBP: 00007fa1e2a1e120 R08: 0000000000000000 R09: 0000000000000058 [ 2420.963809][ T7811] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2420.971783][ T7811] R13: 000000000000000b R14: 00007fa1e45bbf80 R15: 00007fff9ee6cff8 [ 2420.979754][ T7811] [ 2420.983019][ T7811] Kernel Offset: disabled [ 2420.987342][ T7811] Rebooting in 86400 seconds..