[ 1655.196483][T24630] ? __cond_resched+0x11/0x40 [ 1655.201141][T24630] ksys_read+0xce/0x180 [ 1655.205279][T24630] __x64_sys_read+0x3e/0x50 [ 1655.209766][T24630] do_syscall_64+0x3d/0x90 [ 1655.214165][T24630] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1655.220044][T24630] RIP: 0033:0x41936c [ 1655.223915][T24630] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1655.243564][T24630] RSP: 002b:00007f0e3f606170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1655.251957][T24630] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041936c [ 1655.260260][T24630] RDX: 000000000000000f RSI: 00007f0e3f6061e0 RDI: 0000000000000003 [ 1655.268217][T24630] RBP: 00007f0e3f6061d0 R08: 0000000000000000 R09: 0000000000000000 17:08:30 executing program 5: semop(0x0, 0x0, 0x1f4) r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_STAT(r0, 0x1, 0x12, &(0x7f0000000000)=""/238) 17:08:30 executing program 2: semop(0x0, 0x0, 0x1a) r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_STAT(r0, 0x3, 0x12, &(0x7f0000000000)=""/116) [ 1655.276176][T24630] R10: 0000000000002000 R11: 0000000000000246 R12: 0000000000000001 [ 1655.284128][T24630] R13: 00007ffde72c5f6f R14: 00007f0e3f606300 R15: 0000000000022000 17:08:30 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 17:08:30 executing program 4 (fault-call:3 fault-nth:3): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:30 executing program 5: semop(0x0, 0x0, 0x0) [ 1655.392336][T24646] FAULT_INJECTION: forcing a failure. [ 1655.392336][T24646] name failslab, interval 1, probability 0, space 0, times 0 [ 1655.405110][T24646] CPU: 1 PID: 24646 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1655.413857][T24646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1655.423911][T24646] Call Trace: [ 1655.427179][T24646] dump_stack_lvl+0xb7/0x103 [ 1655.431753][T24646] dump_stack+0x11/0x1a [ 1655.435967][T24646] should_fail+0x23c/0x250 [ 1655.440386][T24646] ? dup_fd+0x48/0x6e0 [ 1655.444436][T24646] __should_failslab+0x81/0x90 [ 1655.449237][T24646] should_failslab+0x5/0x20 [ 1655.453743][T24646] kmem_cache_alloc+0x46/0x2e0 [ 1655.458497][T24646] ? avc_has_perm+0x59/0x150 [ 1655.463125][T24646] dup_fd+0x48/0x6e0 [ 1655.467001][T24646] ? selinux_task_alloc+0x6f/0x80 [ 1655.472011][T24646] copy_process+0xd77/0x2f70 [ 1655.476578][T24646] kernel_clone+0x14b/0x680 [ 1655.481058][T24646] ? __fget_light+0x21b/0x260 [ 1655.485712][T24646] __do_sys_fork+0x3a/0x60 [ 1655.490106][T24646] do_syscall_64+0x3d/0x90 [ 1655.494506][T24646] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1655.500391][T24646] RIP: 0033:0x4665e9 [ 1655.504275][T24646] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1655.523868][T24646] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1655.532318][T24646] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 17:08:30 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{0x1, 0x100, 0x1800}, {0x1, 0x0, 0x800}, {0x4, 0x5, 0x1000}, {0x1, 0x101, 0x800}], 0x4) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) 17:08:30 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0xf0ff7f, 0x2000, 0x0, 0x0) 17:08:30 executing program 2: r0 = semget(0x1, 0x3, 0x410) semop(r0, 0x0, 0x0) 17:08:30 executing program 5: semop(0x0, 0x0, 0x1f4) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/236}, 0xf4, 0x2, 0x3000) [ 1655.540268][T24646] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1655.548219][T24646] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1655.556214][T24646] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1655.564394][T24646] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:30 executing program 1: clock_nanosleep(0x0, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) 17:08:30 executing program 4 (fault-call:3 fault-nth:4): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:30 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x1000000, 0x2000, 0x0, 0x0) 17:08:30 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f00000000c0), r1) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000003c0)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(r1, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x44, 0x0, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x48085}, 0x48040) sendmsg$NLBL_CALIPSO_C_LISTALL(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r2, 0x1}, 0x14}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r6, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r7, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0x38}}, 0x10) sendmsg$NL802154_CMD_SET_PAN_ID(r5, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x54, r7, 0xa00, 0x70bd25, 0x25dfdbfe, {}, [@NL802154_ATTR_PAN_ID={0x6, 0x9, 0x1}, @NL802154_ATTR_PAN_ID={0x6}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x4c041}, 0x40880) sendmsg$NLBL_CALIPSO_C_LISTALL(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x2c, r2, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x81) r8 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r8, 0x3, 0x14, &(0x7f0000000080)=""/83) semop(r8, 0x0, 0x0) 17:08:30 executing program 5: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semop(0x0, 0x0, 0x0) 17:08:30 executing program 0: r0 = socket(0x3, 0x6, 0xff) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001200)={'syztnl2\x00', &(0x7f0000001140)={'gretap0\x00', 0x0, 0x7800, 0x10, 0x4, 0x7, {{0x22, 0x4, 0x0, 0x8, 0x88, 0x67, 0x0, 0x3, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x3c}, @private=0xa010101, {[@end, @lsrr={0x83, 0x17, 0x8f, [@dev={0xac, 0x14, 0x14, 0xa}, @empty, @rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0x29}, @remote]}, @timestamp_prespec={0x44, 0x1c, 0xd3, 0x3, 0x3, [{@remote, 0x1000}, {@local, 0x8000}, {@multicast2, 0xd3}]}, @timestamp_prespec={0x44, 0x2c, 0xa, 0x3, 0x1, [{@loopback, 0x3f}, {@multicast1, 0xffffffe1}, {@empty, 0x6}, {@dev={0xac, 0x14, 0x14, 0x3b}}, {@local, 0x5}]}, @end, @generic={0x89, 0x4, "c949"}, @ssrr={0x89, 0xf, 0x18, [@broadcast, @broadcast, @broadcast]}]}}}}}) r1 = semget$private(0x0, 0x4, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000012c0), 0x240, 0x0) sendto$packet(r2, &(0x7f0000001300)="9774f7c45428a50312a17f88201f121a26df4b23ccbbf7e3bbebf0f79821de3294b3fb86286eac8e35c772ed84d2a2390e89db82e426a10e2198faaf50da0ff5e6f6bfeab0568dbde2179a427ca7ad650386", 0x52, 0x4001, 0x0, 0x0) semop(r1, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000001280)={'gretap0\x00', &(0x7f0000001240)={'gretap0\x00', 0x0, 0x10, 0x10, 0xffffffff, 0xc80dd11, {{0x6, 0x4, 0x2, 0x1, 0x18, 0x65, 0x0, 0x4, 0x4, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@end]}}}}}) semctl$GETNCNT(r1, 0x1, 0xe, 0x0) r3 = semget(0x1, 0x0, 0x82) semctl$GETVAL(0xffffffffffffffff, 0x3, 0xc, &(0x7f0000001040)=""/252) semctl$GETNCNT(r3, 0x4, 0xe, &(0x7f0000000040)=""/4096) [ 1655.771036][T24672] FAULT_INJECTION: forcing a failure. [ 1655.771036][T24672] name failslab, interval 1, probability 0, space 0, times 0 [ 1655.783676][T24672] CPU: 1 PID: 24672 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1655.792435][T24672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1655.802516][T24672] Call Trace: [ 1655.805850][T24672] dump_stack_lvl+0xb7/0x103 [ 1655.810440][T24672] dump_stack+0x11/0x1a [ 1655.814672][T24672] should_fail+0x23c/0x250 17:08:30 executing program 5: semop(0x0, 0x0, 0x1f4) semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0xfffa, 0x800}, {0x3, 0x0, 0x1000}, {0x0, 0xff, 0x1000}, {0x1, 0x9, 0x1000}], 0x4, &(0x7f0000000040)) 17:08:31 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x7ffff000, 0x2000, 0x0, 0x0) 17:08:31 executing program 4 (fault-call:3 fault-nth:5): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() [ 1655.819087][T24672] __should_failslab+0x81/0x90 [ 1655.823940][T24672] should_failslab+0x5/0x20 [ 1655.828460][T24672] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 1655.828555][T24672] ? __kmalloc_node+0x30/0x40 [ 1655.828579][T24672] ? __get_vm_area_node+0x226/0x260 17:08:31 executing program 2: semop(0x0, 0x0, 0x1a) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='-]@\x00', 0xfffffffffffffff9) 17:08:31 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x7ffffffff000, 0x2000, 0x0, 0x0) 17:08:31 executing program 5: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semop(r0, 0x0, 0x0) [ 1655.828642][T24672] __kmalloc_node+0x30/0x40 [ 1655.828660][T24672] __vmalloc_node_range+0x23a/0x5a0 [ 1655.828679][T24672] dup_task_struct+0x470/0x630 [ 1655.828695][T24672] ? copy_process+0x3ff/0x2f70 [ 1655.828709][T24672] copy_process+0x3ff/0x2f70 [ 1655.828727][T24672] ? fsnotify_perm+0x59/0x2e0 [ 1655.828746][T24672] ? get_pid_task+0x8b/0xc0 [ 1655.828809][T24672] kernel_clone+0x14b/0x680 [ 1655.828826][T24672] ? __fget_light+0x21b/0x260 [ 1655.828840][T24672] __do_sys_fork+0x3a/0x60 [ 1655.828856][T24672] do_syscall_64+0x3d/0x90 [ 1655.828873][T24672] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1655.828912][T24672] RIP: 0033:0x4665e9 [ 1655.828923][T24672] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1655.828995][T24672] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1655.829013][T24672] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1655.829025][T24672] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1655.829037][T24672] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1655.829048][T24672] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1655.829060][T24672] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 [ 1655.902506][T24697] FAULT_INJECTION: forcing a failure. [ 1655.902506][T24697] name failslab, interval 1, probability 0, space 0, times 0 [ 1655.902530][T24697] CPU: 1 PID: 24697 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1655.902547][T24697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1655.902556][T24697] Call Trace: [ 1655.902562][T24697] dump_stack_lvl+0xb7/0x103 [ 1655.902580][T24697] dump_stack+0x11/0x1a [ 1655.902596][T24697] should_fail+0x23c/0x250 [ 1655.902625][T24697] __should_failslab+0x81/0x90 [ 1655.902643][T24697] should_failslab+0x5/0x20 [ 1655.902661][T24697] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 1655.902687][T24697] ? should_fail+0xd6/0x250 [ 1655.902758][T24697] ? __kmalloc_node+0x30/0x40 [ 1655.902780][T24697] __kmalloc_node+0x30/0x40 [ 1655.902834][T24697] kvmalloc_node+0x81/0xf0 [ 1655.902853][T24697] alloc_fdtable+0xae/0x1b0 [ 1655.902873][T24697] dup_fd+0x548/0x6e0 [ 1655.902892][T24697] copy_process+0xd77/0x2f70 [ 1655.902989][T24697] kernel_clone+0x14b/0x680 [ 1655.903034][T24697] ? __fget_light+0x21b/0x260 [ 1655.903125][T24697] __do_sys_fork+0x3a/0x60 [ 1655.903142][T24697] do_syscall_64+0x3d/0x90 [ 1655.903163][T24697] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1655.903187][T24697] RIP: 0033:0x4665e9 [ 1655.903199][T24697] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1655.903239][T24697] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1655.903255][T24697] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1655.903265][T24697] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1655.903277][T24697] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1655.903289][T24697] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1655.903354][T24697] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:31 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, 0x0, 0x0) 17:08:31 executing program 4 (fault-call:3 fault-nth:6): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:31 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0xf0ff7f00000000, 0x2000, 0x0, 0x0) 17:08:31 executing program 2: semop(0x0, 0x0, 0x1a) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x3, 0x4) 17:08:31 executing program 5: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r0, 0x8, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0xc084}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x29, 0x4a, &(0x7f0000000000), 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_GET(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x60, r0, 0x0, 0x70bd25, 0x25dfdbfc, {}, [{@nsim={{0xe}, {0xd, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x10000004}}, {@pci, {0x8, 0xb, 0x1fd}}, {@pci, {0x0, 0xb, 0x2}}]}, 0x60}, 0x1, 0x0, 0x0, 0x14}, 0x400c801) semop(0x0, 0x0, 0x1f4) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r3, 0x0, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x5, &(0x7f0000000180)=0x6, 0x4) 17:08:31 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000040)) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) 17:08:31 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, 0x0, 0x0) 17:08:31 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, 0x0, 0x0) [ 1656.654370][T24724] FAULT_INJECTION: forcing a failure. [ 1656.654370][T24724] name failslab, interval 1, probability 0, space 0, times 0 [ 1656.667041][T24724] CPU: 0 PID: 24724 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1656.675876][T24724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1656.685926][T24724] Call Trace: [ 1656.689199][T24724] dump_stack_lvl+0xb7/0x103 [ 1656.693792][T24724] dump_stack+0x11/0x1a [ 1656.697937][T24724] should_fail+0x23c/0x250 17:08:31 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0xf0ffffff7f0000, 0x2000, 0x0, 0x0) [ 1656.702358][T24724] ? prepare_creds+0x2a/0x430 [ 1656.707078][T24724] __should_failslab+0x81/0x90 [ 1656.711969][T24724] should_failslab+0x5/0x20 [ 1656.716466][T24724] kmem_cache_alloc+0x46/0x2e0 [ 1656.721232][T24724] ? __mod_node_page_state+0x18/0x80 [ 1656.726579][T24724] prepare_creds+0x2a/0x430 [ 1656.731091][T24724] copy_creds+0xdd/0x530 [ 1656.735331][T24724] ? dup_task_struct+0x608/0x630 [ 1656.740264][T24724] copy_process+0x669/0x2f70 [ 1656.744915][T24724] ? fsnotify_perm+0x59/0x2e0 [ 1656.749653][T24724] ? get_pid_task+0x8b/0xc0 17:08:31 executing program 2: semop(0xffffffffffffffff, 0x0, 0x0) alarm(0x6) 17:08:31 executing program 2: semop(0x0, 0x0, 0x1a) semop(0x0, &(0x7f0000000000)=[{0x0, 0x44a, 0x1000}, {0x1, 0x4, 0x1800}], 0x2) [ 1656.754161][T24724] kernel_clone+0x14b/0x680 [ 1656.758840][T24724] ? __fget_light+0x21b/0x260 [ 1656.763583][T24724] __do_sys_fork+0x3a/0x60 [ 1656.768025][T24724] do_syscall_64+0x3d/0x90 [ 1656.772442][T24724] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1656.778337][T24724] RIP: 0033:0x4665e9 [ 1656.782234][T24724] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 17:08:31 executing program 2: semop(0x0, 0x0, 0x1a) semctl$SEM_STAT_ANY(0x0, 0x0, 0x14, &(0x7f0000000000)=""/25) r0 = semget(0x3, 0x3, 0x200) semctl$GETNCNT(r0, 0x4, 0xe, &(0x7f0000000100)=""/133) r1 = semget(0x0, 0x1, 0x1a) semctl$GETNCNT(r1, 0x0, 0xe, &(0x7f00000001c0)=""/249) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$IPC_RMID(r1, 0x0, 0x0) 17:08:32 executing program 1: r0 = socket(0x3, 0x6, 0xff) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001200)={'syztnl2\x00', &(0x7f0000001140)={'gretap0\x00', 0x0, 0x7800, 0x10, 0x4, 0x7, {{0x22, 0x4, 0x0, 0x8, 0x88, 0x67, 0x0, 0x3, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x3c}, @private=0xa010101, {[@end, @lsrr={0x83, 0x17, 0x8f, [@dev={0xac, 0x14, 0x14, 0xa}, @empty, @rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0x29}, @remote]}, @timestamp_prespec={0x44, 0x1c, 0xd3, 0x3, 0x3, [{@remote, 0x1000}, {@local, 0x8000}, {@multicast2, 0xd3}]}, @timestamp_prespec={0x44, 0x2c, 0xa, 0x3, 0x1, [{@loopback, 0x3f}, {@multicast1, 0xffffffe1}, {@empty, 0x6}, {@dev={0xac, 0x14, 0x14, 0x3b}}, {@local, 0x5}]}, @end, @generic={0x89, 0x4, "c949"}, @ssrr={0x89, 0xf, 0x18, [@broadcast, @broadcast, @broadcast]}]}}}}}) r1 = semget$private(0x0, 0x4, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000012c0), 0x240, 0x0) sendto$packet(r2, &(0x7f0000001300)="9774f7c45428a50312a17f88201f121a26df4b23ccbbf7e3bbebf0f79821de3294b3fb86286eac8e35c772ed84d2a2390e89db82e426a10e2198faaf50da0ff5e6f6bfeab0568dbde2179a427ca7ad650386", 0x52, 0x4001, 0x0, 0x0) semop(r1, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000001280)={'gretap0\x00', &(0x7f0000001240)={'gretap0\x00', 0x0, 0x10, 0x10, 0xffffffff, 0xc80dd11, {{0x6, 0x4, 0x2, 0x1, 0x18, 0x65, 0x0, 0x4, 0x4, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@end]}}}}}) semctl$GETNCNT(r1, 0x1, 0xe, 0x0) r3 = semget(0x1, 0x0, 0x82) semctl$GETVAL(0xffffffffffffffff, 0x3, 0xc, &(0x7f0000001040)=""/252) semctl$GETNCNT(r3, 0x4, 0xe, &(0x7f0000000040)=""/4096) [ 1656.801978][T24724] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1656.810377][T24724] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1656.818362][T24724] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1656.826322][T24724] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1656.834426][T24724] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1656.842402][T24724] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:32 executing program 4 (fault-call:3 fault-nth:7): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:32 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x100000000000000, 0x2000, 0x0, 0x0) 17:08:32 executing program 2: r0 = semget$private(0x0, 0x2, 0x410) semop(r0, 0x0, 0xfffffcf9) [ 1656.936549][T24761] FAULT_INJECTION: forcing a failure. [ 1656.936549][T24761] name failslab, interval 1, probability 0, space 0, times 0 [ 1656.949197][T24761] CPU: 1 PID: 24761 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1656.958043][T24761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1656.968101][T24761] Call Trace: [ 1656.971374][T24761] dump_stack_lvl+0xb7/0x103 [ 1656.975966][T24761] dump_stack+0x11/0x1a [ 1656.980166][T24761] should_fail+0x23c/0x250 17:08:32 executing program 5: clock_adjtime(0x1, &(0x7f0000000300)={0x10001, 0x0, 0xffffffffffffff01, 0x8, 0x9, 0x40, 0x7ff, 0x7, 0x60000, 0xffffffffffffffff, 0x0, 0x80000001, 0x4, 0x7f1, 0x5, 0x6, 0x8, 0x6, 0x5, 0xa286, 0x1, 0x2, 0x800, 0x10001, 0x3, 0x24}) semop(0x0, 0x0, 0x1f4) clock_gettime(0x2, &(0x7f0000000000)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r2, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0x38}}, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wpan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_GET_SEC_KEY(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00012bbd7000ffdbdf25160000000c000600010000000100000008000300", @ANYRES32=r3, @ANYBLOB="0c000600000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="4a566ee3069c065ec6223c3c75145947bda88fdb8718f6a2b0cec03ea5e2f8bf98c5a8a9aa529443f4c5df1f1b29", @ANYRES32=r4, @ANYBLOB], 0x44}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r5 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r5, 0x3, 0x14, &(0x7f0000000080)=""/83) semop(r5, &(0x7f0000000040)=[{0x4, 0xfffd, 0xc00}, {0x3, 0x0, 0x1000}, {0x2, 0x1, 0x1800}, {0x2, 0xfda3, 0x1000}, {0x0, 0xf9}, {0x2, 0x9}], 0x6) semctl$GETNCNT(r5, 0x4, 0xe, &(0x7f0000000600)=""/92) semctl$GETALL(r5, 0x0, 0xd, &(0x7f0000000100)=""/21) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000440), r0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000480)={'wpan1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000004c0)={'wpan4\x00', 0x0}) sendmsg$IEEE802154_LLSEC_GETPARAMS(r1, &(0x7f00000005c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000580)={&(0x7f0000000680)=ANY=[@ANYBLOB="ae88500b3a81098f5f5659580ba7281dfef2a162d5719a91d78c", @ANYRES16=r6, @ANYBLOB="00012cbd7000fedbdf252400000008000200", @ANYRES32=r4, @ANYBLOB="0a0001007770616e3000000008000200", @ANYRES32=r4, @ANYBLOB="0a0001007770616e3400000008000200", @ANYRES32=r3, @ANYBLOB="08000200", @ANYRES32=r7, @ANYBLOB="0a0001007770616e310000000a0001005870616e3000000008000200", @ANYRES32=r8, @ANYBLOB], 0x6c}, 0x1, 0x0, 0x0, 0x20000004}, 0x80) [ 1656.984583][T24761] ? kzalloc+0x1d/0x30 [ 1656.988643][T24761] __should_failslab+0x81/0x90 [ 1656.993395][T24761] should_failslab+0x5/0x20 [ 1656.997919][T24761] __kmalloc+0x66/0x340 [ 1657.002078][T24761] ? should_fail+0xd6/0x250 [ 1657.006638][T24761] kzalloc+0x1d/0x30 [ 1657.010549][T24761] security_prepare_creds+0x44/0x1a0 [ 1657.015954][T24761] prepare_creds+0x2d2/0x430 [ 1657.020550][T24761] copy_creds+0xdd/0x530 [ 1657.024785][T24761] ? dup_task_struct+0x608/0x630 [ 1657.029713][T24761] copy_process+0x669/0x2f70 [ 1657.034305][T24761] ? fsnotify_perm+0x59/0x2e0 [ 1657.039591][T24761] ? get_pid_task+0x8b/0xc0 [ 1657.044122][T24761] kernel_clone+0x14b/0x680 [ 1657.048684][T24761] ? __fget_light+0x21b/0x260 [ 1657.053384][T24761] __do_sys_fork+0x3a/0x60 [ 1657.057796][T24761] do_syscall_64+0x3d/0x90 [ 1657.062248][T24761] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1657.068172][T24761] RIP: 0033:0x4665e9 [ 1657.072058][T24761] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1657.091660][T24761] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1657.100104][T24761] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1657.108074][T24761] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1657.116027][T24761] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1657.124001][T24761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1657.131960][T24761] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:32 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000), 0x0) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) 17:08:32 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0xf0ff7f) 17:08:32 executing program 2: getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000000)=""/25, &(0x7f0000000040)=0x19) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) r1 = socket(0x27, 0x80000, 0x8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000180)={0x9b, 0x3, 0x4, 0x6, 0x231f}, 0x14) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000100)=0x10) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080)=@gcm_128={{0x304}, "edc10a2622331bfb", "1a7426da7262bf7d4263a097ec0b6081", "15badc58", "9e31f8944a7a5314"}, 0x28) 17:08:32 executing program 5: semop(0x0, 0x0, 0x1f4) r0 = semget(0x3, 0x1, 0x224) semctl$GETNCNT(r0, 0x1, 0xe, &(0x7f0000000000)=""/4096) r1 = semget(0x2, 0x3, 0x10) semctl$SEM_STAT(r1, 0x1, 0x12, &(0x7f0000001000)) 17:08:32 executing program 4 (fault-call:3 fault-nth:8): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:32 executing program 2: r0 = semget(0x0, 0x1, 0x1a) r1 = semget$private(0x0, 0x2, 0x4) semctl$GETPID(r1, 0x0, 0xb, &(0x7f0000000100)=""/160) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semop(r0, 0x0, 0x0) semctl$GETNCNT(r0, 0x2, 0xe, &(0x7f00000001c0)=""/204) [ 1657.529606][T24787] FAULT_INJECTION: forcing a failure. [ 1657.529606][T24787] name failslab, interval 1, probability 0, space 0, times 0 [ 1657.542472][T24787] CPU: 1 PID: 24787 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1657.551251][T24787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1657.561301][T24787] Call Trace: [ 1657.564604][T24787] dump_stack_lvl+0xb7/0x103 [ 1657.569188][T24787] dump_stack+0x11/0x1a [ 1657.573339][T24787] should_fail+0x23c/0x250 17:08:32 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x1000000) [ 1657.577809][T24787] ? dup_fd+0x48/0x6e0 [ 1657.581870][T24787] __should_failslab+0x81/0x90 [ 1657.586651][T24787] should_failslab+0x5/0x20 [ 1657.591174][T24787] kmem_cache_alloc+0x46/0x2e0 [ 1657.596019][T24787] ? avc_has_perm+0x59/0x150 [ 1657.600668][T24787] dup_fd+0x48/0x6e0 [ 1657.604561][T24787] ? selinux_task_alloc+0x6f/0x80 [ 1657.609584][T24787] copy_process+0xd77/0x2f70 [ 1657.614218][T24787] kernel_clone+0x14b/0x680 [ 1657.618718][T24787] ? __fget_light+0x21b/0x260 [ 1657.623383][T24787] __do_sys_fork+0x3a/0x60 [ 1657.627856][T24787] do_syscall_64+0x3d/0x90 [ 1657.632274][T24787] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1657.638256][T24787] RIP: 0033:0x4665e9 [ 1657.642141][T24787] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1657.661739][T24787] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1657.670217][T24787] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 17:08:32 executing program 1 (fault-call:0 fault-nth:0): clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) 17:08:32 executing program 2: sendmsg$NL802154_CMD_SET_TX_POWER(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x80) semop(0x0, 0x0, 0x1a) r0 = semget(0x0, 0x1, 0x1a) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r3, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x4}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x38}}, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_NEW_INTERFACE(r1, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x28, r3, 0x100, 0x70bd27, 0x25dfdbfc, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}]}, 0x28}, 0x1, 0x0, 0x0, 0x4004000}, 0x24004000) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) r5 = semget(0x2, 0x3, 0x0) semctl$IPC_RMID(r5, 0x0, 0x0) r6 = semget$private(0x0, 0x0, 0x2d) semctl$SETALL(r6, 0x0, 0x11, &(0x7f0000000040)=[0x1f, 0xa4]) semctl$SETVAL(r0, 0x3, 0x10, &(0x7f0000000100)=0xfffffffc) r7 = semget$private(0x0, 0x1, 0x781) semctl$GETALL(r7, 0x0, 0xd, &(0x7f0000000400)=""/134) 17:08:32 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "7306b650189061c7", "9c11d20e5d9b359ecf16e6d84019b9a7", "31cd5b8b", "dbae632aa8714295"}, 0x28) semop(0x0, 0x0, 0x1f4) 17:08:32 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x7ffff000) [ 1657.678180][T24787] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1657.686140][T24787] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1657.694092][T24787] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1657.702245][T24787] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:32 executing program 0: r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r2 = fsmount(r1, 0x0, 0xa) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000640), r0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_GET(r4, &(0x7f0000000580)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0x100, r3, 0x10, 0x70bd2b, 0x25dfdbfd, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}]}, 0x100}}, 0x20000801) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r2, &(0x7f00000007c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000780)={&(0x7f0000000680)={0xfc, r3, 0x800, 0x70bd2c, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x401}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xffffffff}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x26}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4010}, 0x21082cd285189a34) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, r3, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}]}, 0x3c}}, 0x20004011) r5 = semget$private(0x0, 0x4, 0x0) sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000226bd7000fcdbdf25010000000800010001000000080001000200000008000200020000000800020002000000080001000200f34ae954252a2009e64a"], 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x20) semop(r5, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280), 0x701503, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r6, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000840)=ANY=[@ANYBLOB="4956f02dd9fc430c7e16a6c369ca5ccc01ace0146653e2b4baef3c4e1e5eb70d831a7dd6b0dcd4e513d472d1d546432493f86532154670d1c6aacd7217b96c253f545b20cdbdee6c89628e", @ANYRES16=r3, @ANYBLOB="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"], 0x15c}, 0x1, 0x0, 0x0, 0x801}, 0x4) semctl$GETNCNT(r5, 0x1, 0xe, 0x0) r7 = fsmount(r0, 0x1, 0xa) sendmsg$DEVLINK_CMD_SB_POOL_GET(r7, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000800)={&(0x7f0000000540)={0x40, r3, 0x900, 0x70bd2c, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}, {0x6, 0x11, 0x1}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4004000}, 0x1) [ 1657.754638][T24812] FAULT_INJECTION: forcing a failure. [ 1657.754638][T24812] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1657.767736][T24812] CPU: 1 PID: 24812 Comm: syz-executor.1 Not tainted 5.14.0-rc6-syzkaller #0 [ 1657.776532][T24812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1657.786595][T24812] Call Trace: [ 1657.789860][T24812] dump_stack_lvl+0xb7/0x103 [ 1657.794497][T24812] dump_stack+0x11/0x1a [ 1657.798647][T24812] should_fail+0x23c/0x250 17:08:32 executing program 5: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) r1 = semget$private(0x0, 0x0, 0x4) semctl$SEM_STAT(r0, 0x1, 0x12, &(0x7f0000000100)=""/135) semget$private(0x0, 0x2, 0xa2) semop(r1, 0x0, 0xdc77c2a914b4bc08) semctl$GETPID(r1, 0x1, 0xb, &(0x7f00000001c0)=""/195) 17:08:32 executing program 2: semop(0x0, 0x0, 0x1a) r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) clock_nanosleep(0xfffffffffffffffc, 0x0, &(0x7f0000000000), 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000000)=""/170) r1 = semget(0x2, 0x2, 0x1) semctl$SEM_STAT_ANY(r1, 0x1, 0x14, &(0x7f0000000100)=""/108) [ 1657.803065][T24812] should_fail_usercopy+0x16/0x20 [ 1657.808165][T24812] _copy_from_user+0x1c/0xd0 [ 1657.812754][T24812] get_timespec64+0x31/0xd0 [ 1657.817263][T24812] __x64_sys_clock_nanosleep+0x10c/0x220 [ 1657.822969][T24812] ? exit_to_user_mode_prepare+0x65/0x190 [ 1657.828778][T24812] do_syscall_64+0x3d/0x90 [ 1657.833212][T24812] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1657.839269][T24812] RIP: 0033:0x4665e9 [ 1657.843152][T24812] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1657.862776][T24812] RSP: 002b:00007ff7fc4c1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e6 [ 1657.871185][T24812] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1657.879173][T24812] RDX: 0000000020000000 RSI: 0000000000000000 RDI: 7ac95975953878d7 [ 1657.887135][T24812] RBP: 00007ff7fc4c11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1657.895096][T24812] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 17:08:33 executing program 2: semop(0x0, 0x0, 0x1a) r0 = semget(0x0, 0x3, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000000)=""/70) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r1, 0x0, 0x89) r2 = syz_genetlink_get_family_id$smc(&(0x7f00000000c0), 0xffffffffffffffff) r3 = semget$private(0x0, 0x3, 0x6) semctl$IPC_STAT(r3, 0x0, 0x2, &(0x7f0000000200)=""/90) sendmsg$SMC_PNETID_ADD(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="300626bd7000ffdbdf25020000000900030073797a310000000004230400010000000900030073797a31000000000d00010073797a32000000000900010073797a30000000000900030073797a3200000000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8c5) getpgid(0xffffffffffffffff) 17:08:33 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x7ffffffff000) [ 1657.903063][T24812] R13: 00007ffc49df4eff R14: 00007ff7fc4c1300 R15: 0000000000022000 17:08:33 executing program 4 (fault-call:3 fault-nth:9): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:33 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000040)={'tunl0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB='gre0\x00'/16, @ANYRES32=0x0, @ANYBLOB="0000000004450d001400670000002990787f000001e0000002c4154e33cf91c6cbc1a0240b4f8bd98ffe8511b21442b173009868f2aef7f025bf8903f4f652a009db678d"]}) semop(0x0, 0x0, 0x1f4) 17:08:33 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0xf0ff7f00000000) 17:08:33 executing program 1 (fault-call:0 fault-nth:1): clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) 17:08:33 executing program 2: semop(0x0, 0x0, 0x1a) r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETVAL(r0, 0x0, 0xc, &(0x7f0000000100)=""/13) semctl$SEM_STAT_ANY(r0, 0x0, 0x14, &(0x7f0000000000)=""/158) [ 1657.998541][T24853] FAULT_INJECTION: forcing a failure. [ 1657.998541][T24853] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1658.011758][T24853] CPU: 1 PID: 24853 Comm: syz-executor.1 Not tainted 5.14.0-rc6-syzkaller #0 [ 1658.020521][T24853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1658.026070][T24858] FAULT_INJECTION: forcing a failure. [ 1658.026070][T24858] name failslab, interval 1, probability 0, space 0, times 0 [ 1658.031352][T24853] Call Trace: [ 1658.031361][T24853] dump_stack_lvl+0xb7/0x103 [ 1658.031382][T24853] dump_stack+0x11/0x1a [ 1658.056137][T24853] should_fail+0x23c/0x250 [ 1658.060551][T24853] should_fail_usercopy+0x16/0x20 [ 1658.065578][T24853] _copy_to_user+0x1c/0x90 [ 1658.070003][T24853] simple_read_from_buffer+0xab/0x120 [ 1658.075358][T24853] proc_fail_nth_read+0xf6/0x140 [ 1658.080289][T24853] ? rw_verify_area+0x136/0x250 [ 1658.085122][T24853] ? proc_fault_inject_write+0x200/0x200 [ 1658.090747][T24853] vfs_read+0x154/0x5d0 [ 1658.094921][T24853] ? __fget_light+0x21b/0x260 [ 1658.099655][T24853] ? __cond_resched+0x11/0x40 [ 1658.104316][T24853] ksys_read+0xce/0x180 [ 1658.108454][T24853] __x64_sys_read+0x3e/0x50 [ 1658.112940][T24853] do_syscall_64+0x3d/0x90 [ 1658.117522][T24853] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1658.123399][T24853] RIP: 0033:0x41936c [ 1658.127288][T24853] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1658.147274][T24853] RSP: 002b:00007ff7fc4c1170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1658.155679][T24853] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041936c [ 1658.163701][T24853] RDX: 000000000000000f RSI: 00007ff7fc4c11e0 RDI: 0000000000000003 [ 1658.171653][T24853] RBP: 00007ff7fc4c11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1658.179606][T24853] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1658.187584][T24853] R13: 00007ffc49df4eff R14: 00007ff7fc4c1300 R15: 0000000000022000 [ 1658.195641][T24858] CPU: 0 PID: 24858 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1658.204427][T24858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1658.214559][T24858] Call Trace: [ 1658.217826][T24858] dump_stack_lvl+0xb7/0x103 [ 1658.222409][T24858] dump_stack+0x11/0x1a [ 1658.226577][T24858] should_fail+0x23c/0x250 [ 1658.230991][T24858] ? copy_process+0x10b5/0x2f70 [ 1658.235838][T24858] __should_failslab+0x81/0x90 [ 1658.240600][T24858] should_failslab+0x5/0x20 17:08:33 executing program 5: semget$private(0x0, 0x3, 0x86) semop(0xffffffffffffffff, 0x0, 0x0) 17:08:33 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) [ 1658.245103][T24858] kmem_cache_alloc+0x46/0x2e0 [ 1658.249918][T24858] ? copy_process+0xf5a/0x2f70 [ 1658.254674][T24858] copy_process+0x10b5/0x2f70 [ 1658.259353][T24858] kernel_clone+0x14b/0x680 [ 1658.263845][T24858] ? __fget_light+0x21b/0x260 [ 1658.268597][T24858] __do_sys_fork+0x3a/0x60 [ 1658.273093][T24858] do_syscall_64+0x3d/0x90 [ 1658.277508][T24858] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1658.283422][T24858] RIP: 0033:0x4665e9 [ 1658.287310][T24858] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1658.306911][T24858] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1658.315376][T24858] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1658.323424][T24858] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1658.331480][T24858] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1658.339550][T24858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1658.347828][T24858] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:33 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) semctl$GETVAL(r0, 0x4, 0xc, &(0x7f0000000040)=""/14) 17:08:33 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0xca9a3b, &(0x7f0000000000)={0x77359400}, 0x0) 17:08:33 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'tunl0\x00', &(0x7f0000000180)={'tunl0\x00', 0x0, 0x20, 0x8000, 0x321, 0xb470, {{0x2f, 0x4, 0x3, 0x3, 0xbc, 0x65, 0x0, 0x6, 0x2f, 0x0, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@cipso={0x86, 0x30, 0x2, [{0x6, 0x8, "cb8d5a642b7b"}, {0x0, 0x7, "fe1e510f18"}, {0x6, 0xa, "b80e21755a32cd3d"}, {0x0, 0x9, "6ff2048ae60cec"}, {0x1, 0x6, "d0c2b963"}, {0x7, 0x2}]}, @rr={0x7, 0x13, 0x3a, [@broadcast, @empty, @broadcast, @rand_addr=0x64010101]}, @lsrr={0x83, 0x7, 0x64, [@empty]}, @timestamp_prespec={0x44, 0x34, 0x2e, 0x3, 0x3, [{@multicast1, 0x1}, {@remote, 0x7fffffff}, {@broadcast}, {@private=0xa010101, 0x101}, {@dev={0xac, 0x14, 0x14, 0x44}, 0x9}, {@dev={0xac, 0x14, 0x14, 0x39}, 0x8}]}, @ra={0x94, 0x4, 0x1}, @timestamp_addr={0x44, 0x24, 0xc, 0x1, 0x0, [{@loopback}, {@dev={0xac, 0x14, 0x14, 0x32}, 0x4}, {@dev={0xac, 0x14, 0x14, 0x32}, 0x9}, {@broadcast, 0xd7}]}]}}}}}) semop(0x0, 0x0, 0x1a) r1 = semget$private(0x0, 0x3, 0x12) semctl$GETVAL(r1, 0x4, 0xc, &(0x7f00000000c0)=""/167) r2 = semget(0x3, 0x1, 0x202) r3 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r3, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_STAT(r3, 0x0, 0x12, &(0x7f00000002c0)=""/248) r4 = semget(0x0, 0x3, 0xbb) semctl$GETALL(r4, 0x0, 0xd, &(0x7f0000000080)=""/40) semctl$GETZCNT(r2, 0x0, 0xf, &(0x7f0000000000)=""/113) 17:08:33 executing program 5: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000000)=""/97) r1 = semget(0x0, 0x1, 0x1a) r2 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000000100)=""/249) r3 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r3, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_STAT_ANY(0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000080)=""/83) semget(0x0, 0x3, 0x3a55bca9e6fa7b72) semctl$IPC_RMID(r1, 0x0, 0x0) semop(r1, 0x0, 0x70e19372b5655d0a) 17:08:33 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0xf0ffffff7f0000) 17:08:33 executing program 4 (fault-call:3 fault-nth:10): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() [ 1658.703284][T24874] FAULT_INJECTION: forcing a failure. [ 1658.703284][T24874] name failslab, interval 1, probability 0, space 0, times 0 [ 1658.716010][T24874] CPU: 1 PID: 24874 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1658.724768][T24874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1658.734823][T24874] Call Trace: [ 1658.738103][T24874] dump_stack_lvl+0xb7/0x103 [ 1658.742693][T24874] dump_stack+0x11/0x1a [ 1658.746850][T24874] should_fail+0x23c/0x250 17:08:33 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x100000000000000) 17:08:33 executing program 2: semop(0x0, 0x0, 0x1a) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000040)={0x1, 0x80000000, 0x80005, {0x2, 0xfffffb26}, 0x57, 0x2}) 17:08:33 executing program 5: r0 = semget(0x0, 0x1, 0x30) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000000)=""/234) 17:08:33 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x12001, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0xa2480, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000040), 0x80c00) sendto$packet(r2, &(0x7f0000000080)="feb9ba084039ad8638fe2acc", 0xc, 0x8014, &(0x7f00000000c0)={0x11, 0x5, 0x0, 0x1, 0xff, 0x6, @local}, 0x14) [ 1658.751332][T24874] __should_failslab+0x81/0x90 [ 1658.756116][T24874] should_failslab+0x5/0x20 [ 1658.760619][T24874] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 1658.766343][T24874] ? should_fail+0xd6/0x250 [ 1658.766367][T24874] ? __kmalloc_node+0x30/0x40 [ 1658.766399][T24874] __kmalloc_node+0x30/0x40 17:08:33 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x3b9aca00, &(0x7f0000000000)={0x77359400}, 0x0) 17:08:33 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0xf7, 0x0, 0x1, 0x14, 0x6, @remote}, 0x14) semop(0x0, 0x0, 0x1f4) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000000200)) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) recvfrom$packet(r1, &(0x7f0000000140)=""/68, 0x44, 0x40, &(0x7f00000001c0)={0x11, 0x19, 0x0, 0x1, 0x8}, 0x14) fsmount(r1, 0x0, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0xd, &(0x7f0000000040)=""/151, &(0x7f0000000100)=0x97) [ 1658.766417][T24874] kvmalloc_node+0x81/0xf0 [ 1658.766484][T24874] alloc_fdtable+0xae/0x1b0 [ 1658.766509][T24874] dup_fd+0x548/0x6e0 [ 1658.766571][T24874] copy_process+0xd77/0x2f70 [ 1658.766590][T24874] kernel_clone+0x14b/0x680 [ 1658.766604][T24874] ? __fget_light+0x21b/0x260 [ 1658.766617][T24874] __do_sys_fork+0x3a/0x60 [ 1658.766635][T24874] do_syscall_64+0x3d/0x90 [ 1658.766700][T24874] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1658.766726][T24874] RIP: 0033:0x4665e9 [ 1658.766740][T24874] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1658.766757][T24874] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1658.766775][T24874] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1658.766786][T24874] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1658.766798][T24874] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1658.766809][T24874] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1658.766819][T24874] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:34 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_STAT(r1, 0x3, 0x12, &(0x7f0000000040)=""/225) 17:08:34 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0xca9a3b00000000, &(0x7f0000000000)={0x77359400}, 0x0) 17:08:34 executing program 5: r0 = semget(0x3, 0x3, 0x85) r1 = semget(0x0, 0x1, 0x1a) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f00000001c0)=""/4096) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semget$private(0x0, 0x0, 0x510) r2 = semget$private(0x0, 0x2, 0x0) semctl$IPC_STAT(r2, 0x0, 0x2, &(0x7f0000000000)=""/14) r3 = semget(0x0, 0x1, 0x1a) semget(0x1, 0x0, 0x40) semctl$SEM_STAT_ANY(r1, 0xb9f797060c3466cf, 0x14, &(0x7f0000000100)=""/185) semctl$SEM_STAT_ANY(r3, 0x3, 0x14, &(0x7f0000000080)=""/83) semop(r3, 0x0, 0x0) semctl$SEM_STAT_ANY(r2, 0x4, 0x14, &(0x7f00000011c0)=""/130) r4 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r4, 0x3, 0x14, &(0x7f0000000080)=""/83) semget$private(0x0, 0x1, 0x44e) semctl$SEM_INFO(r4, 0x7, 0x13, &(0x7f0000000040)=""/56) 17:08:34 executing program 4 (fault-call:3 fault-nth:11): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:34 executing program 2: semop(0x0, 0x0, 0xfe9c) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) semtimedop(0x0, &(0x7f0000000000)=[{0x1, 0x8, 0x1800}, {0x2, 0x9, 0x800}, {0x0, 0x9, 0x1000}, {0x1, 0x0, 0x1800}, {0x1, 0x5, 0x1800}, {0x0, 0x4, 0x1000}, {0x2, 0x100, 0x1800}], 0x7, &(0x7f0000000080)={r0, r1+10000000}) 17:08:34 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) recvfrom$packet(r0, 0x0, 0xffbe3780, 0x1, 0x0, 0x0) 17:08:34 executing program 1: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_nanosleep(0x4, 0x0, &(0x7f0000000000)={r0, r1+10000000}, 0x0) r2 = msgget(0x1, 0x110) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000240)=""/6) r3 = msgget(0x0, 0x40) clock_gettime(0x0, &(0x7f0000000200)) msgsnd(r3, &(0x7f0000000100)={0x0, "610b20e8ca6b5a0a4849c937185fa53391c32f0c758c986931f6cf56480266834e5d563cd14a6c80e0328c650cf7633a2047fa49dcb52a2a93a75cb1997ee2d03452ac7fc31c66a79660b386f4121e93133f8f8b690dd8f0f9cdbf69a8c0d954bebe35676e6b2826cba957706a0f0d9c5ca80219efa148687ef38bb74325b45bdde074b2ab944362e8f26436e4f534226246919b62db4b2f05412607f5b24088eca26ef65fe8603a2c47d3e82a375045da9dda4ab3eff440e9cf23b8da68c30dfdf760b8bb"}, 0xcd, 0x0) semtimedop(0x0, &(0x7f0000000080)=[{0x4, 0x7, 0x400}, {0x4, 0x749, 0x1800}, {0x4, 0x2, 0x800}, {0x5, 0x6, 0x800}, {0x1, 0x3}], 0x5, &(0x7f00000000c0)={0x77359400}) semctl$SEM_STAT_ANY(0x0, 0x3, 0x14, &(0x7f0000000280)=""/59) [ 1659.597385][T24918] FAULT_INJECTION: forcing a failure. [ 1659.597385][T24918] name failslab, interval 1, probability 0, space 0, times 0 [ 1659.610042][T24918] CPU: 1 PID: 24918 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1659.618842][T24918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1659.628940][T24918] Call Trace: [ 1659.632251][T24918] dump_stack_lvl+0xb7/0x103 [ 1659.636892][T24918] dump_stack+0x11/0x1a [ 1659.641158][T24918] should_fail+0x23c/0x250 17:08:34 executing program 2: semop(0x0, 0x0, 0x1a) r0 = semget$private(0x0, 0x4, 0x60) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000000)=""/77) [ 1659.645572][T24918] __should_failslab+0x81/0x90 [ 1659.650335][T24918] should_failslab+0x5/0x20 [ 1659.654835][T24918] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 1659.660618][T24918] ? __kmalloc_node+0x30/0x40 [ 1659.665303][T24918] __kmalloc_node+0x30/0x40 [ 1659.669812][T24918] kvmalloc_node+0x81/0xf0 [ 1659.674247][T24918] alloc_fdtable+0x112/0x1b0 [ 1659.678834][T24918] dup_fd+0x548/0x6e0 [ 1659.682829][T24918] copy_process+0xd77/0x2f70 [ 1659.687419][T24918] kernel_clone+0x14b/0x680 [ 1659.691981][T24918] ? __fget_light+0x21b/0x260 17:08:34 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = fsmount(0xffffffffffffffff, 0x1, 0x90) r1 = fsmount(0xffffffffffffffff, 0x0, 0x4) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r3 = msgget(0x3, 0x180) msgctl$IPC_INFO(r3, 0x3, &(0x7f0000000180)=""/162) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000240)=""/160, &(0x7f0000000300)=0xa0) r4 = fsmount(r1, 0x1, 0x88) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380), 0x101000, 0x0) sendmsg$DEVLINK_CMD_RELOAD(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x5c, 0x0, 0x400, 0x70bd29, 0x25dfdbfd, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r5}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}]}, 0x5c}, 0x1, 0x0, 0x0, 0xa8ee0f1f46f2cfe2}, 0x80) r6 = fsmount(r2, 0x0, 0xa) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000640), r1) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r6, &(0x7f00000007c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000780)={&(0x7f0000000680)={0xf8, r7, 0x800, 0x70bd2c, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xfffffffffffffdf5}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x401}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0xffffffff}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x26}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}}]}, 0xf8}, 0x1, 0x0, 0x0, 0x4010}, 0x21082cd285189a34) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000400}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, r7, 0x0, 0x70bd29, 0x25dfdbff, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x6}}]}, 0x44}, 0x1, 0x0, 0x0, 0x8080}, 0x4001) 17:08:34 executing program 5: semget(0x0, 0x0, 0xa) semget(0x2, 0x2, 0x280) r0 = semget$private(0x0, 0x1, 0x810) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$IPC_RMID(r1, 0x0, 0x0) semop(r0, 0x0, 0x0) [ 1659.696730][T24918] __do_sys_fork+0x3a/0x60 [ 1659.701158][T24918] do_syscall_64+0x3d/0x90 [ 1659.705568][T24918] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1659.711487][T24918] RIP: 0033:0x4665e9 [ 1659.715372][T24918] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1659.735001][T24918] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 17:08:34 executing program 4 (fault-call:3 fault-nth:12): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:34 executing program 5: semop(0xffffffffffffffff, 0x0, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x8200) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000140)={{0x2, 0x8}, 'port1\x00', 0x0, 0x2a, 0x7, 0xfffffffb, 0x7f, 0x800, 0x1, 0x0, 0x4, 0x20}) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) semtimedop(r1, &(0x7f0000000000)=[{0x0, 0x80, 0x800}], 0x1, &(0x7f0000000080)={r2, r3+10000000}) [ 1659.743407][T24918] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1659.751394][T24918] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1659.759364][T24918] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1659.767330][T24918] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1659.775289][T24918] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 [ 1659.840069][T24947] FAULT_INJECTION: forcing a failure. [ 1659.840069][T24947] name failslab, interval 1, probability 0, space 0, times 0 [ 1659.852780][T24947] CPU: 1 PID: 24947 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1659.861544][T24947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1659.872035][T24947] Call Trace: [ 1659.875308][T24947] dump_stack_lvl+0xb7/0x103 [ 1659.880001][T24947] dump_stack+0x11/0x1a [ 1659.884214][T24947] should_fail+0x23c/0x250 [ 1659.888695][T24947] ? dup_mmap+0x38e/0x9c0 [ 1659.893061][T24947] __should_failslab+0x81/0x90 [ 1659.897813][T24947] should_failslab+0x5/0x20 [ 1659.902346][T24947] kmem_cache_alloc+0x46/0x2e0 [ 1659.907522][T24947] dup_mmap+0x38e/0x9c0 [ 1659.911657][T24947] ? alloc_pages+0x2e8/0x340 [ 1659.916264][T24947] ? __list_add_valid+0x28/0x90 [ 1659.921208][T24947] ? pgd_alloc+0x120/0x140 [ 1659.925603][T24947] ? __init_rwsem+0x59/0x70 [ 1659.930103][T24947] dup_mm+0x7c/0x210 [ 1659.933986][T24947] copy_process+0x144f/0x2f70 [ 1659.938679][T24947] kernel_clone+0x14b/0x680 [ 1659.943168][T24947] ? __fget_light+0x21b/0x260 [ 1659.947837][T24947] __do_sys_fork+0x3a/0x60 [ 1659.952244][T24947] do_syscall_64+0x3d/0x90 [ 1659.956661][T24947] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1659.962573][T24947] RIP: 0033:0x4665e9 [ 1659.966556][T24947] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1659.986144][T24947] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1659.994534][T24947] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1660.002508][T24947] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1660.010467][T24947] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1660.018590][T24947] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1660.026539][T24947] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:35 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETZCNT(r1, 0x0, 0xf, &(0x7f0000000040)=""/78) semget$private(0x0, 0x4, 0x7) r2 = semget(0x0, 0x1, 0x20) semctl$SETVAL(r2, 0x2, 0x10, &(0x7f0000000100)=0xb07) r3 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r3, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETVAL(r3, 0x1, 0xc, &(0x7f0000000140)=""/94) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) 17:08:35 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="01000000000000006fc4ad2154ee26fcc3a85eb151ae445a987ded1a9ec03efa25c0705c986f97ac2d02d4490d4d9f89a6dc4600dcc7fccec3c8f937464640be7fb03d1a5d34ad435918b34e2723b973a06eb30b7f000000000000008c6091e18e84ac2c59a52491a1b8f480a404572b9796ca02eb7408101b0c1fb7155ade9287424b2da8c7ebe290706ea24c3a7ebaeeaaaa19615b8660781631cb6d5e0a8ebfd8fc915cf62b0c3fdc83cd07c7c51abf56bf704ccdbbd91d16ad7dc270f4a0b45a9146ad65e1fffe852b6f781297aca07e84631f5fb6d46060b953ad280f871b782bf4eace617abc69a3df289e92987c8e4303c944e1273e1fe4d46516b77488249f3b7a83d2dda492d4670126887cde75b25cec9adbf220d38734542c19afc0138c88626b9ec65c7186f3c0ffc08d30fc4913e25c67c45652e73ccb77783fe893ed793e5e24dd177b383a9773a8e394d8e4f3ab2014feda4fd56e44dbd81804dcf7b329c415487fcbe2ed053a4d3ea16a5eca908e47a8d3fabba6ff58df9b55042e5d0cb050e18f7a9049d18519d0bdb8484ba3278b45fa35951e2261fbd6dc0469bec6d25284cf69c243b25c1aecbf63d1512b1b31e3f50fe747f4f2c8cee64d614b57701ffa347ca83a58c172ab176e81bbc1217cc8a7"], 0xdb, 0x0) clock_gettime(0x0, &(0x7f0000000040)) 17:08:35 executing program 2: r0 = semget(0x0, 0x1, 0x1a) r1 = semget(0x0, 0x1, 0x80) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SETVAL(r1, 0x4, 0x10, &(0x7f0000000100)=0x80000001) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SETVAL(r0, 0x2, 0x10, &(0x7f0000000000)=0xf1) semop(r0, 0x0, 0x8) 17:08:35 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r1, 0x0, 0x0) getsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r2, 0x0, 0x0) setsockopt$packet_buf(r2, 0x107, 0x1, &(0x7f0000000080)="fc09044da3c2f7fe2a417d629a026c69877b6a11e456f3b61e92991be1e00e5350aba4125ae336c5cfbcbcaac2956db0279e700cd72516dc333746c70101ed482cd3da7db446a50f24f1cbb7e51a3ec7ae7bf5f86849e846dfc0bd92bb453afd64f412faa88e0e16e81ea23515c5d429db887570d7fbf50e9e0ffc11b00f89e8d03ab5a62ca7405ddea3fb23937a037ace457034afd89765dd7c56b16e4c", 0x9e) recvfrom$packet(r0, 0x0, 0xfffffffffffffd58, 0xdd4e6750a6ab6070, 0x0, 0x0) 17:08:35 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) semop(0x0, 0x0, 0x1f4) 17:08:35 executing program 4 (fault-call:3 fault-nth:13): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:35 executing program 5: semop(0x0, 0x0, 0x1f4) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xa) r0 = semget$private(0x0, 0x0, 0x2) semctl$SEM_INFO(r0, 0x0, 0x13, &(0x7f0000000000)=""/133) [ 1660.499676][T24959] FAULT_INJECTION: forcing a failure. [ 1660.499676][T24959] name failslab, interval 1, probability 0, space 0, times 0 [ 1660.512317][T24959] CPU: 1 PID: 24959 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1660.521075][T24959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1660.531125][T24959] Call Trace: [ 1660.534570][T24959] dump_stack_lvl+0xb7/0x103 [ 1660.539193][T24959] dump_stack+0x11/0x1a [ 1660.543347][T24959] should_fail+0x23c/0x250 17:08:35 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = semget(0x2, 0x2, 0x1) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0x78}, {0x1, 0x3974, 0x1800}, {0x5, 0x8000, 0x1800}, {0x0, 0x7}], 0x4, &(0x7f0000000080)={0x0, 0x989680}) 17:08:35 executing program 5: sendmsg$NL802154_CMD_SET_SHORT_ADDR(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="38000200", @ANYRES16=0x0, @ANYBLOB="00022bbd7000fbdbdf250b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c000600030000000300000008000300", @ANYRES32=0x0, @ANYBLOB="06000a00a1aa0000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) semop(0xffffffffffffffff, 0x0, 0x0) [ 1660.547770][T24959] ? copy_process+0xf5a/0x2f70 [ 1660.552606][T24959] __should_failslab+0x81/0x90 [ 1660.557362][T24959] should_failslab+0x5/0x20 [ 1660.561857][T24959] kmem_cache_alloc+0x46/0x2e0 [ 1660.566694][T24959] ? path_get+0x3c/0x50 [ 1660.570896][T24959] copy_process+0xf5a/0x2f70 [ 1660.575493][T24959] kernel_clone+0x14b/0x680 [ 1660.580002][T24959] ? __fget_light+0x21b/0x260 [ 1660.584696][T24959] __do_sys_fork+0x3a/0x60 [ 1660.589142][T24959] do_syscall_64+0x3d/0x90 [ 1660.593617][T24959] entry_SYSCALL_64_after_hwframe+0x44/0xae 17:08:35 executing program 5: r0 = semget(0x0, 0x1, 0x1a) semctl$GETVAL(0xffffffffffffffff, 0x3, 0xc, &(0x7f0000000100)=""/191) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semop(r0, 0x0, 0x0) [ 1660.599513][T24959] RIP: 0033:0x4665e9 [ 1660.603534][T24959] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1660.623135][T24959] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1660.631588][T24959] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1660.639630][T24959] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 17:08:35 executing program 2: sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x8, 0x70bd2b, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7f}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) semop(0x0, 0x0, 0x1a) semctl$GETZCNT(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000000100)=""/218) 17:08:35 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r2 = fsmount(r1, 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r3, 0x0, 0x0) bind$packet(r2, 0xfffffffffffffffd, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) [ 1660.647587][T24959] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1660.655614][T24959] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1660.663579][T24959] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:36 executing program 2: r0 = semget(0x1, 0x0, 0x301) semop(r0, 0x0, 0xb) 17:08:36 executing program 1: clock_gettime(0x0, &(0x7f0000000040)) clock_nanosleep(0x7, 0x0, &(0x7f0000000000)={0x0, 0x989680}, 0x0) 17:08:36 executing program 5: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x0, 0x14, &(0x7f0000000100)=""/84) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000000)=""/252) semop(0x0, 0x0, 0x1f4) 17:08:36 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000080)=""/101) semget(0x1, 0x2, 0x20) semctl$IPC_INFO(r0, 0x1, 0x3, &(0x7f0000000100)=""/43) semctl$SETVAL(r0, 0x0, 0x10, &(0x7f0000000040)=0x7) semop(r0, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) 17:08:36 executing program 4 (fault-call:3 fault-nth:14): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:36 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = fsmount(0xffffffffffffffff, 0x0, 0x4) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r3 = fsmount(r2, 0x0, 0xa) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000640), r1) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r3, &(0x7f00000007c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000780)={&(0x7f0000000680)={0xfc, r4, 0x800, 0x70bd2c, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x401}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xffffffff}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x26}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4010}, 0x21082cd285189a34) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x60, r4, 0x20, 0x70bd28, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x21c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x400}}]}, 0x60}, 0x1, 0x0, 0x0, 0x40000}, 0x4) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) [ 1661.448880][T24997] FAULT_INJECTION: forcing a failure. [ 1661.448880][T24997] name failslab, interval 1, probability 0, space 0, times 0 [ 1661.461510][T24997] CPU: 1 PID: 24997 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1661.470350][T24997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1661.480401][T24997] Call Trace: [ 1661.483672][T24997] dump_stack_lvl+0xb7/0x103 [ 1661.488274][T24997] dump_stack+0x11/0x1a [ 1661.492423][T24997] should_fail+0x23c/0x250 17:08:36 executing program 5: semget(0x3, 0x3, 0x480) r0 = semget(0x3, 0x3, 0x2c) semop(r0, 0x0, 0x0) 17:08:36 executing program 2: r0 = semget$private(0x0, 0x1, 0x340) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semop(r0, 0x0, 0x0) [ 1661.496876][T24997] ? copy_process+0x10b5/0x2f70 [ 1661.501719][T24997] __should_failslab+0x81/0x90 [ 1661.506472][T24997] should_failslab+0x5/0x20 [ 1661.510972][T24997] kmem_cache_alloc+0x46/0x2e0 [ 1661.515845][T24997] ? copy_process+0xf5a/0x2f70 [ 1661.520613][T24997] copy_process+0x10b5/0x2f70 [ 1661.525474][T24997] kernel_clone+0x14b/0x680 [ 1661.530001][T24997] ? __fget_light+0x21b/0x260 [ 1661.534673][T24997] __do_sys_fork+0x3a/0x60 [ 1661.539083][T24997] do_syscall_64+0x3d/0x90 [ 1661.543548][T24997] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1661.549505][T24997] RIP: 0033:0x4665e9 [ 1661.553451][T24997] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1661.573054][T24997] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1661.581459][T24997] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1661.589431][T24997] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 17:08:36 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r2, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0x38}}, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r1) sendmsg$NL802154_CMD_DEL_SEC_KEY(r1, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000480)={&(0x7f00000002c0)={0xb8, r3, 0x400, 0x70bd2a, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x90, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x64, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x2}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x50, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0xffff}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa0}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x1}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x2}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x3}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x1}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaf8b44bb5b0d6e65}}, @NL802154_DEV_ADDR_ATTR_MODE={0x8}]}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x4}]}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "31ede1af8917646b0143eda7a22bb61c"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "defe18398b1e0e1b9e5182911d14efa4"}]}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x4}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4000000}, 0xc000014) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x5c, r2, 0x2, 0x70bd2d, 0x25dfdbfd, {}, [@NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}]}, 0x5c}}, 0x20000000) [ 1661.597401][T24997] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1661.605367][T24997] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1661.613336][T24997] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:36 executing program 2: semop(0x0, 0x0, 0x1a) semctl$SEM_STAT_ANY(0xffffffffffffffff, 0x4, 0x14, &(0x7f0000000000)=""/12) 17:08:36 executing program 5: syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wpan3\x00', 0x0}) sendmsg$IEEE802154_LLSEC_SETPARAMS(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x68, r2, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x2}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r3}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0xf}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa0}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc, 0x2d, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x3}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_SHORT_ADDR={0x6}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) sendmsg$IEEE802154_LLSEC_GETPARAMS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1ca5268b52705127}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="10002bbd7000ffdbdf252400000008000200", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="08000200", @ANYRES32=r1, @ANYBLOB="0a0001007770616e3000000008000200", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) semop(0x0, 0x0, 0x1f4) 17:08:36 executing program 4 (fault-call:3 fault-nth:15): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:36 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) write$cgroup_pid(r1, &(0x7f00000000c0)=r2, 0x12) 17:08:36 executing program 1: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000)=@req={0x80000000, 0x8, 0x1, 0xfffffff9}, 0x10) 17:08:36 executing program 2: r0 = socket(0x11, 0x5, 0x9) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x9c, r1, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'syzkaller0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'syz_tun\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'syzkaller1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x9c}, 0x1, 0x0, 0x0, 0x4000040}, 0x0) semop(0xffffffffffffffff, 0x0, 0x0) [ 1661.721871][T25045] FAULT_INJECTION: forcing a failure. [ 1661.721871][T25045] name failslab, interval 1, probability 0, space 0, times 0 [ 1661.734516][T25045] CPU: 1 PID: 25045 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1661.743282][T25045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1661.753335][T25045] Call Trace: [ 1661.756607][T25045] dump_stack_lvl+0xb7/0x103 [ 1661.761198][T25045] dump_stack+0x11/0x1a [ 1661.765375][T25045] should_fail+0x23c/0x250 [ 1661.769794][T25045] ? dup_mm+0x2e/0x210 [ 1661.774011][T25045] __should_failslab+0x81/0x90 [ 1661.778763][T25045] should_failslab+0x5/0x20 [ 1661.783262][T25045] kmem_cache_alloc+0x46/0x2e0 [ 1661.788119][T25045] dup_mm+0x2e/0x210 [ 1661.792294][T25045] copy_process+0x144f/0x2f70 [ 1661.796972][T25045] kernel_clone+0x14b/0x680 [ 1661.801471][T25045] ? __fget_light+0x21b/0x260 [ 1661.806143][T25045] __do_sys_fork+0x3a/0x60 [ 1661.810643][T25045] do_syscall_64+0x3d/0x90 [ 1661.815066][T25045] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1661.820956][T25045] RIP: 0033:0x4665e9 [ 1661.824927][T25045] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1661.844655][T25045] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1661.853070][T25045] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1661.861036][T25045] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1661.869005][T25045] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1661.877074][T25045] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1661.885735][T25045] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:37 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETPID(r1, 0x0, 0xb, &(0x7f0000000040)=""/134) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) 17:08:37 executing program 3: ioctl$PTP_PEROUT_REQUEST(0xffffffffffffffff, 0x40383d03, &(0x7f0000000000)={{0x0, 0x9}, {0xfffffffffffffffa, 0x6}, 0x3, 0x1}) r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 17:08:37 executing program 1: ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000040)={0x7, 0x0, 'client1\x00', 0x6, '\a\x00\x00\x00\a\x00', "1ff819d3a7b5e74633cb01ab0779e88204de986d616171d06fa472c593a50b10", 0x51, 0x10001}) clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 17:08:37 executing program 2: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semget(0x1, 0x1, 0x40) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semop(r1, 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000000)=""/151) 17:08:37 executing program 5: semop(0x0, 0x0, 0x1f4) r0 = semget$private(0x0, 0x4, 0xc9) semctl$IPC_RMID(r0, 0x0, 0x0) 17:08:37 executing program 4 (fault-call:3 fault-nth:16): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() [ 1662.349682][T25074] FAULT_INJECTION: forcing a failure. [ 1662.349682][T25074] name failslab, interval 1, probability 0, space 0, times 0 [ 1662.362315][T25074] CPU: 1 PID: 25074 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1662.371116][T25074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1662.381185][T25074] Call Trace: [ 1662.384464][T25074] dump_stack_lvl+0xb7/0x103 [ 1662.389059][T25074] dump_stack+0x11/0x1a [ 1662.393277][T25074] should_fail+0x23c/0x250 17:08:37 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) clock_nanosleep(0x2, 0x1, &(0x7f0000000040), &(0x7f0000000080)) 17:08:37 executing program 5: semop(0x0, 0x0, 0x1f4) semctl$SEM_INFO(0xffffffffffffffff, 0x4, 0x13, &(0x7f0000000000)=""/189) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc08c5334, &(0x7f0000000100)={0x200006}) semget(0x0, 0x4, 0x1e8) 17:08:37 executing program 2: semop(0x0, 0x0, 0xffffffffffffff13) r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000000)=""/223) 17:08:37 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000040)={0x0, 0x3938700}, 0x0) [ 1662.397688][T25074] ? anon_vma_clone+0x8d/0x380 [ 1662.402450][T25074] __should_failslab+0x81/0x90 [ 1662.407234][T25074] should_failslab+0x5/0x20 [ 1662.411753][T25074] kmem_cache_alloc+0x46/0x2e0 [ 1662.416683][T25074] ? avc_has_perm_noaudit+0x19a/0x240 [ 1662.422138][T25074] anon_vma_clone+0x8d/0x380 [ 1662.426805][T25074] anon_vma_fork+0x54/0x2b0 [ 1662.431362][T25074] dup_mmap+0x49c/0x9c0 [ 1662.435553][T25074] dup_mm+0x7c/0x210 [ 1662.439495][T25074] copy_process+0x144f/0x2f70 [ 1662.444188][T25074] kernel_clone+0x14b/0x680 [ 1662.448687][T25074] ? __fget_light+0x21b/0x260 [ 1662.453353][T25074] __do_sys_fork+0x3a/0x60 [ 1662.457831][T25074] do_syscall_64+0x3d/0x90 [ 1662.462246][T25074] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1662.468172][T25074] RIP: 0033:0x4665e9 [ 1662.472061][T25074] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1662.491696][T25074] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 17:08:37 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000080), 0x0) clock_getres(0x7, &(0x7f0000000040)) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x2, 0x70bd25, 0x25df5bfe, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x101}}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0xc085) 17:08:37 executing program 5: r0 = fsmount(0xffffffffffffffff, 0x1, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) semop(0x0, 0x0, 0x1f4) [ 1662.500203][T25074] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1662.508171][T25074] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1662.516136][T25074] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1662.524100][T25074] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1662.532066][T25074] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:38 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) recvfrom$packet(r0, &(0x7f0000000000), 0x0, 0x100, 0x0, 0x0) semop(0x0, 0x0, 0x1a) 17:08:38 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0xf0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f0000000300)='/dev/vcs\x00', &(0x7f0000000340)='./file0\x00', r0) r1 = fork() r2 = fork() waitid(0x2, r2, &(0x7f00000001c0), 0x8, 0x0) waitid(0x2, r2, &(0x7f00000001c0), 0x4, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r3, 0x6, 0x15, &(0x7f0000000080)=0xffffffff, 0x4) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100), 0xffffffffffffffff) r6 = fork() waitid(0x2, r6, &(0x7f00000001c0), 0x8, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) sendmsg$DEVLINK_CMD_RELOAD(r4, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x88140000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0a0027040000007bdc6b40000000303030303a30303a31302e30488d021d6d00028a65972bb2aa42c0c46fe762242e1669fc2e6e3a43c3efa2d7b4b77415c46bbf0f66addcc598efe1f28c9806cfdf599b8530ccfd65d1fd51d6825d62cd901bee3913fa32bb046d725d3d4c57dbd5cd6b3ff8ea4cf3ddfb295df92b9a9ea332611ce3a343f6842b59ff43600e219d8cee9a243109b574ba2097b456931126d1dfd6a8c82ca008c96bdfddb0eff90ab1ec0cf07fcb3e0d7560fffe207364a9f278e855f279c8da2895b11d9c224a83ad8fca174e910bb6cad74abe5578850e9acc39cc3e5140940abfaa1759048bdd26514acff96fced9b18a9191f00dfd7790f3dbce14cd93b1a3b660acecf8ada3d98243f056b583c9f6821c7019c625ded96079021022ad5eb3c8a1fc8b3ee9", @ANYRES32=r6, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008a00", @ANYRES32, @ANYBLOB], 0x5c}, 0x1, 0x0, 0x0, 0x4000000}, 0x8002) sched_rr_get_interval(r1, &(0x7f0000000040)) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r7, 0x0, 0x0) setsockopt$inet_udp_encap(r7, 0x11, 0x64, &(0x7f00000002c0)=0x6, 0x4) 17:08:38 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) semtimedop(r0, &(0x7f0000000040)=[{0x4, 0x2}], 0x1, &(0x7f0000000080)) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETNCNT(r1, 0x1, 0xe, 0x0) 17:08:38 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 17:08:38 executing program 4 (fault-call:3 fault-nth:17): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:38 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000000c0)={'gre0\x00', &(0x7f0000000000)={'ip_vti0\x00', 0x0, 0x8000, 0x700, 0x10001, 0xfff, {{0x25, 0x4, 0x0, 0x6, 0x94, 0x68, 0x0, 0x1, 0x2f, 0x0, @rand_addr=0x64010100, @broadcast, {[@ra={0x94, 0x4, 0x1}, @noop, @ssrr={0x89, 0x2b, 0xc2, [@private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, @empty, @remote, @remote, @dev={0xac, 0x14, 0x14, 0x28}, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote]}, @noop, @ssrr={0x89, 0x13, 0xdb, [@loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @rand_addr=0x64010101]}, @ra={0x94, 0x4}, @timestamp={0x44, 0x10, 0x7, 0x0, 0x3, [0x81, 0x9, 0x200]}, @lsrr={0x83, 0x23, 0xa2, [@dev={0xac, 0x14, 0x14, 0x25}, @broadcast, @rand_addr=0x64010102, @multicast2, @empty, @loopback, @multicast2, @remote]}, @generic={0x86, 0x2}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000100)={'erspan0\x00', r0, 0x20, 0x7, 0x2, 0x0, {{0x1a, 0x4, 0x2, 0x14, 0x68, 0x67, 0x0, 0x3, 0x29, 0x0, @broadcast, @remote, {[@rr={0x7, 0x17, 0x11, [@broadcast, @local, @private=0xa010101, @loopback, @private=0xa010101]}, @lsrr={0x83, 0x1b, 0xb1, [@multicast2, @private=0xa010102, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, @dev={0xac, 0x14, 0x14, 0xe}]}, @timestamp_prespec={0x44, 0x1c, 0xb2, 0x3, 0xd, [{@remote, 0x3}, {@empty, 0x4}, {@dev={0xac, 0x14, 0x14, 0x30}, 0xfffffffd}]}, @ra={0x94, 0x4}]}}}}}) semop(0x0, 0x0, 0x1f4) [ 1663.222965][T25117] FAULT_INJECTION: forcing a failure. [ 1663.222965][T25117] name failslab, interval 1, probability 0, space 0, times 0 [ 1663.235797][T25117] CPU: 0 PID: 25117 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1663.244560][T25117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1663.254609][T25117] Call Trace: [ 1663.257886][T25117] dump_stack_lvl+0xb7/0x103 [ 1663.262482][T25117] dump_stack+0x11/0x1a [ 1663.266637][T25117] should_fail+0x23c/0x250 17:08:38 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000000)='\x00', 0x0, r0) semop(0x0, 0x0, 0x1a) 17:08:38 executing program 5: r0 = semget(0x2, 0x1, 0x1a) semctl$SETVAL(r0, 0x0, 0x10, &(0x7f0000000140)=0x200) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semop(r0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) semtimedop(r0, &(0x7f0000000000)=[{0x3, 0x40, 0x800}, {0x0, 0x1, 0xc00}, {0x0, 0x2, 0x800}, {0x2, 0x8, 0x1800}, {0x0, 0x100, 0x1800}], 0x5, &(0x7f0000000100)={r1, r2+60000000}) [ 1663.271058][T25117] ? dup_mmap+0x38e/0x9c0 [ 1663.275463][T25117] __should_failslab+0x81/0x90 [ 1663.280222][T25117] should_failslab+0x5/0x20 [ 1663.284771][T25117] kmem_cache_alloc+0x46/0x2e0 [ 1663.289539][T25117] dup_mmap+0x38e/0x9c0 [ 1663.293722][T25117] ? alloc_pages+0x2e8/0x340 [ 1663.298324][T25117] ? __list_add_valid+0x28/0x90 [ 1663.303179][T25117] ? pgd_alloc+0x120/0x140 [ 1663.307720][T25117] ? __init_rwsem+0x59/0x70 [ 1663.312224][T25117] dup_mm+0x7c/0x210 [ 1663.316123][T25117] copy_process+0x144f/0x2f70 [ 1663.320892][T25117] kernel_clone+0x14b/0x680 [ 1663.325389][T25117] ? __fget_light+0x21b/0x260 [ 1663.330074][T25117] __do_sys_fork+0x3a/0x60 [ 1663.334483][T25117] do_syscall_64+0x3d/0x90 [ 1663.338890][T25117] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1663.344787][T25117] RIP: 0033:0x4665e9 [ 1663.348673][T25117] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 17:08:38 executing program 1: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_nanosleep(0x3, 0x1, &(0x7f0000000000)={r0, r1+10000000}, 0x0) 17:08:38 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semtimedop(r0, &(0x7f0000000080)=[{0x2, 0x45, 0x1000}, {}, {0x0, 0x6, 0x1800}, {0x0, 0x2}, {0x1, 0xb90e, 0x800}, {0x2, 0x7, 0x800}, {0x4, 0x7, 0x1000}, {0x1, 0x5, 0x1000}], 0x8, &(0x7f00000000c0)={0x77359400}) sched_rr_get_interval(0x0, &(0x7f0000000040)) 17:08:38 executing program 4 (fault-call:3 fault-nth:18): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:38 executing program 2: semop(0x0, 0x0, 0x1a) r0 = socket(0x4, 0x2, 0x7fffffff) r1 = fsmount(0xffffffffffffffff, 0x0, 0x4) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r3 = fsmount(r2, 0x0, 0xa) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000640), r1) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r3, &(0x7f00000007c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000780)={&(0x7f0000000680)={0xfc, r4, 0x800, 0x70bd2c, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x401}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xffffffff}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x26}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4010}, 0x21082cd285189a34) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)={0x150, r4, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x3}, {0x6, 0x11, 0x9a}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x8, 0xb, 0x2}, {0x6}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x3}, {0x6}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x8, 0xb, 0x6}, {0x6, 0x11, 0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x7}, {0x6, 0x11, 0xfca0}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x1000}, {0x6, 0x11, 0x8}}]}, 0x150}, 0x1, 0x0, 0x0, 0x8001}, 0x20008800) 17:08:38 executing program 5: semop(0x0, 0x0, 0x1f4) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'tunl0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="7475070000018000000000000000", @ANYRES32=0x0, @ANYBLOB="0020000100000b79000000004d0300340064000006049078ac1414aa64010102070748f30d399d8917dd640101020a010100ffffffffac1414bb640101000000"]}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/221, 0xdd, 0x40000001, &(0x7f0000000240)={0x11, 0xf6, r0, 0x1, 0x9, 0x6, @remote}, 0x14) [ 1663.368293][T25117] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1663.376704][T25117] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1663.384840][T25117] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1663.392801][T25117] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1663.400767][T25117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1663.408734][T25117] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:38 executing program 5: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semop(r1, 0x0, 0x0) [ 1663.488552][T25159] FAULT_INJECTION: forcing a failure. [ 1663.488552][T25159] name failslab, interval 1, probability 0, space 0, times 0 [ 1663.501195][T25159] CPU: 1 PID: 25159 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1663.509961][T25159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1663.520106][T25159] Call Trace: [ 1663.523382][T25159] dump_stack_lvl+0xb7/0x103 [ 1663.528144][T25159] dump_stack+0x11/0x1a [ 1663.532344][T25159] should_fail+0x23c/0x250 [ 1663.536764][T25159] ? dup_mmap+0x38e/0x9c0 [ 1663.541159][T25159] __should_failslab+0x81/0x90 [ 1663.545917][T25159] should_failslab+0x5/0x20 [ 1663.550417][T25159] kmem_cache_alloc+0x46/0x2e0 [ 1663.555198][T25159] dup_mmap+0x38e/0x9c0 [ 1663.559526][T25159] ? alloc_pages+0x2e8/0x340 [ 1663.564112][T25159] ? __list_add_valid+0x28/0x90 [ 1663.569031][T25159] ? pgd_alloc+0x120/0x140 [ 1663.573448][T25159] ? __init_rwsem+0x59/0x70 [ 1663.577947][T25159] dup_mm+0x7c/0x210 [ 1663.581835][T25159] copy_process+0x144f/0x2f70 [ 1663.586507][T25159] kernel_clone+0x14b/0x680 [ 1663.591014][T25159] ? __fget_light+0x21b/0x260 [ 1663.595691][T25159] __do_sys_fork+0x3a/0x60 [ 1663.600170][T25159] do_syscall_64+0x3d/0x90 [ 1663.604597][T25159] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1663.610599][T25159] RIP: 0033:0x4665e9 [ 1663.614616][T25159] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1663.634273][T25159] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1663.642663][T25159] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1663.650651][T25159] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1663.658614][T25159] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1663.666698][T25159] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1663.674649][T25159] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:39 executing program 0: r0 = semget$private(0x0, 0x2, 0x1) semop(r0, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) semctl$GETZCNT(r0, 0x2, 0xf, &(0x7f0000000040)) r1 = semget(0x2, 0x0, 0x49a) semctl$GETZCNT(r1, 0x1, 0xf, &(0x7f0000000040)=""/241) 17:08:39 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) clock_getres(0x7, &(0x7f0000000100)) r0 = semget$private(0x0, 0x4, 0x248) semtimedop(r0, &(0x7f0000000040)=[{0x2, 0xfffd, 0x1000}, {0x2, 0x2c8, 0x1800}, {0x1, 0x85, 0x800}, {0x4, 0xa95, 0x1000}], 0x4, &(0x7f0000000080)) 17:08:39 executing program 2: ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f0000000000)) semop(0x0, 0x0, 0x1a) 17:08:39 executing program 5: r0 = semget(0x0, 0x1, 0x1a) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETALL(r1, 0x0, 0xd, &(0x7f0000000000)=""/127) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semop(r0, 0x0, 0x0) 17:08:39 executing program 4 (fault-call:3 fault-nth:19): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:39 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x402b40, 0x0) r2 = fsmount(r0, 0x1, 0xfa) syz_genetlink_get_family_id$devlink(&(0x7f00000000c0), r2) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x8040, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3) fsmount(r1, 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r4, 0x0, 0x0) recvfrom$packet(r4, 0x0, 0x17, 0x40000001, 0x0, 0x0) [ 1664.107633][T25186] FAULT_INJECTION: forcing a failure. [ 1664.107633][T25186] name failslab, interval 1, probability 0, space 0, times 0 [ 1664.120259][T25186] CPU: 1 PID: 25186 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1664.129037][T25186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1664.139112][T25186] Call Trace: [ 1664.142373][T25186] dump_stack_lvl+0xb7/0x103 [ 1664.146969][T25186] dump_stack+0x11/0x1a [ 1664.151108][T25186] should_fail+0x23c/0x250 [ 1664.155523][T25186] ? anon_vma_fork+0xb1/0x2b0 [ 1664.160419][T25186] __should_failslab+0x81/0x90 [ 1664.165949][T25186] should_failslab+0x5/0x20 [ 1664.165973][T25186] kmem_cache_alloc+0x46/0x2e0 [ 1664.175214][T25186] anon_vma_fork+0xb1/0x2b0 [ 1664.179707][T25186] dup_mmap+0x49c/0x9c0 [ 1664.184042][T25186] dup_mm+0x7c/0x210 [ 1664.187934][T25186] copy_process+0x144f/0x2f70 [ 1664.192603][T25186] kernel_clone+0x14b/0x680 [ 1664.197140][T25186] ? __fget_light+0x21b/0x260 [ 1664.201822][T25186] __do_sys_fork+0x3a/0x60 [ 1664.206262][T25186] do_syscall_64+0x3d/0x90 [ 1664.210660][T25186] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1664.216637][T25186] RIP: 0033:0x4665e9 [ 1664.220539][T25186] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1664.240208][T25186] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1664.248745][T25186] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 17:08:39 executing program 2: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wpan0\x00'}) semop(0x0, 0x0, 0x1a) semctl$GETPID(0xffffffffffffffff, 0x3, 0xb, &(0x7f0000000000)=""/84) semctl$GETZCNT(0x0, 0x2, 0xf, &(0x7f0000000080)=""/179) 17:08:39 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000380), r0) sendmsg$NLBL_CALIPSO_C_LISTALL(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, r1, 0xb10, 0x70bd29, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x80) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r3, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0x38}}, 0x10) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x410080}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x58, r3, 0x400, 0x70bd2b, 0x25dfdbfb, {}, [@NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x6}, @NL802154_ATTR_SEC_FRAME_COUNTER={0x8, 0x21, 0xf69}, @NL802154_ATTR_SEC_FRAME_COUNTER={0x8, 0x21, 0x4d2}, @NL802154_ATTR_SEC_FRAME_COUNTER={0x8, 0x21, 0x400}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_SEC_FRAME_COUNTER={0x8, 0x21, 0x43}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x40) clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) [ 1664.257024][T25186] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1664.265093][T25186] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1664.273069][T25186] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1664.281211][T25186] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:39 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r2 = fsmount(r1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000100)=@req={0x6, 0x90, 0x9, 0x5}, 0x10) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r4 = fsmount(r3, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r4, 0x0, &(0x7f0000000140)='mand\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000240)={'syztnl0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="7307006f8cec7a746e6d32b4000003eeba36448f011df02ad9712a0c145af93100000000", @ANYRES32=0x0, @ANYBLOB="0080000800000005000000ff471a005c00650000062f9078ac1414aaac1414aa07175cac141436ac1e000164010101ac1414aae0000002071783ac14142d0000000064010102ac1e00010a0100fd07a6f8ffffffffac1414bbac14143c860a00000001020431bd00"]}) sendto$packet(r3, &(0x7f0000000000)="1245", 0x2, 0x4000000, &(0x7f0000000280)={0x11, 0x17, r5, 0x1, 0x4, 0x6, @local}, 0x14) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x6, &(0x7f0000000040)=""/124, &(0x7f00000000c0)=0x7c) 17:08:39 executing program 5: semget$private(0x0, 0x0, 0xaa942e09f83f44ad) r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semop(r0, 0x0, 0x2072e186708bd7a5) 17:08:39 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) keyctl$clear(0x7, r0) semop(0x0, 0x0, 0x1a) 17:08:39 executing program 4 (fault-call:3 fault-nth:20): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() [ 1664.431182][T25227] FAULT_INJECTION: forcing a failure. [ 1664.431182][T25227] name failslab, interval 1, probability 0, space 0, times 0 [ 1664.443836][T25227] CPU: 1 PID: 25227 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1664.452589][T25227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1664.462634][T25227] Call Trace: [ 1664.466040][T25227] dump_stack_lvl+0xb7/0x103 [ 1664.470696][T25227] dump_stack+0x11/0x1a [ 1664.474831][T25227] should_fail+0x23c/0x250 [ 1664.479242][T25227] ? anon_vma_fork+0x117/0x2b0 [ 1664.484169][T25227] __should_failslab+0x81/0x90 [ 1664.488926][T25227] should_failslab+0x5/0x20 [ 1664.493635][T25227] kmem_cache_alloc+0x46/0x2e0 [ 1664.498387][T25227] ? anon_vma_fork+0xb1/0x2b0 [ 1664.503083][T25227] anon_vma_fork+0x117/0x2b0 [ 1664.507654][T25227] dup_mmap+0x49c/0x9c0 [ 1664.511793][T25227] dup_mm+0x7c/0x210 [ 1664.515759][T25227] copy_process+0x144f/0x2f70 [ 1664.520415][T25227] kernel_clone+0x14b/0x680 [ 1664.524897][T25227] ? __fget_light+0x21b/0x260 [ 1664.529574][T25227] __do_sys_fork+0x3a/0x60 [ 1664.533969][T25227] do_syscall_64+0x3d/0x90 [ 1664.538533][T25227] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1664.544419][T25227] RIP: 0033:0x4665e9 [ 1664.548488][T25227] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1664.568231][T25227] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1664.576629][T25227] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1664.584630][T25227] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1664.592582][T25227] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1664.600537][T25227] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1664.608506][T25227] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:40 executing program 5: semop(0x0, 0x0, 0x1f4) semctl$IPC_RMID(0xffffffffffffffff, 0x0, 0x0) 17:08:40 executing program 0: r0 = semget$private(0x0, 0x0, 0x7be) semop(r0, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) 17:08:40 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x60, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x3}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x5}}]}, 0x60}, 0x1, 0x0, 0x0, 0x8000}, 0x22008004) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r2, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0x38}}, 0x10) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="c8010000", @ANYRES16=r2, @ANYBLOB="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"], 0x1c8}, 0x1, 0x0, 0x0, 0xc0}, 0x8010) r3 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r3, 0x0, 0x0, 0x2000, 0x0, 0x0) 17:08:40 executing program 1: clock_nanosleep(0x7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) semget$private(0x0, 0x1, 0x6b1) r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semtimedop(r0, &(0x7f00000000c0), 0x0, &(0x7f0000000100)={0x0, 0x989680}) semtimedop(0x0, &(0x7f0000000040)=[{0x3, 0x2, 0x800}, {0x3, 0xa594, 0x800}, {0x3, 0x0, 0x800}, {0x1, 0x3b4, 0x1000}, {0x0, 0x7ff, 0x1000}], 0x5, &(0x7f0000000080)) 17:08:40 executing program 2: semop(0x0, 0x0, 0x1a) r0 = semget$private(0x0, 0x2, 0x40) semctl$SEM_STAT(r0, 0x1, 0x12, &(0x7f0000000000)=""/198) 17:08:40 executing program 4 (fault-call:3 fault-nth:21): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() [ 1664.986445][T25243] FAULT_INJECTION: forcing a failure. [ 1664.986445][T25243] name failslab, interval 1, probability 0, space 0, times 0 [ 1664.999163][T25243] CPU: 1 PID: 25243 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1665.007918][T25243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1665.018145][T25243] Call Trace: [ 1665.021418][T25243] dump_stack_lvl+0xb7/0x103 [ 1665.025998][T25243] dump_stack+0x11/0x1a [ 1665.030158][T25243] should_fail+0x23c/0x250 [ 1665.034573][T25243] ? anon_vma_clone+0x8d/0x380 [ 1665.039333][T25243] __should_failslab+0x81/0x90 [ 1665.044090][T25243] should_failslab+0x5/0x20 [ 1665.048631][T25243] kmem_cache_alloc+0x46/0x2e0 [ 1665.053399][T25243] ? avc_has_perm_noaudit+0x19a/0x240 [ 1665.058820][T25243] anon_vma_clone+0x8d/0x380 [ 1665.063413][T25243] anon_vma_fork+0x54/0x2b0 [ 1665.067920][T25243] dup_mmap+0x49c/0x9c0 [ 1665.072112][T25243] dup_mm+0x7c/0x210 [ 1665.076017][T25243] copy_process+0x144f/0x2f70 [ 1665.080692][T25243] kernel_clone+0x14b/0x680 17:08:40 executing program 5: r0 = semget(0x2, 0x0, 0x5ea) semop(r0, 0x0, 0x0) 17:08:40 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r0) semget(0x1, 0xf7888d7c2eb5ab72, 0x30) semget$private(0x0, 0x1, 0x300) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r1, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000080)={{0x4, 0x40}, 'port1\x00', 0x40, 0xa0, 0xfffffff7, 0x109, 0x3, 0x8, 0x4, 0x0, 0x5, 0x95}) 17:08:40 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) semctl$IPC_RMID(0xffffffffffffffff, 0x0, 0x0) 17:08:40 executing program 2: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semop(r1, 0x0, 0x0) [ 1665.085184][T25243] ? __fget_light+0x21b/0x260 [ 1665.089846][T25243] __do_sys_fork+0x3a/0x60 [ 1665.094253][T25243] do_syscall_64+0x3d/0x90 [ 1665.098669][T25243] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1665.104648][T25243] RIP: 0033:0x4665e9 [ 1665.108562][T25243] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1665.128173][T25243] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1665.136758][T25243] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1665.144801][T25243] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1665.152754][T25243] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1665.160716][T25243] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1665.168703][T25243] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:40 executing program 5: r0 = semget$private(0x0, 0x4, 0x3) r1 = semget(0x3, 0x2, 0x120) semctl$SEM_STAT(r1, 0x1, 0x12, &(0x7f0000000140)=""/118) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="200028bd7000fbdbdf25210000000c00060003000000000000000d00060003000000030000000c00060002000000020000001400228008000300040000000800020001000000"], 0x4c}, 0x1, 0x0, 0x0, 0x4088881}, 0x4000) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wpan4\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x40, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@NL802154_ATTR_SHORT_ADDR={0x6, 0xa, 0xaaa0}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_SHORT_ADDR={0x6, 0xa, 0xaaa2}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x40}, 0x1, 0x0, 0x0, 0x8001}, 0x20000084) semop(r0, 0x0, 0xfffffffffffffe3b) 17:08:40 executing program 4 (fault-call:3 fault-nth:22): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:40 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 17:08:40 executing program 2: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) 17:08:40 executing program 5: semop(0x0, 0x0, 0x1f4) semctl$GETVAL(0x0, 0x1, 0xc, &(0x7f0000000000)=""/129) r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_INFO(r0, 0x4, 0x13, &(0x7f00000000c0)=""/13) [ 1665.298445][T25286] FAULT_INJECTION: forcing a failure. [ 1665.298445][T25286] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1665.311680][T25286] CPU: 0 PID: 25286 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1665.320435][T25286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1665.330476][T25286] Call Trace: [ 1665.333741][T25286] dump_stack_lvl+0xb7/0x103 [ 1665.338326][T25286] dump_stack+0x11/0x1a [ 1665.342458][T25286] should_fail+0x23c/0x250 [ 1665.346859][T25286] __alloc_pages+0x102/0x320 [ 1665.351440][T25286] alloc_pages+0x2e8/0x340 [ 1665.355851][T25286] __pmd_alloc+0x47/0x310 [ 1665.360245][T25286] ? __pud_alloc+0x159/0x190 [ 1665.364820][T25286] copy_page_range+0x695/0x8e0 [ 1665.369578][T25286] ? __rb_insert_augmented+0x7f/0x350 [ 1665.374935][T25286] ? up_write+0x25/0xc0 [ 1665.379079][T25286] dup_mmap+0x6ab/0x9c0 [ 1665.383227][T25286] dup_mm+0x7c/0x210 [ 1665.387116][T25286] copy_process+0x144f/0x2f70 [ 1665.391789][T25286] kernel_clone+0x14b/0x680 [ 1665.396289][T25286] ? __fget_light+0x21b/0x260 [ 1665.400941][T25286] __do_sys_fork+0x3a/0x60 [ 1665.405339][T25286] do_syscall_64+0x3d/0x90 [ 1665.409745][T25286] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1665.415632][T25286] RIP: 0033:0x4665e9 [ 1665.419507][T25286] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1665.439108][T25286] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1665.447498][T25286] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1665.455445][T25286] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1665.463394][T25286] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1665.471395][T25286] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1665.479349][T25286] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:41 executing program 1: clock_nanosleep(0x4, 0x1, &(0x7f0000000000)={0x77359400}, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x80) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x80000001, 0x4) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000040), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_nanosleep(0x7, 0x1, &(0x7f00000000c0)={r1, r2+10000000}, &(0x7f0000000100)) 17:08:41 executing program 2: semop(0x0, 0x0, 0x0) r0 = semget$private(0x0, 0x2, 0x30f) semop(r0, &(0x7f0000000000)=[{0x2, 0x8000, 0x800}, {0x4, 0xc4b5, 0x1800}, {0x3, 0x1, 0x800}, {0x3, 0x5}, {0x0, 0x5, 0x1000}, {0x0, 0x5, 0x800}], 0x6) 17:08:41 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000100)) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x100) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f0000000040)={{0xa8, 0x5}, 'port0\x00', 0x90, 0x0, 0x1000, 0x0, 0xdb, 0x867, 0x6, 0x0, 0x0, 0x81}) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 17:08:41 executing program 5: semop(0x0, 0x0, 0x1f4) semctl$GETALL(0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000000)=""/32) 17:08:41 executing program 4 (fault-call:3 fault-nth:23): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() [ 1665.916193][T25295] FAULT_INJECTION: forcing a failure. [ 1665.916193][T25295] name failslab, interval 1, probability 0, space 0, times 0 [ 1665.928933][T25295] CPU: 1 PID: 25295 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1665.937709][T25295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1665.947756][T25295] Call Trace: [ 1665.951022][T25295] dump_stack_lvl+0xb7/0x103 [ 1665.955609][T25295] dump_stack+0x11/0x1a [ 1665.959757][T25295] should_fail+0x23c/0x250 [ 1665.964178][T25295] ? anon_vma_clone+0x8d/0x380 [ 1665.968968][T25295] __should_failslab+0x81/0x90 [ 1665.973723][T25295] should_failslab+0x5/0x20 [ 1665.978225][T25295] kmem_cache_alloc+0x46/0x2e0 [ 1665.983029][T25295] anon_vma_clone+0x8d/0x380 [ 1665.987599][T25295] anon_vma_fork+0x54/0x2b0 [ 1665.992079][T25295] dup_mmap+0x49c/0x9c0 [ 1665.996216][T25295] dup_mm+0x7c/0x210 [ 1666.000098][T25295] copy_process+0x144f/0x2f70 [ 1666.004765][T25295] kernel_clone+0x14b/0x680 [ 1666.009281][T25295] ? __fget_light+0x21b/0x260 [ 1666.014000][T25295] __do_sys_fork+0x3a/0x60 [ 1666.018406][T25295] do_syscall_64+0x3d/0x90 [ 1666.022818][T25295] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1666.028691][T25295] RIP: 0033:0x4665e9 [ 1666.032568][T25295] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1666.052170][T25295] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 17:08:41 executing program 0: r0 = semget$private(0x0, 0x4, 0x4c4) semop(r0, &(0x7f0000000000)=[{0x3}, {0x0, 0xff01, 0x1800}], 0x2) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) semget$private(0x0, 0x4, 0x22a) semctl$GETZCNT(r0, 0x2, 0xf, &(0x7f0000000040)=""/45) r1 = semget(0x2, 0x3, 0x71) semctl$GETNCNT(r1, 0x1, 0xe, &(0x7f0000000080)) 17:08:41 executing program 2: semop(0x0, 0x0, 0x1a) r0 = semget$private(0x0, 0x3, 0x34) semctl$IPC_INFO(r0, 0x1, 0x3, &(0x7f0000000000)=""/177) 17:08:41 executing program 5: semop(0x0, 0x0, 0x1f4) r0 = semget$private(0x0, 0x7, 0x40) semctl$IPC_INFO(r0, 0x4, 0x3, &(0x7f0000000000)=""/180) 17:08:41 executing program 5: semop(0x0, 0x0, 0x1f4) semctl$GETVAL(0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000000)=""/254) r0 = semget(0x3, 0x4, 0x4) semop(r0, &(0x7f00000011c0)=[{0x0, 0x2, 0x800}, {0x3, 0x4, 0x800}, {0x4, 0x800, 0x1000}, {0x4, 0x100, 0x1000}, {0x0, 0x9, 0x1000}, {0x4, 0x1f, 0x800}], 0x6) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_STAT(r1, 0x4, 0x12, &(0x7f0000000140)=""/4096) r2 = semget(0x0, 0x1, 0x1a) r3 = semget$private(0x0, 0x4, 0x45) semctl$GETVAL(r3, 0x3, 0xc, &(0x7f0000001200)=""/201) semctl$SEM_STAT_ANY(0x0, 0x2, 0x14, &(0x7f0000001180)=""/59) semop(r2, &(0x7f0000000100)=[{0x3, 0x9, 0xc00}, {0x3, 0x6, 0x1800}, {0x4, 0x4}, {0x4, 0x1f}, {0x2, 0x800, 0x1800}], 0x5) 17:08:41 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x90180, 0x0) setsockopt$packet_buf(r1, 0x107, 0x16, &(0x7f0000000040)="45ee801b4400a3999f1f0eebfd6f7e7c5d0948a757743f79eb3d6be062f3cf27bf0d8d0043c2e2870b431cd6f1d0e491f03cffab760d5c5038ce241d760da845b885d727ba77c2a6b20537380b5e9fdf28214abdfb58425c11ddbc9234d8a413d5c60f8261d9b7c5e2b2101a9c465535feeae1bb64d5ebd2bfe44123475d0393efabe4afcf1ea0c4b4b52cd6ec2a99d65b0cd1028b1e01f825fad47a9e402b429056c0682bd85c012405e64ef8a0ac22d5ecca3b67d46c586b8e9153a355a9da95dc2c28dcbbe11b502533a0f5c8b2f2946ec5daa189e19d400a26ae068c49011ed66abcc47d9b3aef4dfc6f5f", 0xed) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 17:08:41 executing program 2: semop(0xffffffffffffffff, 0x0, 0x0) [ 1666.060578][T25295] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1666.068569][T25295] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1666.076535][T25295] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1666.084493][T25295] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1666.092468][T25295] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:41 executing program 4 (fault-call:3 fault-nth:24): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() [ 1666.190802][T25326] FAULT_INJECTION: forcing a failure. [ 1666.190802][T25326] name failslab, interval 1, probability 0, space 0, times 0 [ 1666.203444][T25326] CPU: 1 PID: 25326 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1666.212223][T25326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1666.222265][T25326] Call Trace: [ 1666.225529][T25326] dump_stack_lvl+0xb7/0x103 [ 1666.230104][T25326] dump_stack+0x11/0x1a [ 1666.234250][T25326] should_fail+0x23c/0x250 [ 1666.238719][T25326] ? dup_mmap+0x38e/0x9c0 [ 1666.243104][T25326] __should_failslab+0x81/0x90 [ 1666.247850][T25326] should_failslab+0x5/0x20 [ 1666.252333][T25326] kmem_cache_alloc+0x46/0x2e0 [ 1666.257080][T25326] dup_mmap+0x38e/0x9c0 [ 1666.261216][T25326] dup_mm+0x7c/0x210 [ 1666.265127][T25326] copy_process+0x144f/0x2f70 [ 1666.269796][T25326] kernel_clone+0x14b/0x680 [ 1666.274324][T25326] ? __fget_light+0x21b/0x260 [ 1666.278980][T25326] __do_sys_fork+0x3a/0x60 [ 1666.283378][T25326] do_syscall_64+0x3d/0x90 [ 1666.287835][T25326] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1666.293774][T25326] RIP: 0033:0x4665e9 [ 1666.297720][T25326] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1666.317322][T25326] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1666.325720][T25326] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1666.333683][T25326] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1666.341634][T25326] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1666.349585][T25326] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1666.357548][T25326] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:41 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) semtimedop(0xffffffffffffffff, &(0x7f0000000040)=[{0x3, 0x800, 0x1800}, {0x2, 0x1609, 0xc00}, {0x4, 0x9, 0xc00}, {0x3, 0x7, 0x1800}, {0x3, 0x6, 0x800}, {0x4, 0x1f, 0x1800}, {0x0, 0x5}, {0x4, 0x63, 0x3000}, {0x2, 0x4, 0x1000}], 0x9, &(0x7f0000000080)) semget$private(0x0, 0x4, 0x400) r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETZCNT(r0, 0x1, 0xf, &(0x7f00000000c0)=""/195) 17:08:41 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{0x4, 0x0, 0x1000}, {0x0, 0xff01}], 0x2) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) r1 = semget(0x1, 0x1, 0x201) semop(r1, &(0x7f00000001c0)=[{0x4, 0x919d, 0x1800}, {0x3, 0xb01}, {0x2, 0x6, 0x1000}, {0x0, 0x9, 0x1800}, {0x2, 0x8, 0x800}, {0x2, 0x8, 0x1000}, {0x1}, {0x3, 0x7, 0x800}, {0x2, 0x9, 0x800}], 0x9) semctl$GETZCNT(r1, 0x1, 0xf, &(0x7f00000000c0)=""/236) semctl$GETZCNT(r0, 0x3, 0xf, &(0x7f0000000040)=""/94) 17:08:41 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000001040)='cgroup.threads\x00', 0x2, 0x0) semop(0x0, 0x0, 0x1f4) semctl$SEM_STAT(0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000000)=""/4096) 17:08:41 executing program 2: semop(0xffffffffffffffff, 0x0, 0xfffffffffffffe81) 17:08:41 executing program 4 (fault-call:3 fault-nth:25): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:41 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), r0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000280)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_DEV(r1, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r2, 0x10, 0x70bd27, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x30}}, 0x20008000) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan3\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000100)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000580)={0x58, r4, 0x10, 0x7f, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_MAX_CSMA_BACKOFFS={0x5, 0x12, 0x9}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_MAX_CSMA_BACKOFFS={0x5, 0x12, 0x38}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r7}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x58}, 0x1, 0x0, 0x0, 0x200460c1}, 0x4000) r8 = socket$packet(0x11, 0x3, 0x300) r9 = syz_genetlink_get_family_id$nl802154(&(0x7f00000003c0), r0) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000400)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_GET_SEC_DEV(r1, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x38, r9, 0x300, 0x70bd2b, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r10}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x38}}, 0x4080) recvfrom$packet(r8, 0x0, 0x0, 0x2000, 0x0, 0x0) [ 1666.797831][T25341] FAULT_INJECTION: forcing a failure. [ 1666.797831][T25341] name failslab, interval 1, probability 0, space 0, times 0 [ 1666.810479][T25341] CPU: 1 PID: 25341 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1666.819374][T25341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1666.829428][T25341] Call Trace: [ 1666.832700][T25341] dump_stack_lvl+0xb7/0x103 [ 1666.837299][T25341] dump_stack+0x11/0x1a [ 1666.841454][T25341] should_fail+0x23c/0x250 17:08:42 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)=""/113, &(0x7f00000000c0)=0x71) 17:08:42 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semctl$GETNCNT(r0, 0x0, 0xe, &(0x7f0000000040)) semop(r0, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) 17:08:42 executing program 2: semop(0x0, 0x0, 0x1a) r0 = semget$private(0x0, 0x4, 0x400) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000000)=""/132) [ 1666.845880][T25341] ? anon_vma_fork+0x117/0x2b0 [ 1666.850647][T25341] __should_failslab+0x81/0x90 [ 1666.855412][T25341] should_failslab+0x5/0x20 [ 1666.859942][T25341] kmem_cache_alloc+0x46/0x2e0 [ 1666.864747][T25341] ? anon_vma_fork+0xb1/0x2b0 [ 1666.869423][T25341] anon_vma_fork+0x117/0x2b0 [ 1666.874018][T25341] dup_mmap+0x49c/0x9c0 [ 1666.878207][T25341] dup_mm+0x7c/0x210 [ 1666.882098][T25341] copy_process+0x144f/0x2f70 [ 1666.886803][T25341] kernel_clone+0x14b/0x680 [ 1666.891317][T25341] ? __fget_light+0x21b/0x260 17:08:42 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r3, 0x0, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r5, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0x38}}, 0x10) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(r3, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000080)={0x3c, r5, 0x300, 0x70bd29, 0x25dfdbfb, {}, [@NL802154_ATTR_MAX_CSMA_BACKOFFS={0x5, 0x12, 0x8}, @NL802154_ATTR_MAX_CSMA_BACKOFFS={0x5, 0x12, 0x80}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20004850}, 0x4000) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r2, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0x38}}, 0x10) sendmsg$NL802154_CMD_NEW_INTERFACE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0004252b8598955f24d2dcd9bd7000fedbdf25070000000c000600030000000300000008000500000000000c00170093529e58f170087d08000100020000000c0017000202aaaaaaaaaaaa08000100020000000a0004007770616e3100000008000100030000005c29c8f07376d2eada29d2fa7de5fb4b7dcc4c14f6e05588ef"], 0x64}, 0x1, 0x0, 0x0, 0x20008844}, 0x40) semop(0x0, 0x0, 0x1f4) [ 1666.895987][T25341] __do_sys_fork+0x3a/0x60 [ 1666.900410][T25341] do_syscall_64+0x3d/0x90 [ 1666.904877][T25341] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1666.910835][T25341] RIP: 0033:0x4665e9 [ 1666.914720][T25341] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1666.934321][T25341] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 17:08:42 executing program 5: semop(0x0, 0x0, 0x1f4) r0 = semget(0x3, 0x3, 0x6) r1 = semget$private(0x0, 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) semctl$SETVAL(r1, 0x3, 0x10, &(0x7f00000001c0)=0x6) semctl$SEM_STAT(r0, 0x1, 0x12, &(0x7f00000000c0)=""/215) request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='\x00', 0x0) [ 1666.942759][T25341] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1666.950772][T25341] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1666.958813][T25341] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1666.966778][T25341] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1666.974863][T25341] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:42 executing program 2: semop(0x0, 0x0, 0x1a) semop(0xffffffffffffffff, &(0x7f0000000000)=[{0x2, 0x0, 0x1000}, {0x4, 0x9, 0x800}, {0x4, 0x6, 0x800}, {0x2, 0x800, 0x1800}], 0x4) 17:08:42 executing program 1: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000200)=[0x4, 0x3]) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000100)=""/252) semctl$SETVAL(r0, 0x3, 0x10, &(0x7f0000000040)=0x5) clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) 17:08:42 executing program 5: semop(0x0, 0x0, 0x1f4) r0 = semget(0x0, 0x4, 0x48) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETPID(r1, 0x1, 0xb, &(0x7f0000000100)=""/157) semctl$GETNCNT(r0, 0x0, 0xe, &(0x7f0000000000)=""/228) r2 = semget$private(0x0, 0x3, 0x81) semctl$GETNCNT(r2, 0x1, 0xe, &(0x7f00000001c0)=""/185) 17:08:42 executing program 2: semop(0x0, 0x0, 0x1a) r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)=[0x1]) 17:08:42 executing program 5: semop(0xffffffffffffffff, 0x0, 0xfd10) 17:08:42 executing program 4 (fault-call:3 fault-nth:26): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:42 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r1, 0x0, 0x0) setsockopt$packet_buf(r1, 0x107, 0x6, &(0x7f0000000000)="405f0d57f1b7331e30eabb890c653e4d0ee8d7d1c57c5a42b6e3bbcc929fbea0946b03b015f70e2aa941f96fd79b3f6c74b3eafe9db6f17c4a895e0b283a8abdadaa", 0x42) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 17:08:42 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x1, &(0x7f0000000040), 0x0) [ 1667.177144][T25408] FAULT_INJECTION: forcing a failure. [ 1667.177144][T25408] name failslab, interval 1, probability 0, space 0, times 0 [ 1667.189780][T25408] CPU: 0 PID: 25408 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1667.198627][T25408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1667.208770][T25408] Call Trace: [ 1667.212038][T25408] dump_stack_lvl+0xb7/0x103 [ 1667.216633][T25408] dump_stack+0x11/0x1a [ 1667.220905][T25408] should_fail+0x23c/0x250 [ 1667.225340][T25408] ? anon_vma_clone+0x8d/0x380 [ 1667.230289][T25408] __should_failslab+0x81/0x90 [ 1667.235049][T25408] should_failslab+0x5/0x20 [ 1667.239547][T25408] kmem_cache_alloc+0x46/0x2e0 [ 1667.244330][T25408] anon_vma_clone+0x8d/0x380 [ 1667.248913][T25408] anon_vma_fork+0x54/0x2b0 [ 1667.253413][T25408] dup_mmap+0x49c/0x9c0 [ 1667.257571][T25408] dup_mm+0x7c/0x210 [ 1667.261443][T25408] copy_process+0x144f/0x2f70 [ 1667.266121][T25408] kernel_clone+0x14b/0x680 [ 1667.270606][T25408] ? __fget_light+0x21b/0x260 [ 1667.275258][T25408] __do_sys_fork+0x3a/0x60 [ 1667.279655][T25408] do_syscall_64+0x3d/0x90 [ 1667.284065][T25408] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1667.290110][T25408] RIP: 0033:0x4665e9 [ 1667.293992][T25408] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1667.313712][T25408] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1667.322178][T25408] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1667.330130][T25408] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1667.338085][T25408] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1667.346031][T25408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1667.353980][T25408] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:43 executing program 0: r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SMC_PNETID_FLUSH(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x58, r0, 0x1, 0x70bd28, 0x25dfdbfb, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'vlan0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x6}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x40000c0) r1 = semget$private(0x0, 0x4, 0x0) semop(r1, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) semctl$GETNCNT(r1, 0x1, 0xe, 0x0) 17:08:43 executing program 2: semop(0x0, 0x0, 0x1a) semtimedop(0x0, &(0x7f0000000000)=[{0x1, 0xde, 0x1400}], 0x1, &(0x7f0000000040)) r0 = semget$private(0x0, 0x1, 0x10) semctl$GETNCNT(r0, 0x3, 0xe, &(0x7f00000000c0)=""/65) semget$private(0x0, 0x2, 0x505) semop(r0, &(0x7f0000000080)=[{0x2}, {0x3, 0x121}, {0x2, 0xffa7}, {0x2, 0x7, 0x1800}, {0x3, 0xb142}, {0x0, 0x5814, 0x800}, {0x1, 0x7, 0x1000}, {0x0, 0x1f, 0x1800}, {0x3, 0x0, 0x1800}], 0x9) 17:08:43 executing program 5: semop(0x0, 0x0, 0x1f4) r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SETVAL(r0, 0x1, 0x10, &(0x7f0000000000)=0x1) 17:08:43 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) semtimedop(0xffffffffffffffff, &(0x7f0000000040)=[{0x3, 0x6, 0x1000}, {0x2, 0x1f, 0x800}, {0x2, 0x401, 0x1800}, {0x3, 0x401, 0x1000}, {0x0, 0x6, 0x800}, {0x3, 0x3, 0x1000}, {0x3, 0x0, 0x1000}, {0x4, 0x4ae, 0x1800}, {0x1, 0x0, 0x800}], 0x9, &(0x7f0000000080)) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x58, 0x0, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_LEVEL={0x1c, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0xff}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x68}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}]}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x21ffe835e74df93e}]}, 0x58}, 0x1, 0x0, 0x0, 0x8055}, 0x440d1) 17:08:43 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={0x0, 0x1, 0x6}, 0x10) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 17:08:43 executing program 4 (fault-call:3 fault-nth:27): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() [ 1667.926699][T25427] FAULT_INJECTION: forcing a failure. [ 1667.926699][T25427] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1667.939943][T25427] CPU: 1 PID: 25427 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1667.948695][T25427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1667.958740][T25427] Call Trace: [ 1667.962015][T25427] dump_stack_lvl+0xb7/0x103 [ 1667.966606][T25427] dump_stack+0x11/0x1a [ 1667.970748][T25427] should_fail+0x23c/0x250 17:08:43 executing program 1: r0 = fsmount(0xffffffffffffffff, 0x1, 0x73) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000000)='{9$-%/\x00', &(0x7f0000000040)='./file0\x00', r1) clock_nanosleep(0x7ac95975953878d7, 0x639c750282a7062d, 0x0, 0x0) 17:08:43 executing program 5: r0 = semget(0x1, 0x3, 0x1a) semctl$SEM_STAT_ANY(r0, 0x1, 0x14, &(0x7f0000000080)=""/74) semget(0x3, 0x0, 0x305) r1 = semget(0x0, 0x1, 0x1a) r2 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETNCNT(r2, 0x2, 0xe, &(0x7f00000001c0)=""/157) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SETVAL(r0, 0x4, 0x10, &(0x7f0000000280)=0x7) semget$private(0x0, 0x3, 0x100) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000100)=""/150) semctl$GETZCNT(r0, 0x0, 0xf, &(0x7f0000000000)=""/24) semctl$GETNCNT(r1, 0x1, 0xe, &(0x7f0000000040)=""/62) 17:08:43 executing program 2: semget$private(0x0, 0x0, 0x20) r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) r2 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000080)=""/83) semget$private(0x0, 0x4, 0x2) semop(r0, 0x0, 0xffffffffffffff04) [ 1667.975165][T25427] __alloc_pages+0x102/0x320 [ 1667.979748][T25427] alloc_pages+0x2e8/0x340 [ 1667.984160][T25427] __pmd_alloc+0x47/0x310 [ 1667.988481][T25427] ? __pud_alloc+0x159/0x190 [ 1667.993082][T25427] copy_page_range+0x695/0x8e0 [ 1667.997840][T25427] ? __rb_insert_augmented+0x7f/0x350 [ 1668.003215][T25427] ? up_write+0x25/0xc0 [ 1668.007371][T25427] dup_mmap+0x6ab/0x9c0 [ 1668.011523][T25427] dup_mm+0x7c/0x210 [ 1668.015406][T25427] copy_process+0x144f/0x2f70 [ 1668.020070][T25427] kernel_clone+0x14b/0x680 17:08:43 executing program 5: semop(0x0, 0x0, 0x205) [ 1668.024563][T25427] ? __fget_light+0x21b/0x260 [ 1668.029239][T25427] __do_sys_fork+0x3a/0x60 [ 1668.033648][T25427] do_syscall_64+0x3d/0x90 [ 1668.038068][T25427] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1668.044137][T25427] RIP: 0033:0x4665e9 [ 1668.048023][T25427] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1668.067633][T25427] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 17:08:43 executing program 2: r0 = semget$private(0x0, 0x0, 0x220) semop(r0, 0x0, 0xfffffffffffffd9a) semctl$SEM_INFO(0xffffffffffffffff, 0x4, 0x13, &(0x7f0000000000)=""/255) 17:08:43 executing program 1: sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x1, 0x70bd25, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x40005}, 0x4000000) clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) [ 1668.076040][T25427] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1668.084006][T25427] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1668.091965][T25427] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1668.099928][T25427] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1668.107888][T25427] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:43 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) semop(r0, &(0x7f0000000000)=[{0x1, 0x1000, 0x1800}], 0x1) 17:08:43 executing program 5: sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x40, 0x0, 0x20, 0x70bd25, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0xd}}]}, 0x40}, 0x1, 0x0, 0x0, 0x20040000}, 0x24000840) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ff6000/0x7000)=nil, 0x7000}, &(0x7f0000000040)=0x10) r0 = semget(0x1, 0xb, 0x80) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) r2 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000080)=""/83) semget(0x0, 0x0, 0x52) semget(0x1, 0x1, 0x409) semop(r2, 0x0, 0x0) semctl$SEM_STAT(r0, 0x0, 0x12, &(0x7f0000000100)=""/4096) 17:08:43 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) connect$packet(r1, &(0x7f0000000040)={0x11, 0x6, 0x0, 0x1, 0xfb, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) fsmount(r1, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x1ff, 0x7, 0x1ff, 0xcea8, 0x8}, 0x1c) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 17:08:43 executing program 2: semop(0x0, 0x0, 0x1a) r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETZCNT(r0, 0x0, 0xf, &(0x7f0000000000)=""/251) 17:08:43 executing program 4 (fault-call:3 fault-nth:28): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:43 executing program 1: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_nanosleep(0x7ac95975953878d7, 0x1, &(0x7f0000000040)={r0, r1+60000000}, 0x0) 17:08:43 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, r2) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) r5 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r5, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_INFO(r5, 0x0, 0x13, &(0x7f0000000940)=""/4096) keyctl$search(0xa, r4, &(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x1}, r3) r6 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r6) semctl$SETALL(r5, 0x0, 0x11, &(0x7f0000000340)=[0xffff, 0x800, 0x8b, 0x6]) keyctl$get_persistent(0x16, 0xee00, r6) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r3) semctl$SEM_STAT_ANY(0x0, 0x3, 0x14, &(0x7f00000001c0)=""/48) 17:08:43 executing program 5: semop(0x0, 0x0, 0x1f4) r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) r1 = semget(0x1, 0x3, 0x0) semctl$GETZCNT(r1, 0x3, 0xf, &(0x7f0000001000)=""/17) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000001040)=""/73) semctl$SEM_STAT_ANY(r0, 0x0, 0x14, &(0x7f0000000000)=""/4096) [ 1668.808423][T25467] FAULT_INJECTION: forcing a failure. [ 1668.808423][T25467] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1668.821665][T25467] CPU: 0 PID: 25467 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1668.830442][T25467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1668.840491][T25467] Call Trace: [ 1668.843765][T25467] dump_stack_lvl+0xb7/0x103 [ 1668.848354][T25467] dump_stack+0x11/0x1a [ 1668.852497][T25467] should_fail+0x23c/0x250 17:08:44 executing program 1: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_nanosleep(0x3, 0x1, &(0x7f0000000040)={r0, r1+60000000}, 0x0) [ 1668.856913][T25467] __alloc_pages+0x102/0x320 [ 1668.861495][T25467] alloc_pages+0x2e8/0x340 [ 1668.865909][T25467] pte_alloc_one+0x29/0xb0 [ 1668.870342][T25467] __pte_alloc+0x2f/0x210 [ 1668.874667][T25467] copy_pte_range+0x126e/0x1470 [ 1668.879514][T25467] copy_page_range+0x5da/0x8e0 [ 1668.884292][T25467] ? up_write+0x25/0xc0 [ 1668.888435][T25467] dup_mmap+0x6ab/0x9c0 [ 1668.892669][T25467] dup_mm+0x7c/0x210 [ 1668.896556][T25467] copy_process+0x144f/0x2f70 [ 1668.901230][T25467] kernel_clone+0x14b/0x680 17:08:44 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semop(r1, &(0x7f0000000040)=[{}, {0x3, 0xff44}, {0x0, 0x9a7, 0xc00}], 0x3) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) 17:08:44 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) sched_rr_get_interval(0xffffffffffffffff, &(0x7f0000000040)) [ 1668.905727][T25467] ? __fget_light+0x21b/0x260 [ 1668.910396][T25467] __do_sys_fork+0x3a/0x60 [ 1668.914812][T25467] do_syscall_64+0x3d/0x90 [ 1668.919312][T25467] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1668.925203][T25467] RIP: 0033:0x4665e9 [ 1668.929116][T25467] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1668.948717][T25467] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 17:08:44 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0xf0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r1, 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', r0) r2 = syz_genetlink_get_family_id$smc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, r2, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'wlan0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4080}, 0x4) 17:08:44 executing program 2: semop(0x0, 0x0, 0x1a) semctl$SEM_STAT(0x0, 0x2, 0x12, &(0x7f00000000c0)=""/122) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000140)=""/8) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240), 0xffffffffffffffff) r2 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETZCNT(r2, 0x4, 0xf, &(0x7f00000003c0)) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x88, r1, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x4cb}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}]}, 0x88}, 0x1, 0x0, 0x0, 0x6a810}, 0x8088) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000000)=0x4) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000040)=""/119) semctl$GETNCNT(0x0, 0x2, 0xe, &(0x7f0000000180)=""/79) [ 1668.957127][T25467] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1668.965090][T25467] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1668.973052][T25467] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1668.981885][T25467] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1668.989851][T25467] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:44 executing program 4 (fault-call:3 fault-nth:29): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:44 executing program 3: fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000000)='@&]@@\x00', 0x0, 0xffffffffffffffff) r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 17:08:44 executing program 5: semop(0x0, 0x0, 0x1f4) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f00000000c0), r1) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_LISTALL(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r2, 0x1}, 0x14}}, 0x0) sendmsg$NLBL_CALIPSO_C_LISTALL(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x100, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x20000000) 17:08:44 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r1 = fsmount(r0, 0x0, 0x0) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000080)=0x14) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000000c0)=0x0) sched_rr_get_interval(r2, &(0x7f0000000100)) [ 1669.072114][T25497] FAULT_INJECTION: forcing a failure. [ 1669.072114][T25497] name failslab, interval 1, probability 0, space 0, times 0 [ 1669.084801][T25497] CPU: 0 PID: 25497 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1669.093555][T25497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1669.103657][T25497] Call Trace: [ 1669.106929][T25497] dump_stack_lvl+0xb7/0x103 [ 1669.111515][T25497] dump_stack+0x11/0x1a [ 1669.115661][T25497] should_fail+0x23c/0x250 17:08:44 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000100)={0x35, 0x4, 0x4, 0x3f, 0x9}, 0x14) r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semtimedop(r0, &(0x7f0000000040)=[{0x3, 0x8, 0x2800}, {0x0, 0x1, 0x1800}, {0x2, 0x8000}, {0x0, 0x2, 0x1800}, {0x0, 0x6, 0x1800}, {0x1, 0xf000, 0x1000}, {0x4, 0xb4}, {0x4, 0xc7a6, 0x1000}], 0x8, &(0x7f0000000080)={0x0, 0x989680}) 17:08:44 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semget$private(0x0, 0x3, 0x1) semop(r0, &(0x7f0000000000)=[{0x3, 0xfffc, 0x1000}, {0x0, 0xff01}], 0x2) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_STAT_ANY(r1, 0x2, 0x14, &(0x7f0000000040)=""/176) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) [ 1669.120129][T25497] ? anon_vma_fork+0x117/0x2b0 [ 1669.124904][T25497] __should_failslab+0x81/0x90 [ 1669.129667][T25497] should_failslab+0x5/0x20 [ 1669.134406][T25497] kmem_cache_alloc+0x46/0x2e0 [ 1669.139324][T25497] ? anon_vma_fork+0xb1/0x2b0 [ 1669.144021][T25497] anon_vma_fork+0x117/0x2b0 [ 1669.148610][T25497] dup_mmap+0x49c/0x9c0 [ 1669.152768][T25497] dup_mm+0x7c/0x210 [ 1669.156658][T25497] copy_process+0x144f/0x2f70 [ 1669.161364][T25497] kernel_clone+0x14b/0x680 [ 1669.165962][T25497] ? __fget_light+0x21b/0x260 [ 1669.170636][T25497] __do_sys_fork+0x3a/0x60 [ 1669.175049][T25497] do_syscall_64+0x3d/0x90 [ 1669.179456][T25497] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1669.185350][T25497] RIP: 0033:0x4665e9 [ 1669.189235][T25497] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1669.209271][T25497] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 17:08:44 executing program 5: semop(0x0, 0x0, 0x0) semctl$GETPID(0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000000)=""/162) r0 = semget(0x3, 0x1, 0x90) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_STAT(r0, 0x0, 0x12, &(0x7f0000000240)=""/144) semctl$GETVAL(0x0, 0x2, 0xc, &(0x7f0000000180)=""/163) semctl$SEM_STAT(r0, 0x0, 0x12, &(0x7f0000000100)=""/108) semctl$IPC_INFO(r0, 0x1, 0x3, &(0x7f00000000c0)=""/40) 17:08:44 executing program 2: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@timestamp], 0x1) r0 = request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='+\x00', 0xfffffffffffffff9) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r2, 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r3, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000140), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000100)=ANY=[@ANYRES32=r3, @ANYRES32=r0, @ANYRES16=r0, @ANYRESDEC=r2, @ANYRES16, @ANYRESDEC=r3, @ANYRES64=r3], 0x8, r1) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) keyctl$unlink(0x9, r0, r1) semop(0x0, 0x0, 0x1a) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0x8040, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r4, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x38, 0x0, 0x10, 0x6, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x90000}}]}, 0x38}, 0x1, 0x0, 0x0, 0x88}, 0x20000800) 17:08:44 executing program 1: clock_nanosleep(0x1, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) 17:08:44 executing program 5: r0 = semget(0x0, 0x1, 0x1a) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000100)=""/85) semop(r0, 0x0, 0x0) [ 1669.217678][T25497] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1669.225701][T25497] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1669.233700][T25497] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1669.241664][T25497] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1669.249631][T25497] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:44 executing program 4 (fault-call:3 fault-nth:30): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:44 executing program 3: ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x2000, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x1, 0x0) r1 = fsmount(r0, 0x0, 0xf) recvfrom$packet(r1, &(0x7f0000000280)=""/191, 0xbf, 0x40, &(0x7f0000000340)={0x11, 0x2, 0x0, 0x1, 0x1, 0x6, @multicast}, 0x14) r2 = accept4$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14, 0x80800) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000380)={0x1, 0x1, 0x80000001, 0x0, 0xfffffff8, 0x4}) r3 = accept4$packet(r2, 0x0, &(0x7f00000001c0), 0x800) recvfrom$packet(r3, &(0x7f0000000040)=""/165, 0xa5, 0x2140, &(0x7f0000000100)={0x11, 0x9, 0x0, 0x1, 0xe0, 0x6, @remote}, 0x14) fsmount(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000240)=0x10) 17:08:44 executing program 2: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/72) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='{\x00', 0xfffffffffffffffc) r1 = semget(0x1, 0x3, 0x40) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000000)=""/2) semctl$SEM_STAT(r0, 0x4, 0x12, &(0x7f00000001c0)=""/177) r2 = msgget(0x0, 0x248) msgctl$IPC_RMID(r2, 0x0) msgctl$MSG_STAT(r2, 0xb, &(0x7f0000000040)=""/12) semop(0x0, 0x0, 0x1a) 17:08:44 executing program 5: r0 = socket(0x9b2bd4a874b9f681, 0x2, 0x400) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'erspan0\x00', &(0x7f0000000240)={'gre0\x00', 0x0, 0x0, 0x1, 0x2, 0x8, {{0x2b, 0x4, 0x0, 0x9, 0xac, 0x66, 0x0, 0x0, 0x2f, 0x0, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_addr={0x44, 0x34, 0x5c, 0x1, 0x1, [{@remote, 0x77}, {@multicast2, 0x6}, {@dev={0xac, 0x14, 0x14, 0x3c}, 0x8}, {@rand_addr=0x64010102, 0x80000000}, {@loopback}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1}]}, @end, @timestamp={0x44, 0xc, 0x3c, 0x0, 0x8, [0x8, 0x1000]}, @noop, @timestamp={0x44, 0xc, 0xe1, 0x0, 0x8, [0x4, 0x7ff]}, @end, @timestamp_addr={0x44, 0x44, 0x84, 0x1, 0xe, [{@dev={0xac, 0x14, 0x14, 0x33}, 0x6}, {@multicast1, 0x3}, {@local, 0xfffffffe}, {@dev={0xac, 0x14, 0x14, 0x2f}, 0x7ff}, {@local, 0x20}, {@local, 0x5}, {@local, 0x4}, {@multicast2, 0x9}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'syztnl1\x00', &(0x7f0000000140)={'syztnl1\x00', r1, 0x20, 0x10, 0x3, 0x4, {{0x22, 0x4, 0x0, 0x2, 0x88, 0x66, 0x0, 0x1, 0x29, 0x0, @empty, @broadcast, {[@end, @ra={0x94, 0x4}, @rr={0x7, 0x23, 0x8c, [@rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x5, 0x0}, @dev={0xac, 0x14, 0x14, 0x39}, @private=0xa010101, @multicast1, @multicast2, @local, @private=0xa010101]}, @rr={0x7, 0xf, 0xb3, [@broadcast, @private=0xa010100, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_prespec={0x44, 0x24, 0x8d, 0x3, 0x3, [{@empty, 0x5}, {@private=0xa010102, 0x1}, {@multicast2, 0x1}, {@broadcast, 0x7}]}, @timestamp={0x44, 0x18, 0x48, 0x0, 0x3, [0x400, 0x8001, 0x2, 0x10000, 0x55f]}]}}}}}) r2 = semget(0x2, 0x3, 0x400) semop(r2, 0x0, 0x0) 17:08:44 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x12, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 17:08:44 executing program 5: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) r1 = semget$private(0x0, 0x3, 0xc04) semop(r1, 0x0, 0x19d1bc7a6a0d95fb) [ 1669.383343][T25535] FAULT_INJECTION: forcing a failure. [ 1669.383343][T25535] name failslab, interval 1, probability 0, space 0, times 0 [ 1669.396133][T25535] CPU: 1 PID: 25535 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1669.404889][T25535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1669.415029][T25535] Call Trace: [ 1669.418418][T25535] dump_stack_lvl+0xb7/0x103 [ 1669.423007][T25535] dump_stack+0x11/0x1a [ 1669.427155][T25535] should_fail+0x23c/0x250 17:08:44 executing program 5: syz_genetlink_get_family_id$devlink(&(0x7f0000000280), 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000200)={0x7fffffff, 0xffffffb7, 0xffff5d8a, 0x3, 0xffffffff, 0x7fff}) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) semop(0x0, 0x0, 0x1f4) semctl$IPC_INFO(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000000c0)=""/155) r0 = semget$private(0x0, 0x2, 0x0) semctl$GETVAL(r0, 0x0, 0xc, &(0x7f0000000000)=""/175) semctl$IPC_INFO(r0, 0x4, 0x3, &(0x7f0000000180)=""/20) [ 1669.431577][T25535] ? dup_mmap+0x38e/0x9c0 [ 1669.435915][T25535] __should_failslab+0x81/0x90 [ 1669.440761][T25535] should_failslab+0x5/0x20 [ 1669.445263][T25535] kmem_cache_alloc+0x46/0x2e0 [ 1669.450027][T25535] dup_mmap+0x38e/0x9c0 [ 1669.454179][T25535] dup_mm+0x7c/0x210 [ 1669.458135][T25535] copy_process+0x144f/0x2f70 [ 1669.462841][T25535] kernel_clone+0x14b/0x680 [ 1669.467399][T25535] ? __fget_light+0x21b/0x260 [ 1669.472062][T25535] __do_sys_fork+0x3a/0x60 [ 1669.476648][T25535] do_syscall_64+0x3d/0x90 [ 1669.481062][T25535] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1669.487095][T25535] RIP: 0033:0x4665e9 [ 1669.490973][T25535] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1669.510567][T25535] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1669.519045][T25535] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1669.527082][T25535] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1669.535047][T25535] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1669.543010][T25535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1669.550970][T25535] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:45 executing program 5: semop(0x0, 0x0, 0x1f4) r0 = semget$private(0x0, 0x4, 0x50c) semctl$SEM_INFO(r0, 0x0, 0x13, &(0x7f0000000000)=""/4096) 17:08:45 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x2022, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000080)=@buf={0x55, &(0x7f0000000000)="03611a51820506a8edc3ebad3ecb9642469b4234ae5a8d0cdd0abcc7738ae6fc4c1e64748eca2c2aea6eeebcc938376ff3096036e1b9f08ba85e3f6ac03825eacda08774290006ab10675ebb21aad995a5072fda6d"}) socket(0x1a, 0x5, 0x5) 17:08:45 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) 17:08:45 executing program 4 (fault-call:3 fault-nth:31): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:45 executing program 2: semop(0x0, 0x0, 0x1a) r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x2, 0x14, &(0x7f0000000100)=""/4) r1 = fsmount(0xffffffffffffffff, 0x0, 0x8) fsconfig$FSCONFIG_SET_PATH(r1, 0x3, &(0x7f0000000140)='//+,/\x00', &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000000)=""/243) 17:08:45 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) 17:08:45 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r1, 0x2, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8}]}, 0x3c}}, 0x200000d1) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000), r0) semop(0x0, 0x0, 0x1f4) 17:08:45 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, 0x0, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbfd, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0xffff}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x40000c5) r1 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r1, 0x0, 0x0, 0x2000, 0x0, 0x0) sendmsg$NL802154_CMD_DEL_SEC_KEY(r0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f0000000200)={0x148, 0x0, 0x100, 0x70bd2b, 0x25dfdbfc, {}, [@NL802154_ATTR_SEC_KEY={0x3c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "9fb90921826911f22436ac89c35f3a4f14d4602aebb5d90c803be54cde1f7f80"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "dd33a88c18615fac119a70e088d6b795"}]}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_SEC_KEY={0xec, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x8c, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x3}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x810000}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x200}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc}, @NL802154_KEY_ID_ATTR_IMPLICIT={0xc, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x3}]}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x34, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0102}}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa2}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0xffff}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0202}}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x2}]}, @NL802154_KEY_ID_ATTR_IMPLICIT={0xc, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa0}]}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x9}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x7}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "5fc2fe18390afd96ed83b3e341696c79"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "9c5ca5b62ef81852ed88972c7223f39f"}, @NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "f2600c7208ef4f99f63e0ea1551effd4bf6a247cd591882adb42c727489fad93"}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x800}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) getsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000040), &(0x7f0000000080)=0x4) 17:08:45 executing program 1: clock_nanosleep(0x5, 0x0, &(0x7f0000000040), 0x0) 17:08:45 executing program 2: semop(0x0, 0x0, 0x1a) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000000)=""/13) [ 1670.275520][T25582] FAULT_INJECTION: forcing a failure. [ 1670.275520][T25582] name failslab, interval 1, probability 0, space 0, times 0 [ 1670.288234][T25582] CPU: 1 PID: 25582 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1670.297031][T25582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1670.307133][T25582] Call Trace: [ 1670.310405][T25582] dump_stack_lvl+0xb7/0x103 [ 1670.315015][T25582] dump_stack+0x11/0x1a [ 1670.319196][T25582] should_fail+0x23c/0x250 [ 1670.323602][T25582] ? anon_vma_clone+0x8d/0x380 [ 1670.328434][T25582] __should_failslab+0x81/0x90 [ 1670.333199][T25582] should_failslab+0x5/0x20 [ 1670.337700][T25582] kmem_cache_alloc+0x46/0x2e0 [ 1670.342523][T25582] anon_vma_clone+0x8d/0x380 [ 1670.347118][T25582] anon_vma_fork+0x54/0x2b0 [ 1670.351637][T25582] dup_mmap+0x49c/0x9c0 [ 1670.355802][T25582] dup_mm+0x7c/0x210 [ 1670.359693][T25582] copy_process+0x144f/0x2f70 [ 1670.364371][T25582] kernel_clone+0x14b/0x680 [ 1670.368943][T25582] ? __fget_light+0x21b/0x260 17:08:45 executing program 1: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_nanosleep(0x6, 0x0, &(0x7f0000000000)={r0, r1+10000000}, 0x0) 17:08:45 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000040)=[{}, {0x0, 0xff01, 0x1800}], 0x2) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) r2 = semget(0x3, 0x3, 0xa5) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000100)=""/4096) r3 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r3, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETNCNT(r3, 0x6, 0xe, 0x0) 17:08:45 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x201, 0x0) r1 = fsmount(r0, 0x0, 0x88) sendmsg$DEVLINK_CMD_SB_POOL_GET(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x6c, 0x0, 0x300, 0x70bd26, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x4}, {0x6, 0x11, 0x7}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0xfffff00d}, {0x6, 0x11, 0xf2e}}]}, 0x6c}, 0x1, 0x0, 0x0, 0x44004}, 0x20000000) semop(0x0, 0x0, 0x1a) r2 = syz_genetlink_get_family_id$smc(&(0x7f00000001c0), r1) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r4, 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000380), 0x2, 0x0) sendmsg$SMC_PNETID_DEL(r1, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x88, r2, 0x10, 0x70bd26, 0x25dfdbff, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'bridge_slave_1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv_slave_0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x10}, 0x4008000) 17:08:45 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) 17:08:45 executing program 1: clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_nanosleep(0x6, 0x3c9dd89ef19dac27, &(0x7f0000000000)={r0, r1+10000000}, 0x0) [ 1670.373615][T25582] __do_sys_fork+0x3a/0x60 [ 1670.378080][T25582] do_syscall_64+0x3d/0x90 [ 1670.382495][T25582] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1670.388383][T25582] RIP: 0033:0x4665e9 [ 1670.392258][T25582] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1670.411853][T25582] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1670.420257][T25582] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1670.428219][T25582] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1670.436276][T25582] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1670.444236][T25582] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1670.452204][T25582] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:45 executing program 4 (fault-call:3 fault-nth:32): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:45 executing program 5: r0 = semget(0x0, 0x1, 0x1a) r1 = semget(0x1, 0x0, 0x1a0) semop(r1, &(0x7f0000000000)=[{0x4, 0x66, 0x1000}, {0x1, 0xd000, 0x800}, {0x3, 0x7}, {0x2, 0x5, 0x1800}, {0x0, 0x8, 0x1800}, {0x0, 0x40, 0x800}], 0x6) semget$private(0x0, 0x3, 0x44b) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_STAT(r1, 0x0, 0x12, &(0x7f0000000280)=""/21) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000380)=""/139) r2 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000080)=""/83) r3 = semget(0x0, 0x2, 0x19) r4 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r4, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_STAT_ANY(r4, 0xa263719e92e41705, 0x14, &(0x7f0000000300)=""/83) r5 = msgget(0x0, 0x248) msgctl$IPC_RMID(r5, 0x0) semctl$SEM_STAT(r3, 0x1, 0x12, &(0x7f0000000100)=""/152) semop(r2, 0x0, 0xfffffffffffffef9) semctl$GETVAL(r2, 0x0, 0xc, &(0x7f00000002c0)=""/63) semop(r2, &(0x7f0000000040)=[{0x3, 0x5}, {0x1, 0x8, 0x1800}, {0x1, 0x7, 0x800}, {0x4, 0x8a, 0xa07d8ab5da73b10}, {0x3, 0xeb}], 0x5) semctl$GETZCNT(r3, 0x3, 0xf, &(0x7f00000001c0)=""/191) 17:08:45 executing program 1: clock_nanosleep(0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 17:08:45 executing program 0: semop(0x0, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) semctl$GETNCNT(0x0, 0x1, 0xe, 0x0) 17:08:45 executing program 3: socket$packet(0x11, 0x3, 0x300) 17:08:45 executing program 2: semop(0x0, 0x0, 0x1a) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) semtimedop(0xffffffffffffffff, &(0x7f0000000000)=[{0x3, 0x100, 0x800}, {0x4, 0x1000, 0x1800}, {0x2, 0x1, 0x800}, {0x0, 0x7fff, 0xa88fcc6097a34d43}], 0x4, &(0x7f0000000080)={r0, r1+60000000}) 17:08:45 executing program 2: clock_getres(0x4, &(0x7f0000000000)) semop(0xffffffffffffffff, 0x0, 0x0) [ 1670.559387][T25617] FAULT_INJECTION: forcing a failure. [ 1670.559387][T25617] name failslab, interval 1, probability 0, space 0, times 0 [ 1670.572219][T25617] CPU: 0 PID: 25617 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1670.581034][T25617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1670.591077][T25617] Call Trace: [ 1670.594348][T25617] dump_stack_lvl+0xb7/0x103 [ 1670.598937][T25617] dump_stack+0x11/0x1a [ 1670.603128][T25617] should_fail+0x23c/0x250 17:08:45 executing program 5: semop(0x0, 0x0, 0x1f4) r0 = msgget(0x2, 0x202) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000000)=""/92) 17:08:45 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) semget$private(0x0, 0x2, 0x90) [ 1670.607573][T25617] ? anon_vma_clone+0x8d/0x380 [ 1670.612527][T25617] __should_failslab+0x81/0x90 [ 1670.617400][T25617] should_failslab+0x5/0x20 [ 1670.621931][T25617] kmem_cache_alloc+0x46/0x2e0 [ 1670.626691][T25617] anon_vma_clone+0x8d/0x380 [ 1670.631280][T25617] anon_vma_fork+0x54/0x2b0 [ 1670.635785][T25617] dup_mmap+0x49c/0x9c0 [ 1670.640035][T25617] dup_mm+0x7c/0x210 [ 1670.643933][T25617] copy_process+0x144f/0x2f70 [ 1670.648666][T25617] kernel_clone+0x14b/0x680 [ 1670.653160][T25617] ? __fget_light+0x21b/0x260 17:08:45 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r1, 0x0, 0x844) sendmsg$NL802154_CMD_GET_WPAN_PHY(r1, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, 0x0, 0x821, 0x70bd26, 0x25dfdbfc, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4048054}, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEV(r2, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x58, 0x0, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0xffff}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x3}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000090}, 0x1) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x665874e1a03d5d9e}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000021}, 0x4802) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r3, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000380), r0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r3, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8880}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r4, 0x1, 0x70bd2b, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x40000) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0xd0, 0x0, 0x400, 0x70bd29, 0x25dfdbfc, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x4}, {0x6, 0x11, 0x7}, {0x8, 0x15, 0x1}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x8, 0xb, 0x3}, {0x6, 0x11, 0xfff7}, {0x8, 0x15, 0x5}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8}, {0x6, 0x11, 0x86d}, {0x8, 0x15, 0xfb}}]}, 0xd0}, 0x1, 0x0, 0x0, 0x4}, 0x48000) [ 1670.657829][T25617] __do_sys_fork+0x3a/0x60 [ 1670.662243][T25617] do_syscall_64+0x3d/0x90 [ 1670.666662][T25617] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1670.672561][T25617] RIP: 0033:0x4665e9 [ 1670.676442][T25617] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1670.696042][T25617] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 17:08:45 executing program 2: r0 = semget$private(0x0, 0x1, 0x48) semop(r0, 0x0, 0x0) 17:08:45 executing program 3: semtimedop(0x0, &(0x7f0000000000)=[{0x1, 0xfffd, 0x1800}, {0x3, 0x7, 0x800}, {0x4, 0x8}], 0x3, &(0x7f0000000040)) r0 = semget$private(0x0, 0x4, 0x20) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000080)=[0x2, 0x1, 0x8, 0x39, 0x9b]) r1 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r1, 0x0, 0x0, 0x2000, 0x0, 0x0) 17:08:45 executing program 4 (fault-call:3 fault-nth:33): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() [ 1670.704455][T25617] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1670.712417][T25617] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1670.720377][T25617] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1670.728338][T25617] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1670.736443][T25617] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:45 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000), 0x0) r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) clock_nanosleep(0x6, 0x0, &(0x7f0000000100), &(0x7f0000000180)) semctl$SEM_STAT_ANY(r0, 0x2, 0x14, &(0x7f0000000040)=""/72) 17:08:45 executing program 5: semop(0x0, 0x0, 0x1f4) r0 = semget(0x1, 0x0, 0x200) semctl$GETZCNT(r0, 0x3, 0xf, &(0x7f0000000000)=""/52) r1 = semget(0x1, 0x0, 0x1) semctl$GETPID(r1, 0x0, 0xb, &(0x7f0000000100)=""/213) r2 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$IPC_RMID(r2, 0x0, 0x0) [ 1670.818517][T25652] FAULT_INJECTION: forcing a failure. [ 1670.818517][T25652] name failslab, interval 1, probability 0, space 0, times 0 [ 1670.831145][T25652] CPU: 0 PID: 25652 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1670.839915][T25652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1670.849964][T25652] Call Trace: [ 1670.853235][T25652] dump_stack_lvl+0xb7/0x103 [ 1670.857821][T25652] dump_stack+0x11/0x1a [ 1670.861972][T25652] should_fail+0x23c/0x250 17:08:46 executing program 2: semop(0x0, 0x0, 0x1a) r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$IPC_RMID(r0, 0x0, 0x0) 17:08:46 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r1, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0x38}}, 0x10) sendmsg$NL802154_CMD_SET_TX_POWER(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, r1, 0x10, 0x70bd27, 0x25dfdbfd, {}, [@NL802154_ATTR_TX_POWER={0x8, 0xb, 0x9}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_TX_POWER={0x8, 0xb, 0x7}, @NL802154_ATTR_TX_POWER={0x8, 0xb, 0x190}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x50}, 0x1, 0x0, 0x0, 0x40004}, 0x24808) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r2, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xfc, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}]}, 0xfc}}, 0x40081) clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) [ 1670.866455][T25652] ? anon_vma_fork+0xb1/0x2b0 [ 1670.871130][T25652] __should_failslab+0x81/0x90 [ 1670.875903][T25652] should_failslab+0x5/0x20 [ 1670.880407][T25652] kmem_cache_alloc+0x46/0x2e0 [ 1670.885168][T25652] anon_vma_fork+0xb1/0x2b0 [ 1670.889669][T25652] dup_mmap+0x49c/0x9c0 [ 1670.893843][T25652] dup_mm+0x7c/0x210 [ 1670.897800][T25652] copy_process+0x144f/0x2f70 [ 1670.902471][T25652] kernel_clone+0x14b/0x680 [ 1670.906970][T25652] ? __fget_light+0x21b/0x260 [ 1670.911640][T25652] __do_sys_fork+0x3a/0x60 [ 1670.916068][T25652] do_syscall_64+0x3d/0x90 [ 1670.920656][T25652] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1670.926557][T25652] RIP: 0033:0x4665e9 [ 1670.930439][T25652] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1670.950078][T25652] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1670.958490][T25652] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 17:08:46 executing program 2: semop(0x0, 0x0, 0x1a) r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) r1 = semget(0x0, 0x0, 0x61a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SETVAL(r1, 0x0, 0x10, &(0x7f0000000100)=0xa45) semctl$IPC_INFO(r0, 0x2, 0x3, &(0x7f0000000140)=""/166) semctl$SEM_INFO(r0, 0x1, 0x13, &(0x7f0000000000)=""/254) 17:08:46 executing program 4 (fault-call:3 fault-nth:34): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() [ 1670.966510][T25652] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1670.974606][T25652] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1670.982573][T25652] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1670.990653][T25652] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:46 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xf8, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x2}}, {@pci={{0x8}, {0x11}}, {0x8}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x4}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x5}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x2}}]}, 0xf8}, 0x1, 0x0, 0x0, 0x40054}, 0x48040) [ 1671.067845][T25680] FAULT_INJECTION: forcing a failure. [ 1671.067845][T25680] name failslab, interval 1, probability 0, space 0, times 0 [ 1671.080573][T25680] CPU: 0 PID: 25680 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1671.089334][T25680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1671.099380][T25680] Call Trace: [ 1671.102647][T25680] dump_stack_lvl+0xb7/0x103 [ 1671.107258][T25680] dump_stack+0x11/0x1a [ 1671.111447][T25680] should_fail+0x23c/0x250 [ 1671.116082][T25680] ? anon_vma_fork+0xb1/0x2b0 [ 1671.120757][T25680] __should_failslab+0x81/0x90 [ 1671.125497][T25680] should_failslab+0x5/0x20 [ 1671.130011][T25680] kmem_cache_alloc+0x46/0x2e0 [ 1671.134777][T25680] anon_vma_fork+0xb1/0x2b0 [ 1671.139262][T25680] dup_mmap+0x49c/0x9c0 [ 1671.143524][T25680] dup_mm+0x7c/0x210 [ 1671.147396][T25680] copy_process+0x144f/0x2f70 [ 1671.152066][T25680] kernel_clone+0x14b/0x680 [ 1671.156628][T25680] ? __fget_light+0x21b/0x260 [ 1671.161300][T25680] __do_sys_fork+0x3a/0x60 [ 1671.165693][T25680] do_syscall_64+0x3d/0x90 [ 1671.170163][T25680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1671.176267][T25680] RIP: 0033:0x4665e9 [ 1671.180140][T25680] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1671.199730][T25680] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1671.208205][T25680] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1671.216166][T25680] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1671.224118][T25680] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1671.232092][T25680] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1671.240045][T25680] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:46 executing program 0: r0 = semget$private(0x0, 0x4, 0x8) semop(r0, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) 17:08:46 executing program 2: socket(0x2b, 0x2, 0x6) semop(0x0, 0x0, 0x1a) r0 = semget(0x2, 0x0, 0x0) semctl$SEM_INFO(r0, 0x4, 0x13, &(0x7f0000000000)=""/162) 17:08:46 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x10000, 0x0, 0x0) 17:08:46 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0xac, r1, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@NL802154_ATTR_SEC_OUT_KEY_ID={0x74, 0x20, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x3}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x7}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x44, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x1}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xffff}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa2}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0202}}]}]}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x5}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000001}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0xac}, 0x1, 0x0, 0x0, 0x91}, 0x4) semop(0x0, 0x0, 0x1f4) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r3, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0x38}}, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000380)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r0, &(0x7f0000000540)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000500)={&(0x7f00000003c0)={0x114, r3, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_SEC_OUT_KEY_ID={0x3c, 0x20, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x80}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0xfffffffc}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8}, @NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x3}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x1}]}, @NL802154_ATTR_SEC_FRAME_COUNTER={0x8, 0x21, 0x4}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_FRAME_COUNTER={0x8, 0x21, 0x124}, @NL802154_ATTR_SEC_OUT_KEY_ID={0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}, @NL802154_ATTR_SEC_OUT_KEY_ID={0x7c, 0x20, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_IMPLICIT={0x40, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa3}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0002}}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa3}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0202}}]}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x1}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x28, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa0}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x3}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x2}]}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x6}]}]}, 0x114}, 0x1, 0x0, 0x0, 0x1}, 0x40810) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r5, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"/262, @ANYRES16=r6, @ANYBLOB="200025bd7000ffdbdf25150000000c000600010000000100000008000300", @ANYRES32=0x0, @ANYBLOB="08001f000400000005001e0001000000"], 0x38}}, 0x10) sendmsg$NL802154_CMD_SET_TX_POWER(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x30, r6, 0x10, 0x70bd29, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}, @NL802154_ATTR_TX_POWER={0x8, 0xb, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x1) 17:08:46 executing program 1: clock_nanosleep(0x0, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) 17:08:46 executing program 4 (fault-call:3 fault-nth:35): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:46 executing program 2: r0 = semget(0x3, 0x3, 0x11) semop(r0, 0x0, 0x0) semctl$GETZCNT(r0, 0x3, 0xf, &(0x7f0000000000)=""/107) 17:08:46 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x40010020, 0x0, 0x0) sendto$packet(r0, &(0x7f0000000000)="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", 0x1000, 0x4800, &(0x7f0000001000)={0x11, 0xfa, 0x0, 0x1, 0x5, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x41}}, 0x14) r1 = accept4$packet(r0, &(0x7f0000001040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001080)=0x14, 0x400) getsockopt$packet_int(r1, 0x107, 0x10, &(0x7f00000010c0), &(0x7f0000001100)=0x4) [ 1671.565508][T25699] FAULT_INJECTION: forcing a failure. [ 1671.565508][T25699] name failslab, interval 1, probability 0, space 0, times 0 [ 1671.578150][T25699] CPU: 0 PID: 25699 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1671.586906][T25699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1671.597000][T25699] Call Trace: [ 1671.600274][T25699] dump_stack_lvl+0xb7/0x103 [ 1671.604862][T25699] dump_stack+0x11/0x1a [ 1671.609007][T25699] should_fail+0x23c/0x250 17:08:46 executing program 2: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) r1 = semget$private(0x0, 0x2, 0x1b1) r2 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000080)=""/83) r3 = semget(0x0, 0x1, 0x1a) semctl$SETVAL(r1, 0x3, 0x10, &(0x7f0000000000)=0x1) semctl$SEM_STAT_ANY(r3, 0x3, 0x14, &(0x7f0000000080)=""/83) semop(r3, 0x0, 0xffffffffffffffda) [ 1671.613426][T25699] ? dup_mmap+0x38e/0x9c0 [ 1671.617850][T25699] __should_failslab+0x81/0x90 [ 1671.622605][T25699] should_failslab+0x5/0x20 [ 1671.627104][T25699] kmem_cache_alloc+0x46/0x2e0 [ 1671.631910][T25699] dup_mmap+0x38e/0x9c0 [ 1671.636114][T25699] dup_mm+0x7c/0x210 [ 1671.639997][T25699] copy_process+0x144f/0x2f70 [ 1671.644685][T25699] kernel_clone+0x14b/0x680 [ 1671.649186][T25699] ? __fget_light+0x21b/0x260 [ 1671.653855][T25699] __do_sys_fork+0x3a/0x60 [ 1671.658262][T25699] do_syscall_64+0x3d/0x90 [ 1671.662684][T25699] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1671.668655][T25699] RIP: 0033:0x4665e9 [ 1671.672535][T25699] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1671.692247][T25699] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1671.700689][T25699] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 17:08:46 executing program 2: semop(0x0, 0x0, 0x1a) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) semtimedop(0x0, &(0x7f0000000000)=[{0x3, 0x0, 0x1000}, {0x2, 0x4, 0x800}, {0x3, 0x3, 0x800}], 0x3, &(0x7f0000000080)={r0, r1+10000000}) r2 = semget(0x3, 0x1, 0x100) semtimedop(r2, &(0x7f0000000180)=[{0x4, 0x0, 0x800}, {0x4, 0x18cc, 0x800}, {0x0, 0x9, 0x800}, {0x0, 0x1ff, 0x1000}, {0x4, 0x1ff, 0x1000}, {0x2, 0x64, 0x1800}, {0x4, 0xd4, 0x1400}], 0x7, &(0x7f00000001c0)={0x0, 0x989680}) r3 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)=ANY=[@ANYBLOB="03000000000000006162636465666768696a6bb78aea60707172737475767778797a30313433343536"], 0x29, r3) 17:08:46 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r1, 0x0, 0x0) connect$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @random="7349b5221df5"}, 0x14) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x27, 0x0, 0x1, 0x1}, 0x14) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0xfffd, 0x3f, 0x60, 0xed15}, {0x8, 0x0, 0x0, 0x5}, {0x0, 0x20, 0xf8, 0x498a}]}, 0x10) 17:08:46 executing program 2: semop(0x0, 0x0, 0x1a) semget(0x2, 0x1, 0x0) r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semop(r0, &(0x7f0000000000)=[{0x4, 0x0, 0x2000}, {0x1, 0x4, 0x1000}], 0x2) [ 1671.708657][T25699] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1671.716986][T25699] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1671.724994][T25699] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1671.732979][T25699] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:47 executing program 5: semop(0xffffffffffffffff, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x1, 0x13, &(0x7f0000000000)=""/243) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000100)=""/4096) r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$IPC_INFO(r0, 0x4, 0x3, &(0x7f0000001100)=""/4096) semctl$IPC_RMID(0x0, 0x0, 0x0) semget$private(0x0, 0x2, 0x240) 17:08:47 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) sendto$packet(r1, &(0x7f00000000c0)="eec546ad625056f53242768034cd542275e9bd84c74c9333268fbbf1f517ac9b3b77c8a557d04051e43643f4f1978f18c90bc72dbaae7abd039595f0c8fca51ce73df5f0f6abc644814719b9d5f34c0f3e15d4200c6fcc3f4891204c990303ca4ad9b550b5b4002146ad6f479041e403977d9f1b", 0x74, 0x800, &(0x7f0000000140)={0x11, 0x4, 0x0, 0x1, 0x8, 0x6, @random="93ed5040bae3"}, 0x14) r2 = fsmount(0xffffffffffffffff, 0x0, 0x1) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0xa47, 0x8, 0x6, 0x3f, 0x2, 0x0, 0x3}, 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x22, &(0x7f0000000000)=0x6000000, 0x4) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 17:08:47 executing program 4 (fault-call:3 fault-nth:36): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:47 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) r1 = semget$private(0x0, 0x3, 0x402) semctl$SEM_STAT(r1, 0x3, 0x12, &(0x7f0000000040)=""/13) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) [ 1672.411337][T25753] FAULT_INJECTION: forcing a failure. [ 1672.411337][T25753] name failslab, interval 1, probability 0, space 0, times 0 [ 1672.424034][T25753] CPU: 1 PID: 25753 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1672.424056][T25753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1672.424068][T25753] Call Trace: [ 1672.424076][T25753] dump_stack_lvl+0xb7/0x103 [ 1672.424144][T25753] dump_stack+0x11/0x1a [ 1672.424159][T25753] should_fail+0x23c/0x250 17:08:47 executing program 1: sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x4c, 0x0, 0x8, 0x70bd25, 0x25dfdbfb, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'geneve0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x4c}, 0x1, 0x0, 0x0, 0x804}, 0x0) clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) 17:08:47 executing program 2: semop(0x0, 0x0, 0x1a) r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_STAT_ANY(r0, 0x4, 0x14, &(0x7f0000000000)=""/52) 17:08:47 executing program 5: semop(0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) sendto$packet(r0, &(0x7f0000000000)="d729862c8bd82e149b867ef9d967cc34f79a86e357f6e7bf2d18126706ecd45bcd805d7fd4e4cf74a8bda8253ca67d6e3cabd6ec10461841bff4a00fce941f8f673794a7d81afca7e6bc31494c522944e0aeba072bbc196f4ebfc4d0590e962af95cbad985cb777e2627ed3cb3ed421589420336886b6c056aee476e8c2ee4ff3abe9fcfd3d6a89b16126c8a9187cc4587253875a1b781837826aef2a094aeea4f681826297f4dfecead8b16fee4b6fa56d79628f38247d47a9c9105313d798b3f1dfb3ad4221308c4e63404f0588489fbe04e", 0xd3, 0x4, &(0x7f0000000100)={0x11, 0x10, 0x0, 0x1, 0x1, 0x6, @broadcast}, 0x14) [ 1672.424183][T25753] ? anon_vma_clone+0x8d/0x380 [ 1672.424206][T25753] __should_failslab+0x81/0x90 [ 1672.424224][T25753] should_failslab+0x5/0x20 [ 1672.424241][T25753] kmem_cache_alloc+0x46/0x2e0 [ 1672.424261][T25753] ? avc_has_perm_noaudit+0x19a/0x240 [ 1672.424315][T25753] anon_vma_clone+0x8d/0x380 [ 1672.424334][T25753] anon_vma_fork+0x54/0x2b0 [ 1672.424352][T25753] dup_mmap+0x49c/0x9c0 [ 1672.424369][T25753] dup_mm+0x7c/0x210 [ 1672.424384][T25753] copy_process+0x144f/0x2f70 [ 1672.424403][T25753] kernel_clone+0x14b/0x680 17:08:47 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r1, 0x100, 0x70bd26, 0x25dfdbfd, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x0) clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) [ 1672.424477][T25753] ? __fget_light+0x21b/0x260 [ 1672.424493][T25753] __do_sys_fork+0x3a/0x60 [ 1672.519358][T25753] do_syscall_64+0x3d/0x90 [ 1672.523776][T25753] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1672.529674][T25753] RIP: 0033:0x4665e9 [ 1672.533585][T25753] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1672.553263][T25753] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 17:08:47 executing program 5: sysinfo(&(0x7f0000000000)=""/4096) 17:08:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) semop(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000000)=""/250, &(0x7f0000000100)=0xfa) 17:08:47 executing program 5: semop(0x0, 0x0, 0x1f4) r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETVAL(r0, 0x1, 0xc, &(0x7f0000000040)=""/68) getitimer(0x2, &(0x7f0000000000)) [ 1672.561670][T25753] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1672.569635][T25753] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1672.577595][T25753] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1672.585674][T25753] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1672.593633][T25753] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:47 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r1, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x120, 0x0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x5}, {0x6, 0x11, 0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x9c}, {0x6, 0x11, 0x5}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x9}, {0x6, 0x11, 0x8001}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x7}, {0x6, 0x11, 0x81}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x5}, {0x6, 0x11, 0xfff}}]}, 0x120}, 0x1, 0x0, 0x0, 0x48080}, 0x24050000) 17:08:47 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x1, &(0x7f0000000000)={0x77359400}, 0x0) 17:08:48 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETZCNT(r1, 0x2, 0xf, &(0x7f0000000040)=""/152) 17:08:48 executing program 5: r0 = semget(0x2, 0x4, 0x80) semop(r0, 0x0, 0x5c) 17:08:48 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 17:08:48 executing program 2: semget(0x3, 0x1, 0x28) r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) r1 = semget$private(0x0, 0x2, 0x11) semop(r1, 0x0, 0x4e957601b344951) 17:08:48 executing program 4 (fault-call:3 fault-nth:37): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:48 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000), 0x0) 17:08:48 executing program 2: semop(0x0, 0x0, 0x1a) r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_INFO(r0, 0x4, 0x13, &(0x7f0000000000)=""/39) 17:08:48 executing program 5: semop(0x0, 0x0, 0x0) 17:08:48 executing program 5: r0 = semget$private(0x0, 0x3, 0x88) r1 = semget(0x3, 0x1, 0x30d) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semop(r0, 0x0, 0x0) [ 1673.312659][T25802] FAULT_INJECTION: forcing a failure. [ 1673.312659][T25802] name failslab, interval 1, probability 0, space 0, times 0 [ 1673.325300][T25802] CPU: 1 PID: 25802 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1673.334115][T25802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1673.344154][T25802] Call Trace: [ 1673.347423][T25802] dump_stack_lvl+0xb7/0x103 [ 1673.352022][T25802] dump_stack+0x11/0x1a [ 1673.356183][T25802] should_fail+0x23c/0x250 17:08:48 executing program 5: semop(0x0, 0x0, 0x1f4) semop(0x0, &(0x7f0000000000)=[{0x3, 0x101, 0x1800}, {0x2, 0x6, 0x800}, {0x0, 0x9, 0x3000}, {0x3, 0xfff, 0x1800}], 0x4) [ 1673.360602][T25802] ? anon_vma_clone+0x8d/0x380 [ 1673.365366][T25802] __should_failslab+0x81/0x90 [ 1673.370117][T25802] should_failslab+0x5/0x20 [ 1673.374754][T25802] kmem_cache_alloc+0x46/0x2e0 [ 1673.379529][T25802] anon_vma_clone+0x8d/0x380 [ 1673.384122][T25802] anon_vma_fork+0x54/0x2b0 [ 1673.388685][T25802] dup_mmap+0x49c/0x9c0 [ 1673.392833][T25802] dup_mm+0x7c/0x210 [ 1673.396720][T25802] copy_process+0x144f/0x2f70 [ 1673.401390][T25802] kernel_clone+0x14b/0x680 [ 1673.405917][T25802] ? __fget_light+0x21b/0x260 17:08:48 executing program 5: semop(0x0, 0x0, 0x1f4) r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000100)=""/95) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)=[0x400, 0x3, 0xe449, 0x57d, 0x7]) [ 1673.410583][T25802] __do_sys_fork+0x3a/0x60 [ 1673.414997][T25802] do_syscall_64+0x3d/0x90 [ 1673.419411][T25802] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1673.425304][T25802] RIP: 0033:0x4665e9 [ 1673.429185][T25802] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1673.448833][T25802] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 17:08:48 executing program 2: semop(0x0, 0x0, 0x1a) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f00000000c0)=""/248) semtimedop(0xffffffffffffffff, &(0x7f0000000000)=[{0x3, 0x2, 0x800}, {0x2, 0x3, 0x1800}, {0x2, 0x1000}, {0x1, 0x200f, 0x1800}, {0x1, 0xfffc, 0x1800}, {0x4, 0x6, 0x800}, {0x1, 0xfffd, 0x1000}], 0x7, &(0x7f0000000080)={r0, r1+10000000}) semctl$GETPID(0x0, 0x2, 0xb, &(0x7f00000001c0)=""/37) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) keyctl$clear(0x7, r2) [ 1673.457235][T25802] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1673.465312][T25802] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1673.473277][T25802] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1673.481248][T25802] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1673.489218][T25802] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:49 executing program 0: sendmsg$NLBL_CALIPSO_C_REMOVE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, 0x0, 0x206, 0x70bd27, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000880}, 0x801) r0 = semget$private(0x0, 0x1, 0x28b) semop(r0, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) semget$private(0x0, 0x2, 0x65) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r1, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000140)={'wpan4\x00'}) 17:08:49 executing program 3: socket$packet(0x11, 0x3, 0x300) 17:08:49 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000080)={0x77359400}, 0x0) getpid() r0 = fork() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) sched_rr_get_interval(r1, &(0x7f00000000c0)) getpid() waitid(0x2, r0, &(0x7f00000001c0), 0x8, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640181, 0x0) fsmount(r2, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0xc, &(0x7f0000000100)=0x7fff, 0x4) sched_rr_get_interval(r0, &(0x7f0000000040)) 17:08:49 executing program 2: semop(0x0, 0x0, 0x1a) r0 = semget$private(0x0, 0x0, 0x94) semctl$GETVAL(r0, 0x3, 0xc, &(0x7f0000000000)=""/40) 17:08:49 executing program 5: semop(0x0, 0x0, 0xfffffffffffffd82) r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) semtimedop(r0, &(0x7f0000000000)=[{0x2, 0x2, 0x1000}, {0x0, 0x8000, 0x800}, {0x0, 0x3, 0x1000}, {0x3, 0x5, 0x1800}, {0x2, 0x800, 0x800}, {0x2, 0x6, 0x800}, {0x2, 0x20, 0x1800}], 0x7, &(0x7f0000000080)={r1, r2+60000000}) 17:08:49 executing program 4 (fault-call:3 fault-nth:38): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() [ 1674.171794][T25837] FAULT_INJECTION: forcing a failure. [ 1674.171794][T25837] name failslab, interval 1, probability 0, space 0, times 0 [ 1674.184433][T25837] CPU: 0 PID: 25837 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1674.193209][T25837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1674.203259][T25837] Call Trace: [ 1674.206613][T25837] dump_stack_lvl+0xb7/0x103 [ 1674.211203][T25837] dump_stack+0x11/0x1a [ 1674.215349][T25837] should_fail+0x23c/0x250 [ 1674.219763][T25837] ? anon_vma_clone+0x8d/0x380 [ 1674.224617][T25837] __should_failslab+0x81/0x90 [ 1674.229419][T25837] should_failslab+0x5/0x20 [ 1674.233975][T25837] kmem_cache_alloc+0x46/0x2e0 [ 1674.238811][T25837] anon_vma_clone+0x8d/0x380 [ 1674.243491][T25837] anon_vma_fork+0x54/0x2b0 [ 1674.247993][T25837] dup_mmap+0x49c/0x9c0 [ 1674.252146][T25837] dup_mm+0x7c/0x210 [ 1674.256097][T25837] copy_process+0x144f/0x2f70 [ 1674.260772][T25837] kernel_clone+0x14b/0x680 [ 1674.265343][T25837] ? __fget_light+0x21b/0x260 [ 1674.270011][T25837] __do_sys_fork+0x3a/0x60 [ 1674.274419][T25837] do_syscall_64+0x3d/0x90 [ 1674.278904][T25837] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1674.284854][T25837] RIP: 0033:0x4665e9 [ 1674.288744][T25837] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1674.308394][T25837] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 17:08:49 executing program 5: semop(0x0, 0x0, 0x1f4) r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semop(r0, &(0x7f0000000000)=[{0x0, 0xff, 0x800}, {0x6, 0x1ff}, {0x1, 0x2, 0x800}, {0x4, 0x1, 0x1000}, {0x4, 0x1000}, {0x1, 0xfff, 0x1000}, {0x4, 0x200, 0x800}, {0x1, 0x7, 0x1000}], 0x8) 17:08:49 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x521040) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000140)={0x5, 0x0, 'client0\x00', 0x5, "968c32cab7bba6d4", "e4c7b58999d0157172ef3326b7d329ec4dba7deceae805224ec5f24e36cc4aa4", 0x2, 0x36}) getrusage(0x0, &(0x7f0000000040)) clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r1, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r3 = fsmount(r1, 0x0, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f00000002c0)={0xffff, 0x0, {0xffffffffffffffff, 0x0, 0x81, 0x2, 0x6}, 0x6}) fsmount(r2, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000280)={0x7, &(0x7f0000000240)=[{0x4, 0x0, 0x9e, 0x810}, {0x1f, 0x81, 0xff, 0x3f}, {0x0, 0x8, 0x7, 0x1}, {0x78e0, 0xbf, 0x50, 0x2}, {0x0, 0x5, 0x6, 0x10000}, {0x5, 0x39, 0x8, 0x200}, {0x3, 0x3, 0x8, 0x50}]}) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x343200, 0x0) fsmount(r4, 0x0, 0x0) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r5, 0x0, 0x0) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r6, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000003c0)={0x0, 0x0}) waitid(0x1, r7, 0x0, 0x1000000, 0x0) ioctl$PTP_PEROUT_REQUEST(r2, 0x40383d03, &(0x7f0000000200)={{0x100000000000000, 0x80000001}, {0xddbf, 0x9}, 0xc19, 0x2000}) 17:08:49 executing program 5: semget$private(0x0, 0x0, 0x168) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000000)=""/4096) semget$private(0x0, 0x2, 0x6cd6ab0eb055030f) semget$private(0x0, 0x0, 0x289) semop(0x0, 0x0, 0x39) 17:08:49 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) 17:08:49 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) r1 = fsmount(r0, 0x1, 0x2) accept4$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x4, 0x80000) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 17:08:49 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = semget(0x0, 0x0, 0x1) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0x6, 0x1000}, {0xc, 0x7, 0x800}, {0x0, 0x4, 0x1000}, {0x1, 0xffff, 0x800}], 0x4, &(0x7f0000000080)={0x77359400}) [ 1674.316884][T25837] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1674.324851][T25837] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1674.332941][T25837] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1674.341003][T25837] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1674.348967][T25837] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:50 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000040)=[{}, {0x0, 0xff01}, {0x0, 0x101, 0x1000}, {0x0, 0xff, 0x1000}], 0x4) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) 17:08:50 executing program 2: semop(0x0, 0x0, 0x1a) r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_SETPARAMS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100102}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r0, 0x10, 0x80000000, 0x25dfdbfb, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) 17:08:50 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r1, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0x38}}, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000180)={0x22c, r1, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_SEC_DEVKEY={0x110, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_ID={0xc, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x3}]}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x9}, @NL802154_DEVKEY_ATTR_ID={0xc, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x7fff}]}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0xffffffff}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0xaaaaaaaaaaaa0102}}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0xff}, @NL802154_DEVKEY_ATTR_ID={0xbc, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}, @NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x3}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x3}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x48, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa3}, @NL802154_DEV_ADDR_ATTR_MODE={0x8}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa3}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x1}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0302}}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x1}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x2}]}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x3}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x3}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x2c, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x1}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x3}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x1}, @NL802154_DEV_ADDR_ATTR_MODE={0x8}]}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc}]}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x8}, @NL802154_DEVKEY_ATTR_ID={0xc, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x2}]}]}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_SEC_DEVKEY={0x60, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_ID={0x44, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x2}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x5}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x3}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x2}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x14, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0xa350ff53582c9458}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x2}]}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0xdd}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x9}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x10000}]}, @NL802154_ATTR_SEC_DEVKEY={0x84, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x80000001}, @NL802154_DEVKEY_ATTR_ID={0x58, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0xb3a6}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x34, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x2}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0xffff}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x3}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x2}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0xffff}]}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x3f}, @NL802154_KEY_ID_ATTR_INDEX={0x5}]}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x4}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0xaaaaaaaaaaaa0202}}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0x100}}]}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}]}, 0x22c}, 0x1, 0x0, 0x0, 0x90}, 0x0) semop(0x0, 0x0, 0x1f4) r2 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000080)=""/83) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f00000000c0), r3) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_LISTALL(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x64, r4, 0x2, 0x70bd27, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_DOI={0x8}]}, 0x64}, 0x1, 0x0, 0x0, 0x80}, 0x0) semctl$IPC_INFO(r2, 0x1, 0x3, &(0x7f0000000000)=""/151) r6 = semget(0x1, 0x0, 0x180) semctl$SETVAL(r6, 0x1, 0x10, &(0x7f0000000100)=0x7) 17:08:50 executing program 4 (fault-call:3 fault-nth:39): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:50 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={0x0, 0x1, 0x6, @remote}, 0x10) accept4$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'gre0\x00', &(0x7f0000000180)={'tunl0\x00', r1, 0x80, 0x8000, 0x7, 0x0, {{0x16, 0x4, 0x1, 0x2a, 0x58, 0x64, 0x0, 0x3f, 0x2f, 0x0, @empty, @local, {[@lsrr={0x83, 0x7, 0x7f, [@multicast2]}, @ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0x1b, 0x27, [@empty, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, @remote, @local]}, @timestamp_prespec={0x44, 0xc, 0x4a, 0x3, 0x7, [{@remote, 0x9bc8}]}, @lsrr={0x83, 0xf, 0x43, [@dev={0xac, 0x14, 0x14, 0x22}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}]}]}}}}}) 17:08:50 executing program 1: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) r2 = getpgid(0x0) sched_rr_get_interval(r2, &(0x7f0000000080)) clock_nanosleep(0x6, 0x0, &(0x7f0000000000)={r0, r1+10000000}, 0x0) [ 1675.261945][T25881] FAULT_INJECTION: forcing a failure. [ 1675.261945][T25881] name failslab, interval 1, probability 0, space 0, times 0 [ 1675.274574][T25881] CPU: 0 PID: 25881 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1675.283333][T25881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1675.293385][T25881] Call Trace: [ 1675.296655][T25881] dump_stack_lvl+0xb7/0x103 [ 1675.301245][T25881] dump_stack+0x11/0x1a [ 1675.305416][T25881] should_fail+0x23c/0x250 17:08:50 executing program 1: clock_nanosleep(0x7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) clock_getres(0x2, &(0x7f0000000040)) clock_getres(0xec647fae6190341e, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_nanosleep(0x2, 0x0, &(0x7f00000000c0)={r0, r1+10000000}, &(0x7f0000000100)) 17:08:50 executing program 2: semop(0x0, 0x0, 0x75) semctl$GETALL(0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000000)=""/248) semctl$GETZCNT(0x0, 0x2, 0xf, &(0x7f0000000180)=""/174) semctl$GETZCNT(0x0, 0x2, 0xf, &(0x7f0000000100)=""/87) [ 1675.309836][T25881] ? anon_vma_fork+0xb1/0x2b0 [ 1675.314548][T25881] __should_failslab+0x81/0x90 [ 1675.319303][T25881] should_failslab+0x5/0x20 [ 1675.323806][T25881] kmem_cache_alloc+0x46/0x2e0 [ 1675.328572][T25881] anon_vma_fork+0xb1/0x2b0 [ 1675.333269][T25881] dup_mmap+0x49c/0x9c0 [ 1675.337420][T25881] dup_mm+0x7c/0x210 [ 1675.341305][T25881] copy_process+0x144f/0x2f70 [ 1675.345976][T25881] kernel_clone+0x14b/0x680 [ 1675.350472][T25881] ? __fget_light+0x21b/0x260 [ 1675.355139][T25881] __do_sys_fork+0x3a/0x60 17:08:50 executing program 5: semop(0x0, 0x0, 0x1f4) semctl$GETNCNT(0x0, 0x3, 0xe, &(0x7f0000000000)=""/48) [ 1675.359580][T25881] do_syscall_64+0x3d/0x90 [ 1675.363991][T25881] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1675.369888][T25881] RIP: 0033:0x4665e9 [ 1675.373771][T25881] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1675.393486][T25881] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1675.401897][T25881] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 17:08:50 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) semop(0x0, 0x0, 0x1f4) semctl$IPC_STAT(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)=""/4096) 17:08:50 executing program 4 (fault-call:3 fault-nth:40): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:50 executing program 3: semctl$SEM_INFO(0x0, 0x3, 0x13, &(0x7f00000010c0)=""/101) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x16, &(0x7f0000001140)="67e5f030078a2dcee653977d581fad4a71e7c15b5742c8f92d47a23b33cb2f68df420631ef7ba6fbbbbb7dbab0b10531727c35d7c6f71ec6ac19a872e63d2304b712374f9ceb2a96b02d6471b422eec26a0d2eaf0906fb9b0ee720203c7f3a9efd961bf4d6970a908c2b5e422a77e6167af6ff267fac562aac675ee5513c080be905edd8f91c66071643e6cb92dd6663871f46c6dcb10417c1d8e487f18ac8586539be0af38ce7566121472532ce0e915a759e5b84d778b7158d97dfcfd88c30d3d3798e10361b2734c5ffa0733c26b250c323a540acef", 0xd7) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) r1 = socket(0x1d, 0xa, 0x4) getpeername$packet(r1, &(0x7f0000001000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001040)=0xf) sendto$packet(r0, &(0x7f0000000000)="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", 0x1000, 0x4, &(0x7f0000001080)={0x11, 0x19, r2, 0x1, 0x1f, 0x6, @multicast}, 0x14) [ 1675.409871][T25881] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1675.417839][T25881] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1675.425799][T25881] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1675.433758][T25881] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 [ 1675.501332][T25912] FAULT_INJECTION: forcing a failure. [ 1675.501332][T25912] name failslab, interval 1, probability 0, space 0, times 0 [ 1675.513979][T25912] CPU: 1 PID: 25912 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1675.522783][T25912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1675.533273][T25912] Call Trace: [ 1675.536542][T25912] dump_stack_lvl+0xb7/0x103 [ 1675.541124][T25912] dump_stack+0x11/0x1a [ 1675.545254][T25912] should_fail+0x23c/0x250 [ 1675.549680][T25912] ? anon_vma_fork+0x117/0x2b0 [ 1675.554424][T25912] __should_failslab+0x81/0x90 [ 1675.559436][T25912] should_failslab+0x5/0x20 [ 1675.563931][T25912] kmem_cache_alloc+0x46/0x2e0 [ 1675.568749][T25912] ? anon_vma_fork+0xb1/0x2b0 [ 1675.573417][T25912] anon_vma_fork+0x117/0x2b0 [ 1675.578032][T25912] dup_mmap+0x49c/0x9c0 [ 1675.582187][T25912] dup_mm+0x7c/0x210 [ 1675.586122][T25912] copy_process+0x144f/0x2f70 [ 1675.590800][T25912] kernel_clone+0x14b/0x680 [ 1675.595281][T25912] ? __fget_light+0x21b/0x260 [ 1675.600002][T25912] __do_sys_fork+0x3a/0x60 [ 1675.604395][T25912] do_syscall_64+0x3d/0x90 [ 1675.608809][T25912] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1675.614702][T25912] RIP: 0033:0x4665e9 [ 1675.618571][T25912] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1675.638264][T25912] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1675.646659][T25912] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1675.654623][T25912] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1675.662686][T25912] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1675.670671][T25912] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1675.678637][T25912] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:51 executing program 5: semop(0x0, 0x0, 0xfffffffffffffd01) 17:08:51 executing program 2: semop(0x0, 0x0, 0x1a) semctl$GETVAL(0x0, 0x1, 0xc, &(0x7f0000000200)=""/261) semget(0x1, 0x1, 0x81) r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETVAL(r0, 0x4, 0xc, &(0x7f0000000340)=""/4096) r1 = semget(0x0, 0x1, 0x400) semctl$SEM_INFO(r1, 0x1, 0x13, &(0x7f0000000100)=""/147) 17:08:51 executing program 4 (fault-call:3 fault-nth:41): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:51 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semctl$SETVAL(r0, 0x0, 0x10, &(0x7f0000000100)=0x1) semctl$GETPID(r0, 0x0, 0xb, &(0x7f0000000040)=""/153) semop(r0, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) semget$private(0x0, 0x3, 0x600) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semtimedop(r1, &(0x7f0000000140)=[{0x3, 0x8000, 0x800}, {0x0, 0x81, 0x1800}, {0x1, 0x5, 0x1800}, {0x3, 0x4, 0x1000}, {0x4, 0x3, 0x1800}, {0x4, 0xfffe, 0x800}], 0x6, &(0x7f0000000180)={0x0, 0x989680}) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) 17:08:51 executing program 3: r0 = socket$packet(0x11, 0x1, 0x300) r1 = socket(0x29, 0x800, 0x9) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x0, 0x200, 0x70bd28, 0x25dfdbfc, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x8010}, 0x0) r2 = fsmount(0xffffffffffffffff, 0x1, 0x0) sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x48, 0x0, 0x300, 0x70bd28, 0x25dfdbfe, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'ipvlan0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48000}, 0xc004) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) [ 1676.135307][T25928] FAULT_INJECTION: forcing a failure. [ 1676.135307][T25928] name failslab, interval 1, probability 0, space 0, times 0 [ 1676.147947][T25928] CPU: 1 PID: 25928 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1676.156722][T25928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1676.166774][T25928] Call Trace: [ 1676.170046][T25928] dump_stack_lvl+0xb7/0x103 [ 1676.174630][T25928] dump_stack+0x11/0x1a [ 1676.178779][T25928] should_fail+0x23c/0x250 [ 1676.183194][T25928] ? dup_mmap+0x38e/0x9c0 [ 1676.187509][T25928] __should_failslab+0x81/0x90 [ 1676.192284][T25928] should_failslab+0x5/0x20 [ 1676.196847][T25928] kmem_cache_alloc+0x46/0x2e0 [ 1676.201613][T25928] ? anon_vma_fork+0x273/0x2b0 [ 1676.206428][T25928] dup_mmap+0x38e/0x9c0 [ 1676.210581][T25928] dup_mm+0x7c/0x210 [ 1676.214465][T25928] copy_process+0x144f/0x2f70 [ 1676.219173][T25928] kernel_clone+0x14b/0x680 [ 1676.223655][T25928] ? __fget_light+0x21b/0x260 [ 1676.228399][T25928] __do_sys_fork+0x3a/0x60 [ 1676.232804][T25928] do_syscall_64+0x3d/0x90 [ 1676.237197][T25928] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1676.243068][T25928] RIP: 0033:0x4665e9 [ 1676.246936][T25928] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1676.266516][T25928] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1676.274915][T25928] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 17:08:51 executing program 5: semop(0x0, 0x0, 0x1f4) semctl$SETVAL(0x0, 0x4, 0x10, &(0x7f0000000000)=0x81) 17:08:51 executing program 1: sendmsg$IEEE802154_LLSEC_SETPARAMS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x0, 0x8, 0x70bd2a, 0x25dfdbfd, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x4040000) clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) 17:08:51 executing program 5: semop(0x0, 0x0, 0x1f4) r0 = semget(0x0, 0x6, 0x2) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000000)=""/143) 17:08:51 executing program 2: semget(0x1, 0x2, 0x6) r0 = semget(0x1, 0x3, 0x44) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r1, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="640000000fb79e5b2c9f00ce1d803fefeb52ad4e0e7cb95310a8f9e331ab654fc2429b12989b2dc19552296143c6c27dba6aa3fdc0817d7d534d8ed642cf42ddb594de6264eb529be47564ed76c0de43e56577998616426009f8c36c34d7e96c1a2db93c77605441c26eace93c989b98efe7093b72041d231cb23e12c4eb007c8e937e232bc1c3d817af9f89e3ec6186c7b5ea4a112f5fc2518aec60bf4c6923b65bb5aee92cae530ca6d6269100c60cafc0b06bee027c1c4a2b", @ANYRESOCT=r1, @ANYBLOB="e53028bd7000fddbdf250b0000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b00030000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b00d60c0000"], 0x64}, 0x1, 0x0, 0x0, 0xc810}, 0x40054) semop(r0, 0x0, 0x0) 17:08:51 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$IPC_RMID(r1, 0x0, 0x0) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) r2 = semget$private(0x0, 0x0, 0x0) semctl$GETPID(r2, 0x3, 0xb, &(0x7f0000000100)=""/147) 17:08:51 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r1 = fsmount(r0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "e86de2e1507fd1e6", "b197f1e6bdc3875a7bf8dd0cc51fb9ee01edb59227145c0e833a8984a597d749", "363b6dda", "338a43a21446fcfe"}, 0x38) r2 = socket$inet_icmp(0x2, 0x2, 0x1) getsockopt$sock_timeval(r2, 0x1, 0x42, &(0x7f0000000040), &(0x7f0000000080)=0x10) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000140)={'tunl0\x00', &(0x7f00000000c0)={'gre0\x00', 0x0, 0x797, 0x8, 0x0, 0x8e, {{0x18, 0x4, 0x3, 0x16, 0x60, 0x68, 0x0, 0x5, 0x29, 0x0, @empty, @loopback, {[@end, @noop, @timestamp_prespec={0x44, 0x24, 0xbb, 0x3, 0x5, [{@empty, 0x8000}, {@multicast2, 0x6}, {@dev={0xac, 0x14, 0x14, 0x3c}, 0x4}, {@dev={0xac, 0x14, 0x14, 0x42}}]}, @ra={0x94, 0x4}, @lsrr={0x83, 0x1f, 0x89, [@dev={0xac, 0x14, 0x14, 0x24}, @local, @dev={0xac, 0x14, 0x14, 0x11}, @loopback, @dev={0xac, 0x14, 0x14, 0x3d}, @multicast2, @remote]}]}}}}}) recvfrom$packet(r3, 0x0, 0x0, 0x2000, 0x0, 0x0) [ 1676.282860][T25928] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1676.290806][T25928] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1676.298754][T25928] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1676.306700][T25928] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:51 executing program 4 (fault-call:3 fault-nth:42): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:51 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) sched_rr_get_interval(0x0, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x0, 0x3ff}], 0x1, &(0x7f00000000c0)) [ 1676.427807][T25958] FAULT_INJECTION: forcing a failure. [ 1676.427807][T25958] name failslab, interval 1, probability 0, space 0, times 0 [ 1676.440437][T25958] CPU: 1 PID: 25958 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1676.449180][T25958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1676.459222][T25958] Call Trace: [ 1676.462582][T25958] dump_stack_lvl+0xb7/0x103 [ 1676.467255][T25958] dump_stack+0x11/0x1a [ 1676.471470][T25958] should_fail+0x23c/0x250 [ 1676.475931][T25958] ? anon_vma_fork+0x117/0x2b0 [ 1676.480697][T25958] __should_failslab+0x81/0x90 [ 1676.485456][T25958] should_failslab+0x5/0x20 [ 1676.489953][T25958] kmem_cache_alloc+0x46/0x2e0 [ 1676.494730][T25958] ? anon_vma_fork+0xb1/0x2b0 [ 1676.499653][T25958] anon_vma_fork+0x117/0x2b0 [ 1676.504253][T25958] dup_mmap+0x49c/0x9c0 [ 1676.508409][T25958] dup_mm+0x7c/0x210 [ 1676.512295][T25958] copy_process+0x144f/0x2f70 [ 1676.516965][T25958] kernel_clone+0x14b/0x680 [ 1676.521476][T25958] ? __fget_light+0x21b/0x260 [ 1676.526151][T25958] __do_sys_fork+0x3a/0x60 [ 1676.530556][T25958] do_syscall_64+0x3d/0x90 [ 1676.534956][T25958] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1676.540849][T25958] RIP: 0033:0x4665e9 [ 1676.544743][T25958] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1676.564427][T25958] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 17:08:51 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x66, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = fork() waitid(0x1, r1, &(0x7f00000001c0), 0x4, 0x0) fsopen(&(0x7f00000000c0)='v7\x00', 0x0) syz_open_procfs$namespace(r1, &(0x7f0000000080)='ns/mnt\x00') semop(0x0, 0x0, 0x1a) 17:08:51 executing program 3: r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r2 = fsmount(r1, 0x0, 0xa) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000640), r0) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r2, &(0x7f00000007c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000780)={&(0x7f0000000680)={0xfc, r3, 0x800, 0x70bd2c, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x401}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xffffffff}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x26}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4010}, 0x21082cd285189a34) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r4, 0x0, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x8c, r3, 0x1, 0x70bd25, 0x25dfdbfe, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r4}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}]}, 0x8c}, 0x1, 0x0, 0x0, 0x4000051}, 0x20008010) r5 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r5, 0x0, 0x0, 0x2000, 0x0, 0x0) 17:08:51 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = semget$private(0x0, 0x2, 0x420) semtimedop(r0, &(0x7f0000000040)=[{0x3, 0x3, 0x1800}, {0x2, 0x19, 0x800}, {0x4, 0x3ff}, {0x3, 0x8}], 0x4, &(0x7f0000000080)) 17:08:51 executing program 5: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x8020}, 0x40080) semop(0x0, 0x0, 0x1f4) 17:08:51 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r1, 0x0, 0x8) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0x4) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 17:08:51 executing program 4 (fault-call:3 fault-nth:43): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() [ 1676.572830][T25958] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1676.580793][T25958] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1676.588812][T25958] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1676.597383][T25958] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1676.605345][T25958] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:51 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x302222}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r1, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'veth0_virt_wifi\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x8804}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 17:08:51 executing program 5: semget(0x2, 0x2, 0x2) r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) r1 = semget(0x1, 0x0, 0x350) semop(r1, 0x0, 0x0) semget(0x3, 0x3, 0x164) [ 1676.695415][T25987] FAULT_INJECTION: forcing a failure. [ 1676.695415][T25987] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1676.708674][T25987] CPU: 1 PID: 25987 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1676.717437][T25987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1676.727485][T25987] Call Trace: [ 1676.730748][T25987] dump_stack_lvl+0xb7/0x103 [ 1676.735345][T25987] dump_stack+0x11/0x1a [ 1676.739577][T25987] should_fail+0x23c/0x250 [ 1676.743994][T25987] __alloc_pages+0x102/0x320 [ 1676.748560][T25987] alloc_pages+0x2e8/0x340 [ 1676.752968][T25987] pte_alloc_one+0x29/0xb0 [ 1676.757459][T25987] __pte_alloc+0x2f/0x210 [ 1676.761780][T25987] copy_pte_range+0x126e/0x1470 [ 1676.766709][T25987] ? __down_write_common+0x42/0x810 [ 1676.771903][T25987] ? __rb_insert_augmented+0x7f/0x350 [ 1676.777267][T25987] copy_page_range+0x5da/0x8e0 [ 1676.782058][T25987] ? anon_vma_fork+0x273/0x2b0 [ 1676.786803][T25987] dup_mmap+0x6ab/0x9c0 [ 1676.790940][T25987] dup_mm+0x7c/0x210 [ 1676.794816][T25987] copy_process+0x144f/0x2f70 [ 1676.799479][T25987] kernel_clone+0x14b/0x680 [ 1676.803967][T25987] ? __fget_light+0x21b/0x260 [ 1676.808631][T25987] __do_sys_fork+0x3a/0x60 [ 1676.813045][T25987] do_syscall_64+0x3d/0x90 [ 1676.817444][T25987] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1676.823325][T25987] RIP: 0033:0x4665e9 [ 1676.827208][T25987] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1676.846882][T25987] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1676.855269][T25987] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1676.863240][T25987] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1676.871201][T25987] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1676.879179][T25987] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1676.887230][T25987] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:52 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000040)=[{}, {0x0, 0xff01}, {0x2, 0x1000, 0x800}], 0x3) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETVAL(r1, 0x0, 0xc, &(0x7f0000000080)=""/4096) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x18, 0x0, &(0x7f0000000200)) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) 17:08:52 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_DEV(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)={0x24, 0x0, 0x1, 0x703d29, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}]}, 0x24}, 0x1, 0x0, 0x0, 0x44040}, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r2, 0x0, 0x0) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r0) sendmsg$IEEE802154_LIST_IFACE(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r3, 0x100, 0x70bd2c, 0x25dfdbfc, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20020900}, 0x20000000) r4 = semget$private(0x0, 0x3, 0x304) semop(r4, 0x0, 0xdc) 17:08:52 executing program 1: clock_gettime(0x0, &(0x7f0000000000)) clock_nanosleep(0x3, 0x1, &(0x7f0000000040)={0x77359400}, 0x0) 17:08:52 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r1 = fsmount(r0, 0x1, 0xf) r2 = fsmount(0xffffffffffffffff, 0x0, 0x4) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r4 = fsmount(r3, 0x0, 0xa) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000640), r2) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r4, &(0x7f00000007c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000780)={&(0x7f0000000680)={0xfc, r5, 0x800, 0x70bd2c, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x401}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xffffffff}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x26}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4010}, 0x21082cd285189a34) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x4c, r5, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x5}, {0x6, 0x11, 0x3}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2004c090) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000380), 0x440a02, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000340), r1) fsmount(r6, 0x0, 0x0) ioctl$sock_SIOCDELRT(r6, 0x890c, &(0x7f00000002c0)={0x0, @ipx={0x4, 0xfff8, 0x80000000, "eafe9eda9685", 0x3a}, @l2tp={0x2, 0x0, @empty, 0x3}, @sco, 0x1, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000280)='macsec0\x00', 0x101, 0x0, 0x8001}) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000040)={0x188, 0x0, 0x800, 0x70bd29, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0xd}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}}]}, 0x188}, 0x1, 0x0, 0x0, 0x20000800}, 0x400c0c1) 17:08:52 executing program 2: r0 = semget$private(0x0, 0x0, 0x240) semop(r0, 0x0, 0x26) r1 = semget$private(0x0, 0x0, 0x146) semop(r1, 0xfffffffffffffffe, 0x0) 17:08:52 executing program 4 (fault-call:3 fault-nth:44): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:52 executing program 1: clock_nanosleep(0x3, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) 17:08:52 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x10162, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x4, &(0x7f0000000080)=[{0x2, 0x3}, {0x81, 0x51, 0x80, 0xffffffff}, {0x9, 0x3b, 0x4, 0x40}, {0x55, 0x0, 0xff, 0xffffffff}]}, 0x10) 17:08:52 executing program 5: semop(0x0, 0x0, 0x1f4) semctl$GETNCNT(0x0, 0x4, 0xe, &(0x7f0000000000)=""/4096) 17:08:52 executing program 2: r0 = semget(0x0, 0x4, 0x0) semctl$SEM_STAT(r0, 0x4, 0x12, &(0x7f0000000000)=""/227) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semop(r1, &(0x7f0000000100)=[{0x2, 0x1ff}, {0x1, 0x5, 0x800}, {0x3, 0x5, 0x1800}], 0x3) semop(0x0, 0x0, 0x1a) 17:08:52 executing program 5: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x0, 0x14, &(0x7f0000000080)=""/83) r1 = semget$private(0x0, 0x2, 0x20) r2 = semget(0x1, 0x0, 0x766) semctl$SETALL(r2, 0x0, 0x11, &(0x7f0000000000)=[0x1, 0x4, 0x55a, 0x6, 0x1ff, 0xab, 0x4]) semop(r1, 0x0, 0xffffffffffffff01) semget(0x2, 0x7, 0x400) 17:08:52 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000000c0)=@req3={0x4, 0x6c2e, 0x1, 0x1000, 0x2, 0x4}, 0x1c) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) r1 = accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14, 0x800) setsockopt$packet_buf(r1, 0x107, 0x16, &(0x7f0000000080)="d5eaff07000000000000409bef1cff34720c1c3ab45f11d64af7815748476cd28949", 0x22) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'erspan0\x00', &(0x7f0000000100)={'syztnl1\x00', r2, 0x7800, 0x40, 0x60, 0x6, {{0x12, 0x4, 0x0, 0x2, 0x48, 0x68, 0x0, 0x20, 0x29, 0x0, @loopback, @private=0xa010101, {[@ssrr={0x89, 0xf, 0xf3, [@private=0xa010102, @multicast1, @rand_addr=0x64010101]}, @timestamp={0x44, 0x24, 0xc6, 0x0, 0x9, [0x6, 0xa0, 0x100000, 0x101, 0x8, 0x4, 0x16619f41, 0x8]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000240)={'gretap0\x00', &(0x7f00000001c0)={'syztnl1\x00', r3, 0x1, 0x8000, 0x3, 0x40, {{0xf, 0x4, 0x0, 0x8, 0x3c, 0x66, 0x0, 0x8, 0x2f, 0x0, @broadcast, @private=0xa010102, {[@timestamp_addr={0x44, 0x14, 0x5, 0x1, 0x3, [{@empty, 0xfffffffd}, {@empty, 0x1}]}, @ssrr={0x89, 0x13, 0xc6, [@rand_addr=0x64010100, @empty, @dev={0xac, 0x14, 0x14, 0x3d}, @multicast2]}]}}}}}) [ 1677.469498][T26035] FAULT_INJECTION: forcing a failure. [ 1677.469498][T26035] name failslab, interval 1, probability 0, space 0, times 0 [ 1677.482141][T26035] CPU: 1 PID: 26035 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1677.490892][T26035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1677.500939][T26035] Call Trace: [ 1677.504216][T26035] dump_stack_lvl+0xb7/0x103 [ 1677.508803][T26035] dump_stack+0x11/0x1a [ 1677.512953][T26035] should_fail+0x23c/0x250 [ 1677.517404][T26035] ? anon_vma_clone+0x8d/0x380 [ 1677.522178][T26035] __should_failslab+0x81/0x90 [ 1677.526944][T26035] should_failslab+0x5/0x20 [ 1677.531449][T26035] kmem_cache_alloc+0x46/0x2e0 [ 1677.536229][T26035] anon_vma_clone+0x8d/0x380 [ 1677.540879][T26035] anon_vma_fork+0x54/0x2b0 [ 1677.545495][T26035] dup_mmap+0x49c/0x9c0 [ 1677.549684][T26035] dup_mm+0x7c/0x210 [ 1677.553611][T26035] copy_process+0x144f/0x2f70 [ 1677.558362][T26035] kernel_clone+0x14b/0x680 [ 1677.562851][T26035] ? __fget_light+0x21b/0x260 [ 1677.567568][T26035] __do_sys_fork+0x3a/0x60 [ 1677.572001][T26035] do_syscall_64+0x3d/0x90 [ 1677.576430][T26035] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1677.582332][T26035] RIP: 0033:0x4665e9 [ 1677.586232][T26035] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1677.605938][T26035] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1677.614356][T26035] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1677.622305][T26035] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1677.630262][T26035] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1677.638223][T26035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1677.646192][T26035] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:53 executing program 0: r0 = semget$private(0x0, 0x2, 0x210) semop(r0, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) 17:08:53 executing program 2: semop(0x0, 0x0, 0x1a) r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_INFO(r0, 0x2, 0x13, &(0x7f0000000000)=""/157) r1 = semget$private(0x0, 0x1, 0x10) semctl$SEM_STAT(r1, 0x4, 0x12, &(0x7f0000000100)=""/98) 17:08:53 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = fork() waitid(0x2, r0, &(0x7f00000001c0), 0x8, 0x0) sched_rr_get_interval(r0, &(0x7f0000000040)) 17:08:53 executing program 5: semop(0x0, 0x0, 0x1f4) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f0000000080)=""/92) 17:08:53 executing program 3: r0 = socket(0x1b, 0x8080e, 0x9) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) r1 = socket$packet(0x11, 0x485f892889d161ea, 0x300) recvfrom$packet(r1, 0x0, 0x0, 0x2000, 0x0, 0x0) connect$packet(r1, &(0x7f0000000000)={0x11, 0x1c, 0x0, 0x1, 0x4, 0x6, @random='S3(d83'}, 0x14) 17:08:53 executing program 4 (fault-call:3 fault-nth:45): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() [ 1678.110150][T26057] FAULT_INJECTION: forcing a failure. [ 1678.110150][T26057] name failslab, interval 1, probability 0, space 0, times 0 [ 1678.122861][T26057] CPU: 1 PID: 26057 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1678.131623][T26057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1678.141768][T26057] Call Trace: [ 1678.145042][T26057] dump_stack_lvl+0xb7/0x103 [ 1678.149629][T26057] dump_stack+0x11/0x1a [ 1678.153776][T26057] should_fail+0x23c/0x250 [ 1678.158198][T26057] ? anon_vma_clone+0x8d/0x380 [ 1678.162958][T26057] __should_failslab+0x81/0x90 [ 1678.167718][T26057] should_failslab+0x5/0x20 [ 1678.172215][T26057] kmem_cache_alloc+0x46/0x2e0 [ 1678.177012][T26057] anon_vma_clone+0x8d/0x380 [ 1678.181602][T26057] anon_vma_fork+0x54/0x2b0 [ 1678.186126][T26057] dup_mmap+0x49c/0x9c0 [ 1678.190277][T26057] dup_mm+0x7c/0x210 [ 1678.194167][T26057] copy_process+0x144f/0x2f70 [ 1678.198840][T26057] kernel_clone+0x14b/0x680 [ 1678.203331][T26057] ? __fget_light+0x21b/0x260 [ 1678.208007][T26057] __do_sys_fork+0x3a/0x60 [ 1678.212421][T26057] do_syscall_64+0x3d/0x90 [ 1678.216950][T26057] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1678.222920][T26057] RIP: 0033:0x4665e9 [ 1678.226798][T26057] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1678.246481][T26057] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 17:08:53 executing program 2: semop(0x0, 0x0, 0x1a) semctl$GETZCNT(0x0, 0x1, 0xf, &(0x7f0000000000)=""/116) 17:08:53 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000000), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r2, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0x38}}, 0x10) sendmsg$NL802154_CMD_NEW_INTERFACE(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x4c, r2, 0x2, 0x70bd2c, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_EXTENDED_ADDR={0xc, 0x17, {0xaaaaaaaaaaaa0102}}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_EXTENDED_ADDR={0xc, 0x17, {0x200}}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40000}, 0x800) 17:08:53 executing program 2: ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000000)={0x10, 0x3, 0x0, 'queue0\x00', 0x100}) semop(0x0, 0x0, 0x1a) 17:08:53 executing program 2: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semop(r1, 0x0, 0x0) 17:08:53 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r1, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4800}, 0x40010) clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="001920847875752a93c020ffff", @ANYRES16=r2, @ANYBLOB="ee1d29bd70008666dffe00000008000300", @ANYRES32=0x0, @ANYRESDEC=r0, @ANYRES32=0x0, @ANYBLOB="0c0006000100000001000000"], 0x50}, 0x1, 0x0, 0x0, 0x24008004}, 0x40085) 17:08:53 executing program 5: semop(0x0, 0x0, 0xfffffffffffffef9) semctl$SEM_STAT_ANY(0xffffffffffffffff, 0x2, 0x14, &(0x7f0000000000)=""/168) [ 1678.254890][T26057] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1678.262855][T26057] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1678.270980][T26057] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1678.278942][T26057] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1678.286905][T26057] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:54 executing program 4 (fault-call:3 fault-nth:46): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:54 executing program 2: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000100)={0x0, 0x5, 0x0, 'queue1\x00', 0x1780cbd5}) semop(0x0, 0x0, 0x0) 17:08:54 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}, {0x0, 0xff01, 0x800}], 0x2) semctl$SEM_STAT_ANY(r0, 0x2, 0x14, &(0x7f0000000040)=""/231) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) 17:08:54 executing program 1: clock_gettime(0x0, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x2, 0x7, 0x800}, {0x1, 0x8}, {0x3, 0x27, 0x800}, {0x3, 0x3ff, 0x1000}, {0x2, 0x0, 0x1000}, {0x1, 0x7, 0x800}, {0x3, 0x8, 0x1800}], 0x7, &(0x7f00000000c0)={0x0, 0x3938700}) clock_nanosleep(0x3, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) 17:08:54 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0xffffff97) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_DEV(r2, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x60, r3, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@NL802154_ATTR_SEC_DEVICE={0x10, 0x23, 0x0, 0x1, {0xc}}, @NL802154_ATTR_SEC_DEVICE={0x10, 0x23, 0x0, 0x1, {0xc, 0x4, {0xaaaaaaaaaaaa0302}}}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_SEC_DEVICE={0x10, 0x23, 0x0, 0x1, {0xc, 0x4, {0xaaaaaaaaaaaa0102}}}]}, 0x60}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) fsmount(r1, 0x0, 0x0) sendto$packet(r1, &(0x7f0000000000)="d241529ac4b3dedf8da5bb56fbd4985a22ac44368e4705dc0f2fca9416c523bdea2fe37ba2c3b05f48bb8af36efee52795ed162800efd8b3e477603bb4e6715e40582616335bcd3510f44d0f9d90fc90d6", 0x51, 0x4000, 0x0, 0x0) getsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f0000000080)=""/89, &(0x7f0000000100)=0x59) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000340), r2) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000380)={'wpan1\x00'}) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r6, 0x0, 0x0) sendmsg$NL802154_CMD_DEL_SEC_KEY(r6, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000480)={0x34, r5, 0x1, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}]}, 0x34}}, 0x50) 17:08:54 executing program 5: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_DEL_SEC_KEY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000340)={0x64, r0, 0x800, 0x70bd26, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x3c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "409eb1bc59d37e9d4b944faa703d696686ee001e153fa796a6196273dce22af5"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "44aa88f314a191b5b10f73adb7f9d3d3"}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000000}, 0x40001) r1 = fsmount(0xffffffffffffffff, 0x0, 0x4) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r3 = fsmount(r2, 0x0, 0xa) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000640), r1) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r3, &(0x7f00000007c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000780)={&(0x7f0000000680)={0xfc, r4, 0x800, 0x70bd2c, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x401}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xffffffff}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x26}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4010}, 0x21082cd285189a34) sendmsg$DEVLINK_CMD_TRAP_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0xf8, r4, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}]}, 0xf8}, 0x1, 0x0, 0x0, 0x20000044}, 0x20000000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) semop(0x0, 0x0, 0x1f4) [ 1678.980502][T26116] FAULT_INJECTION: forcing a failure. [ 1678.980502][T26116] name failslab, interval 1, probability 0, space 0, times 0 [ 1678.993150][T26116] CPU: 1 PID: 26116 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1679.001981][T26116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1679.012031][T26116] Call Trace: [ 1679.015304][T26116] dump_stack_lvl+0xb7/0x103 [ 1679.019902][T26116] dump_stack+0x11/0x1a [ 1679.024067][T26116] should_fail+0x23c/0x250 17:08:54 executing program 5: semop(0x0, 0x0, 0x1f4) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f00000000c0)=""/168) semctl$IPC_RMID(0xffffffffffffffff, 0x0, 0x0) semget$private(0x0, 0x6c359cde96f6edb7, 0x791) 17:08:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fsmount(0xffffffffffffffff, 0x0, 0x4) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r3 = fsmount(r2, 0x0, 0xa) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000640), r1) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r3, &(0x7f00000007c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000780)={&(0x7f0000000680)={0xfc, r4, 0x800, 0x70bd2c, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xffffffd7, 0xb, 0x401}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xffffffff}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x26}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4010}, 0x21082cd285189a34) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="84000000", @ANYRES16=r4, @ANYBLOB="04002bbd7000ffdbdf251c0000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b00a4000000080001007063690011000200303030303a30303a31302e300000000008000b003f000000080001007063690011000200303030303a30303a31302e300000000008000b00000001002f0ccc1721c536c69bdf34eb87fe7e10b8d0252c6408e5f00294b68efc46ee9c1b80f307ab44d4c44edd3867d67faed0ada874d8945ce6ebc9424c1f4bdb3fa71a0128bef3e34e0fd98391d0494dbfcb02a8e14926b98f40f1be5b8ef16dcb9742337dbe6b3d593cce6c800d5e424a2d1e2b28510e0557007d"], 0x84}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) 17:08:54 executing program 2: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semop(r0, 0x0, 0x0) 17:08:54 executing program 0: r0 = fork() wait4(r0, 0x0, 0x8, 0x0) r1 = semget$private(0x0, 0x4, 0x0) semop(r1, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) semctl$GETNCNT(r1, 0x1, 0xe, 0x0) [ 1679.028587][T26116] ? anon_vma_fork+0xb1/0x2b0 [ 1679.033263][T26116] __should_failslab+0x81/0x90 [ 1679.038024][T26116] should_failslab+0x5/0x20 [ 1679.042517][T26116] kmem_cache_alloc+0x46/0x2e0 [ 1679.047299][T26116] anon_vma_fork+0xb1/0x2b0 [ 1679.051802][T26116] dup_mmap+0x49c/0x9c0 [ 1679.056033][T26116] dup_mm+0x7c/0x210 [ 1679.059921][T26116] copy_process+0x144f/0x2f70 [ 1679.064590][T26116] kernel_clone+0x14b/0x680 [ 1679.069079][T26116] ? __fget_light+0x21b/0x260 [ 1679.073749][T26116] __do_sys_fork+0x3a/0x60 [ 1679.078159][T26116] do_syscall_64+0x3d/0x90 [ 1679.082596][T26116] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1679.088509][T26116] RIP: 0033:0x4665e9 [ 1679.092459][T26116] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1679.112060][T26116] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1679.120511][T26116] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 17:08:54 executing program 2: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'gre0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x7, 0x8000, 0xffffffff, 0x80000000, {{0x43, 0x4, 0x1, 0x4, 0x10c, 0x67, 0x0, 0x5, 0x29, 0x0, @private=0xa010101, @empty, {[@lsrr={0x83, 0x17, 0xb3, [@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, @private=0xa010102, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100]}, @timestamp={0x44, 0x14, 0xb4, 0x0, 0x8, [0x7fff, 0x8, 0x0, 0x7]}, @ssrr={0x89, 0xb, 0x46, [@multicast2, @empty]}, @ssrr={0x89, 0x2b, 0x61, [@private=0xa010100, @local, @private=0xa010100, @loopback, @remote, @empty, @local, @loopback, @local, @remote]}, @cipso={0x86, 0x33, 0x3, [{0x7, 0x9, "7813a4afb19ced"}, {0x0, 0x3, "ef"}, {0x0, 0x5, "6c56b5"}, {0x6, 0xb, "857c7a5841a4fc8783"}, {0x6, 0x11, "3f722d92421f360f49e9feebfc59f0"}]}, @lsrr={0x83, 0x13, 0x10, [@remote, @local, @local, @private=0xa010102]}, @noop, @rr={0x7, 0x17, 0x5a, [@dev={0xac, 0x14, 0x14, 0x1d}, @empty, @dev={0xac, 0x14, 0x14, 0x40}, @private=0xa010101, @empty]}, @rr={0x7, 0x17, 0xea, [@rand_addr=0x64010100, @multicast1, @loopback, @private=0xa010101, @remote]}, @rr={0x7, 0x1f, 0x43, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010101, @broadcast, @multicast2, @broadcast, @multicast1, @rand_addr=0x64010102]}]}}}}}) semop(0x0, 0x0, 0x1a) 17:08:54 executing program 5: r0 = semget(0x2, 0x2, 0x100) semget$private(0x0, 0x1, 0x0) semop(r0, 0x0, 0x0) [ 1679.128472][T26116] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1679.136440][T26116] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1679.144535][T26116] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1679.152496][T26116] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:54 executing program 4 (fault-call:3 fault-nth:47): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:54 executing program 2: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semop(r0, 0x0, 0xfffffffffffffeb3) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semop(r1, &(0x7f0000000000)=[{0x3, 0x2, 0x1000}, {0x0, 0xffff, 0x800}, {0x2, 0x4, 0x1000}, {0x0, 0x5, 0x1800}, {0x4}], 0x5) [ 1679.246913][T26164] FAULT_INJECTION: forcing a failure. [ 1679.246913][T26164] name failslab, interval 1, probability 0, space 0, times 0 [ 1679.259547][T26164] CPU: 1 PID: 26164 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1679.268300][T26164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1679.278347][T26164] Call Trace: [ 1679.281693][T26164] dump_stack_lvl+0xb7/0x103 [ 1679.286281][T26164] dump_stack+0x11/0x1a [ 1679.290434][T26164] should_fail+0x23c/0x250 [ 1679.294863][T26164] ? anon_vma_clone+0x8d/0x380 [ 1679.299677][T26164] __should_failslab+0x81/0x90 [ 1679.304451][T26164] should_failslab+0x5/0x20 [ 1679.309017][T26164] kmem_cache_alloc+0x46/0x2e0 [ 1679.313780][T26164] ? avc_has_perm_noaudit+0x19a/0x240 [ 1679.319140][T26164] anon_vma_clone+0x8d/0x380 [ 1679.323794][T26164] anon_vma_fork+0x54/0x2b0 [ 1679.328280][T26164] dup_mmap+0x49c/0x9c0 [ 1679.332485][T26164] dup_mm+0x7c/0x210 [ 1679.336383][T26164] copy_process+0x144f/0x2f70 [ 1679.341049][T26164] kernel_clone+0x14b/0x680 [ 1679.345537][T26164] ? __fget_light+0x21b/0x260 [ 1679.350188][T26164] __do_sys_fork+0x3a/0x60 [ 1679.354583][T26164] do_syscall_64+0x3d/0x90 [ 1679.358994][T26164] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1679.365013][T26164] RIP: 0033:0x4665e9 [ 1679.368880][T26164] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1679.388476][T26164] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1679.396913][T26164] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1679.404862][T26164] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1679.412810][T26164] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1679.421019][T26164] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1679.428982][T26164] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:54 executing program 5: sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0xa4, 0x0, 0x300, 0x70bd29, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x6}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0xf64}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x10001}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0xdb7e}}]}, 0xa4}, 0x1, 0x0, 0x0, 0x400c010}, 0x10) semop(0x0, 0x0, 0x1f4) 17:08:54 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r2, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000080)=0x2, 0x4) fsmount(r1, 0x0, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000040)='$!&-\x00', 0x0, r1) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100), r2) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xf0, r3, 0x200, 0x70bd2d, 0x25dfdbff, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8}, {0x11}}, {0x8}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}}]}, 0xf0}, 0x1, 0x0, 0x0, 0x20000040}, 0x40000) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 17:08:54 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) semtimedop(0xffffffffffffffff, &(0x7f0000000100)=[{0x3, 0x5, 0x1800}], 0x1, &(0x7f0000000180)={r0, r1+60000000}) r2 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000080)=""/83) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) semtimedop(r2, &(0x7f00000001c0)=[{0x2, 0x1ff, 0x1000}, {0x0, 0x2, 0x800}, {0x1, 0xff}, {0x4, 0x3ff, 0x1000}, {0x2, 0x7fff, 0x800}, {0x4, 0x1ba}, {0x4, 0xf42}, {0x4, 0x100}], 0x8, &(0x7f0000000240)={r3, r4+60000000}) semtimedop(r2, &(0x7f0000000040)=[{0x4, 0x0, 0x1800}, {0x2, 0x3, 0x1800}, {0x4, 0x8, 0x1000}, {0x2, 0x6}, {0x1, 0x7da1, 0x400}, {0x4, 0x7fff, 0x800}], 0x6, &(0x7f0000000080)={0x77359400}) 17:08:54 executing program 4 (fault-call:3 fault-nth:48): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:54 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r2, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0x38}}, 0x10) sendmsg$NL802154_CMD_SET_TX_POWER(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r2, 0x4, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4008010}, 0x10) semop(0x0, 0x0, 0x1a) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000400)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_KEY(r1, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10040002}, 0xc, &(0x7f0000000540)={&(0x7f0000000440)={0xcc, r2, 0x400, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_SEC_KEY={0x30, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x6}, @NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "2906aaa0734e81ca843b7f7214d66ad9c271adddd699af876813bedbc2950dbc"}]}, @NL802154_ATTR_SEC_KEY={0x20, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0x14, 0x4, "0834960d4d685e4e6c251017ec85a77b"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x7f}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x44, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "0e26bc945cda3fa2e10befa124fa8f7a0d8df7c307b99bf4e707979b9cdf163f"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x8}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "92192e5451c9827b90dd1b26e0633663"}]}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0xcc}, 0x1, 0x0, 0x0, 0x4}, 0x80) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r5, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0x38}}, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0xa4, r5, 0x300, 0x70bd27, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_SEC_DEVKEY={0x6c, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0xaaaaaaaaaaaa0102}}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0xaaaaaaaaaaaa0302}}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x5}, @NL802154_DEVKEY_ATTR_ID={0x18, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x9}, @NL802154_KEY_ID_ATTR_MODE={0x8}]}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x9bce}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x3}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0xff}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0xaaaaaaaaaaaa0102}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x40000c4}, 0x4004000) [ 1679.846246][T26181] FAULT_INJECTION: forcing a failure. [ 1679.846246][T26181] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1679.859499][T26181] CPU: 1 PID: 26181 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1679.868239][T26181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1679.878393][T26181] Call Trace: [ 1679.881654][T26181] dump_stack_lvl+0xb7/0x103 [ 1679.886229][T26181] dump_stack+0x11/0x1a [ 1679.890363][T26181] should_fail+0x23c/0x250 [ 1679.894763][T26181] __alloc_pages+0x102/0x320 [ 1679.899337][T26181] alloc_pages+0x2e8/0x340 [ 1679.903752][T26181] pte_alloc_one+0x29/0xb0 [ 1679.908162][T26181] __pte_alloc+0x2f/0x210 [ 1679.912501][T26181] copy_pte_range+0x126e/0x1470 [ 1679.917352][T26181] ? __down_write_common+0x42/0x810 [ 1679.922548][T26181] ? __rb_insert_augmented+0x7f/0x350 [ 1679.927917][T26181] copy_page_range+0x5da/0x8e0 [ 1679.932687][T26181] ? anon_vma_fork+0x273/0x2b0 [ 1679.937451][T26181] dup_mmap+0x6ab/0x9c0 [ 1679.941592][T26181] dup_mm+0x7c/0x210 17:08:55 executing program 0: semget$private(0x0, 0x4, 0x0) r0 = semget(0x2, 0x1, 0x428) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) r1 = semget(0x0, 0x2, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) r2 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETNCNT(r2, 0x0, 0xe, 0x0) [ 1679.945483][T26181] copy_process+0x144f/0x2f70 [ 1679.950155][T26181] kernel_clone+0x14b/0x680 [ 1679.954649][T26181] ? __fget_light+0x21b/0x260 [ 1679.959326][T26181] __do_sys_fork+0x3a/0x60 [ 1679.963739][T26181] do_syscall_64+0x3d/0x90 [ 1679.968153][T26181] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1679.974045][T26181] RIP: 0033:0x4665e9 17:08:55 executing program 5: semop(0x0, 0x0, 0x1f4) r0 = semget$private(0x0, 0x0, 0x20) r1 = semget$private(0x0, 0x3, 0x400) semctl$SEM_STAT_ANY(r1, 0x1, 0x14, &(0x7f0000000000)=""/233) semctl$IPC_RMID(r0, 0x0, 0x0) 17:08:55 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000040), 0x2aaaaaaaaaaaaaeb) semctl$GETNCNT(r0, 0x2, 0xe, 0x0) 17:08:55 executing program 1: r0 = socket(0x23, 0x80000, 0x7fff) getsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) [ 1679.977932][T26181] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1679.997528][T26181] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1680.005935][T26181] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1680.013906][T26181] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1680.021870][T26181] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1680.029839][T26181] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1680.037803][T26181] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:55 executing program 5: semop(0x0, 0x0, 0x1f4) semget(0x3, 0x1, 0x108) r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_STAT(r0, 0x0, 0x12, &(0x7f00000000c0)=""/191) 17:08:55 executing program 3: sendmsg$NL802154_CMD_GET_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, 0x0, 0x8, 0x70bd25, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x4004040) socket$packet(0x11, 0x3, 0x300) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x2000, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x11, 0x0, 0x1, 0x40}, 0x14) 17:08:55 executing program 4 (fault-call:3 fault-nth:49): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:55 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) r1 = semget$private(0x0, 0x2, 0x10c) semop(r1, &(0x7f0000000040)=[{0x4, 0xfffb}, {0x1, 0x4, 0x1c00}, {0x4, 0x4, 0x1000}, {0x3, 0x3}], 0x4) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) 17:08:55 executing program 2: clock_nanosleep(0x7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) clock_getres(0x2, &(0x7f0000000040)) clock_getres(0xec647fae6190341e, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_nanosleep(0x2, 0x0, &(0x7f00000000c0)={r0, r1+10000000}, &(0x7f0000000100)) [ 1680.139240][T26221] FAULT_INJECTION: forcing a failure. [ 1680.139240][T26221] name failslab, interval 1, probability 0, space 0, times 0 [ 1680.151875][T26221] CPU: 1 PID: 26221 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1680.160700][T26221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1680.170749][T26221] Call Trace: [ 1680.174023][T26221] dump_stack_lvl+0xb7/0x103 [ 1680.178613][T26221] dump_stack+0x11/0x1a [ 1680.182838][T26221] should_fail+0x23c/0x250 17:08:55 executing program 5: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x60, r0, 0x400, 0x70bd26, 0x25dfdbfd, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x4}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x4e2b}}]}, 0x60}, 0x1, 0x0, 0x0, 0x840}, 0x820) semop(0x0, 0x0, 0x1f4) sendmsg$DEVLINK_CMD_TRAP_SET(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000600)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x264}}, 0x20000000) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)=[0x1, 0x6, 0x4, 0x577, 0x9, 0xa2, 0x2]) semop(0xffffffffffffffff, &(0x7f0000000180)=[{0x2, 0xfd92, 0x1000}, {0x2, 0x400, 0x800}, {0x7}, {0x0, 0x80, 0x1000}], 0x4) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000140)=[0x0, 0x6]) semop(0xffffffffffffffff, &(0x7f0000000000)=[{0x7, 0x3, 0x1800}, {0x4, 0x2, 0x1000}, {0x0, 0x2, 0x800}, {0x0, 0xcd1, 0x800}, {0x4, 0x5, 0x1800}, {0x2, 0x3e3, 0x1000}, {0x4, 0x3}], 0x7) r2 = semget(0x2, 0x4, 0x1) alarm(0x9) semctl$IPC_INFO(r2, 0x4, 0x3, &(0x7f0000000080)=""/167) [ 1680.187257][T26221] ? anon_vma_fork+0xb1/0x2b0 [ 1680.191937][T26221] __should_failslab+0x81/0x90 [ 1680.196741][T26221] should_failslab+0x5/0x20 [ 1680.201238][T26221] kmem_cache_alloc+0x46/0x2e0 [ 1680.206033][T26221] anon_vma_fork+0xb1/0x2b0 [ 1680.210533][T26221] dup_mmap+0x49c/0x9c0 [ 1680.214748][T26221] dup_mm+0x7c/0x210 [ 1680.218634][T26221] copy_process+0x144f/0x2f70 [ 1680.223309][T26221] kernel_clone+0x14b/0x680 [ 1680.227822][T26221] ? __fget_light+0x21b/0x260 [ 1680.232496][T26221] __do_sys_fork+0x3a/0x60 [ 1680.236910][T26221] do_syscall_64+0x3d/0x90 [ 1680.241324][T26221] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1680.247216][T26221] RIP: 0033:0x4665e9 [ 1680.251094][T26221] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1680.270755][T26221] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1680.279145][T26221] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 17:08:55 executing program 1: clock_nanosleep(0x4, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) 17:08:55 executing program 5: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semop(r0, 0x0, 0x0) semctl$GETALL(0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000040)=""/63) r1 = semget$private(0x0, 0x2, 0x10) semctl$GETVAL(r1, 0x0, 0xc, &(0x7f0000000000)=""/19) 17:08:55 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) r1 = semget(0x0, 0x4, 0x3d8) semctl$SEM_STAT_ANY(r1, 0x1, 0x14, &(0x7f0000000080)=""/83) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r2, 0x0, 0x0) r3 = fsmount(0xffffffffffffffff, 0x0, 0x4) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r5, 0x0, 0x0) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000480)='\'\'^}^\x00', 0x0, r5) r6 = fsmount(r4, 0x0, 0xa) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000640), r3) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r6, &(0x7f00000007c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000780)={&(0x7f0000000680)=ANY=[@ANYBLOB="fc000000", @ANYRES16=r7, @ANYBLOB="00082cbd7000ffdbdf251b000000080001007063690011000200303030303a30303a31302e300000000008000b00030000000f0002006e657464657673696d3000000800000001000000000001006e65744d657673696d0000000f0002006e657464657673696d30000008000b00010400000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b00ffffffff08000000f95978539611bdd37db18fa90000000000000200303030303a30303a31306e300000000008000b00260000000e0001006e657464657673696d0000000f0002006e65746465767369"], 0xfc}, 0x1, 0x0, 0x0, 0x4010}, 0x21082cd285189a34) r8 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, r8, 0x20, 0x70bd2c, 0x25dfdbfb, {}, [@NL802154_ATTR_MAX_CSMA_BACKOFFS={0x5, 0x12, 0x80}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000400}, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r2, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)={0x198, r7, 0x100, 0x70bd25, 0x25dfdbfe, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x599f}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x9}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x5}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x80000001}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7fffffff}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x2}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x2}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x1}}]}, 0x198}, 0x1, 0x0, 0x0, 0x4408d}, 0x10) 17:08:55 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) clock_gettime(0x5, &(0x7f0000000040)) [ 1680.287140][T26221] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1680.295095][T26221] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1680.303053][T26221] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1680.311015][T26221] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:55 executing program 4 (fault-call:3 fault-nth:50): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:55 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x1, &(0x7f0000000000)="6fbc40c1f35d397dcd42ba6fe6b11af2a93da543b371bd5d2c8bc8f7f9270e9add24fcfcec07e3fd3d25d25ecf9c76521221218b", 0x34) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 17:08:55 executing program 5: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xf8, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x2}}, {@pci={{0x8}, {0x11}}, {0x8}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x4}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x5}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x2}}]}, 0xf8}, 0x1, 0x0, 0x0, 0x40054}, 0x48040) 17:08:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000000080)=0x10) clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) clock_nanosleep(0x7, 0x0, &(0x7f00000000c0)={0x77359400}, 0x0) 17:08:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_POOL_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x6c, 0x0, 0x20, 0x70bd2c, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x6}, {0x6, 0x11, 0x8}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3db2}, {0x6, 0x11, 0x800}}]}, 0x6c}, 0x1, 0x0, 0x0, 0x800}, 0x4800) r1 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r1, 0x0, 0x0, 0x2000, 0x0, 0x0) 17:08:55 executing program 5: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, r2) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) r5 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r5, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_INFO(r5, 0x0, 0x13, &(0x7f0000000940)=""/4096) keyctl$search(0xa, r4, &(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x1}, r3) r6 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r6) semctl$SETALL(r5, 0x0, 0x11, &(0x7f0000000340)=[0xffff, 0x800, 0x8b, 0x6]) keyctl$get_persistent(0x16, 0xee00, r6) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r3) semctl$SEM_STAT_ANY(0x0, 0x3, 0x14, &(0x7f00000001c0)=""/48) [ 1680.436111][T26258] FAULT_INJECTION: forcing a failure. [ 1680.436111][T26258] name failslab, interval 1, probability 0, space 0, times 0 [ 1680.448763][T26258] CPU: 1 PID: 26258 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1680.457519][T26258] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1680.467595][T26258] Call Trace: [ 1680.470864][T26258] dump_stack_lvl+0xb7/0x103 [ 1680.475455][T26258] dump_stack+0x11/0x1a [ 1680.479701][T26258] should_fail+0x23c/0x250 [ 1680.484554][T26258] ? anon_vma_clone+0x8d/0x380 [ 1680.489316][T26258] __should_failslab+0x81/0x90 [ 1680.494085][T26258] should_failslab+0x5/0x20 [ 1680.498578][T26258] kmem_cache_alloc+0x46/0x2e0 [ 1680.503335][T26258] ? avc_has_perm_noaudit+0x19a/0x240 [ 1680.508728][T26258] anon_vma_clone+0x8d/0x380 [ 1680.513299][T26258] anon_vma_fork+0x54/0x2b0 [ 1680.517858][T26258] dup_mmap+0x49c/0x9c0 [ 1680.522120][T26258] dup_mm+0x7c/0x210 [ 1680.526011][T26258] copy_process+0x144f/0x2f70 [ 1680.530757][T26258] kernel_clone+0x14b/0x680 [ 1680.535254][T26258] ? __fget_light+0x21b/0x260 [ 1680.539986][T26258] __do_sys_fork+0x3a/0x60 [ 1680.544396][T26258] do_syscall_64+0x3d/0x90 [ 1680.548861][T26258] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1680.554830][T26258] RIP: 0033:0x4665e9 [ 1680.558710][T26258] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1680.578306][T26258] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1680.586708][T26258] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1680.594785][T26258] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1680.602819][T26258] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1680.610771][T26258] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1680.618875][T26258] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:56 executing program 2: clock_nanosleep(0x7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) clock_getres(0x2, &(0x7f0000000040)) clock_getres(0xec647fae6190341e, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_nanosleep(0x2, 0x0, &(0x7f00000000c0)={r0, r1+10000000}, &(0x7f0000000100)) 17:08:56 executing program 5: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, r2) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) r5 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r5, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_INFO(r5, 0x0, 0x13, &(0x7f0000000940)=""/4096) keyctl$search(0xa, r4, &(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x1}, r3) r6 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r6) semctl$SETALL(r5, 0x0, 0x11, &(0x7f0000000340)=[0xffff, 0x800, 0x8b, 0x6]) keyctl$get_persistent(0x16, 0xee00, r6) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r3) semctl$SEM_STAT_ANY(0x0, 0x3, 0x14, &(0x7f00000001c0)=""/48) 17:08:56 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x4) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r3 = fsmount(r2, 0x0, 0xa) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000640), r1) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r3, &(0x7f00000007c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000780)={&(0x7f0000000680)={0xfc, r4, 0x800, 0x70bd2c, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x401}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xffffffff}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x26}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4010}, 0x21082cd285189a34) sendmsg$DEVLINK_CMD_SB_GET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)={0x164, r4, 0x200, 0x70bd2b, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x8}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x20}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x9}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0xffffffff}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0xd89}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x2}}, {@pci={{0x8}, {0x11}}, {0x8}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x5}}]}, 0x164}, 0x1, 0x0, 0x0, 0x10}, 0x800) r5 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r5, 0x0, 0x0, 0x2000, 0x0, 0x0) 17:08:56 executing program 4 (fault-call:3 fault-nth:51): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() [ 1681.054247][T26273] FAULT_INJECTION: forcing a failure. [ 1681.054247][T26273] name failslab, interval 1, probability 0, space 0, times 0 [ 1681.066928][T26273] CPU: 1 PID: 26273 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1681.075687][T26273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1681.085729][T26273] Call Trace: [ 1681.088998][T26273] dump_stack_lvl+0xb7/0x103 [ 1681.093587][T26273] dump_stack+0x11/0x1a [ 1681.097725][T26273] should_fail+0x23c/0x250 [ 1681.102134][T26273] ? anon_vma_clone+0x8d/0x380 [ 1681.106895][T26273] __should_failslab+0x81/0x90 [ 1681.111663][T26273] should_failslab+0x5/0x20 [ 1681.116156][T26273] kmem_cache_alloc+0x46/0x2e0 [ 1681.120991][T26273] ? avc_has_perm_noaudit+0x19a/0x240 [ 1681.126345][T26273] anon_vma_clone+0x8d/0x380 [ 1681.130954][T26273] anon_vma_fork+0x54/0x2b0 [ 1681.135694][T26273] dup_mmap+0x49c/0x9c0 [ 1681.139886][T26273] dup_mm+0x7c/0x210 [ 1681.143789][T26273] copy_process+0x144f/0x2f70 [ 1681.148467][T26273] kernel_clone+0x14b/0x680 [ 1681.152960][T26273] ? __fget_light+0x21b/0x260 [ 1681.157646][T26273] __do_sys_fork+0x3a/0x60 [ 1681.162054][T26273] do_syscall_64+0x3d/0x90 [ 1681.166469][T26273] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1681.172468][T26273] RIP: 0033:0x4665e9 [ 1681.176343][T26273] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1681.195939][T26273] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 17:08:56 executing program 0: semget$private(0x0, 0x4, 0x0) r0 = semget(0x0, 0x2, 0x554) semop(r0, &(0x7f0000000040)=[{0x0, 0xc2, 0x1000}, {0x1, 0xff01, 0x800}], 0x2) r1 = semget(0x1, 0x2, 0x709) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000080)=""/167) semctl$GETNCNT(r1, 0x4, 0xe, 0x0) 17:08:56 executing program 5: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, r2) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) r5 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r5, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_INFO(r5, 0x0, 0x13, &(0x7f0000000940)=""/4096) keyctl$search(0xa, r4, &(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x1}, r3) r6 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r6) semctl$SETALL(r5, 0x0, 0x11, &(0x7f0000000340)=[0xffff, 0x800, 0x8b, 0x6]) keyctl$get_persistent(0x16, 0xee00, r6) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r3) semctl$SEM_STAT_ANY(0x0, 0x3, 0x14, &(0x7f00000001c0)=""/48) 17:08:56 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640181, 0x0) recvfrom$packet(r0, &(0x7f0000000080)=""/248, 0xf8, 0x20, &(0x7f0000000180)={0x11, 0xcb, 0x0, 0x1, 0x20}, 0x14) fsmount(r1, 0x0, 0x0) accept4$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14, 0xc00) 17:08:56 executing program 4 (fault-call:3 fault-nth:52): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() [ 1681.204360][T26273] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1681.212337][T26273] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1681.220288][T26273] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1681.228253][T26273] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1681.236204][T26273] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:56 executing program 5: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, r2) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) r5 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r5, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_INFO(r5, 0x0, 0x13, &(0x7f0000000940)=""/4096) keyctl$search(0xa, r4, &(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x1}, r3) r6 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r6) semctl$SETALL(r5, 0x0, 0x11, &(0x7f0000000340)=[0xffff, 0x800, 0x8b, 0x6]) keyctl$get_persistent(0x16, 0xee00, r6) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r3) 17:08:56 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x14, 0x0, 0x1, 0x70bd2c, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x1) clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) [ 1681.309195][T26296] FAULT_INJECTION: forcing a failure. [ 1681.309195][T26296] name failslab, interval 1, probability 0, space 0, times 0 [ 1681.322051][T26296] CPU: 1 PID: 26296 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1681.330804][T26296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1681.340872][T26296] Call Trace: [ 1681.344155][T26296] dump_stack_lvl+0xb7/0x103 [ 1681.348803][T26296] dump_stack+0x11/0x1a [ 1681.352952][T26296] should_fail+0x23c/0x250 17:08:56 executing program 1: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffff9, 0xa573478220676a05) clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) clock_gettime(0x5, &(0x7f0000000040)) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x0, 0x2, 0x70bd28, 0x25dfdbff, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x20008801) keyctl$reject(0x13, r0, 0x8, 0xc0, r0) [ 1681.357393][T26296] ? dup_mmap+0x38e/0x9c0 [ 1681.361717][T26296] __should_failslab+0x81/0x90 [ 1681.366479][T26296] should_failslab+0x5/0x20 [ 1681.370973][T26296] kmem_cache_alloc+0x46/0x2e0 [ 1681.375736][T26296] ? anon_vma_fork+0x273/0x2b0 [ 1681.380586][T26296] dup_mmap+0x38e/0x9c0 [ 1681.384738][T26296] dup_mm+0x7c/0x210 [ 1681.388649][T26296] copy_process+0x144f/0x2f70 [ 1681.393335][T26296] kernel_clone+0x14b/0x680 [ 1681.397831][T26296] ? __fget_light+0x21b/0x260 [ 1681.402503][T26296] __do_sys_fork+0x3a/0x60 17:08:56 executing program 5: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, r2) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) r5 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r5, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_INFO(r5, 0x0, 0x13, &(0x7f0000000940)=""/4096) keyctl$search(0xa, r4, &(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x1}, r3) r6 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r6) semctl$SETALL(r5, 0x0, 0x11, &(0x7f0000000340)=[0xffff, 0x800, 0x8b, 0x6]) keyctl$get_persistent(0x16, 0xee00, r6) [ 1681.406907][T26296] do_syscall_64+0x3d/0x90 [ 1681.411319][T26296] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1681.417303][T26296] RIP: 0033:0x4665e9 [ 1681.421240][T26296] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1681.440838][T26296] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1681.449241][T26296] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1681.457203][T26296] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1681.465199][T26296] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1681.473195][T26296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1681.481160][T26296] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:57 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0x1, 0x800}, {0x1, 0x0, 0x1000}, {0x4, 0x0, 0x800}, {0x2, 0x4, 0x1000}, {0x4, 0x9}], 0x5, &(0x7f0000000080)) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) 17:08:57 executing program 4 (fault-call:3 fault-nth:53): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:57 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) clock_nanosleep(0x2, 0x1, &(0x7f0000000040), &(0x7f0000000080)) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/2) 17:08:57 executing program 5: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, r2) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) r5 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r5, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_INFO(r5, 0x0, 0x13, &(0x7f0000000940)=""/4096) keyctl$search(0xa, r4, &(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x1}, r3) r6 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r6) semctl$SETALL(r5, 0x0, 0x11, &(0x7f0000000340)=[0xffff, 0x800, 0x8b, 0x6]) 17:08:57 executing program 2: clock_nanosleep(0x7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) clock_getres(0x2, &(0x7f0000000040)) clock_getres(0xec647fae6190341e, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_nanosleep(0x2, 0x0, &(0x7f00000000c0)={r0, r1+10000000}, &(0x7f0000000100)) [ 1681.985589][T26320] FAULT_INJECTION: forcing a failure. [ 1681.985589][T26320] name failslab, interval 1, probability 0, space 0, times 0 [ 1681.998230][T26320] CPU: 0 PID: 26320 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1682.006987][T26320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1682.017031][T26320] Call Trace: [ 1682.020384][T26320] dump_stack_lvl+0xb7/0x103 [ 1682.024968][T26320] dump_stack+0x11/0x1a [ 1682.029173][T26320] should_fail+0x23c/0x250 17:08:57 executing program 1: r0 = msgget(0x2, 0x1) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000040)=""/177) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000100)=""/108) r1 = msgget(0x0, 0x248) msgctl$IPC_RMID(r1, 0x0) msgctl$IPC_RMID(r1, 0x0) clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) [ 1682.033586][T26320] ? dup_mmap+0x38e/0x9c0 [ 1682.037962][T26320] __should_failslab+0x81/0x90 [ 1682.042764][T26320] should_failslab+0x5/0x20 [ 1682.047267][T26320] kmem_cache_alloc+0x46/0x2e0 [ 1682.052035][T26320] dup_mmap+0x38e/0x9c0 [ 1682.056183][T26320] dup_mm+0x7c/0x210 [ 1682.060067][T26320] copy_process+0x144f/0x2f70 [ 1682.064757][T26320] kernel_clone+0x14b/0x680 [ 1682.069254][T26320] ? __fget_light+0x21b/0x260 [ 1682.073917][T26320] __do_sys_fork+0x3a/0x60 [ 1682.078319][T26320] do_syscall_64+0x3d/0x90 [ 1682.082768][T26320] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1682.088678][T26320] RIP: 0033:0x4665e9 [ 1682.092555][T26320] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1682.112151][T26320] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1682.120543][T26320] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 17:08:57 executing program 3: r0 = semget$private(0x0, 0x6, 0x21) semctl$SEM_INFO(r0, 0x4, 0x13, &(0x7f0000000000)=""/109) r1 = socket$packet(0x11, 0x3, 0x300) accept4$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x14, 0x80000) recvfrom$packet(r1, 0x0, 0x0, 0x2000, 0x0, 0x0) 17:08:57 executing program 5: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, r2) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) r5 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r5, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_INFO(r5, 0x0, 0x13, &(0x7f0000000940)=""/4096) keyctl$search(0xa, r4, &(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x1}, r3) r6 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r6) 17:08:57 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semget(0x0, 0x8, 0x0) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) 17:08:57 executing program 1: clock_nanosleep(0x7, 0x1, &(0x7f0000000080), 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x4, 0x7, 0x1000}, {0x3, 0x20b1, 0x1800}, {0x0, 0x81, 0x1000}, {0x0, 0x2}, {0x0, 0x3a72, 0x1800}], 0x5, &(0x7f00000000c0)={0x77359400}) fsmount(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f0000000180)) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f0000000040)='^{-*\x00', 0x0, 0xffffffffffffffff) 17:08:57 executing program 4 (fault-call:3 fault-nth:54): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() [ 1682.128576][T26320] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1682.136543][T26320] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1682.144615][T26320] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1682.152567][T26320] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:57 executing program 5: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, r2) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) r5 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r5, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_INFO(r5, 0x0, 0x13, &(0x7f0000000940)=""/4096) keyctl$search(0xa, r4, &(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x1}, r3) add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 17:08:57 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x60, 0x0, 0x300, 0x70bd28, 0x25dfdbfb, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r1}}]}, 0x60}, 0x1, 0x0, 0x0, 0x100}, 0x0) [ 1682.223116][T26340] FAULT_INJECTION: forcing a failure. [ 1682.223116][T26340] name failslab, interval 1, probability 0, space 0, times 0 [ 1682.235791][T26340] CPU: 0 PID: 26340 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1682.244546][T26340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1682.254597][T26340] Call Trace: [ 1682.257863][T26340] dump_stack_lvl+0xb7/0x103 [ 1682.262443][T26340] dump_stack+0x11/0x1a [ 1682.266706][T26340] should_fail+0x23c/0x250 [ 1682.271175][T26340] ? anon_vma_clone+0x8d/0x380 [ 1682.275975][T26340] __should_failslab+0x81/0x90 [ 1682.280723][T26340] should_failslab+0x5/0x20 [ 1682.285264][T26340] kmem_cache_alloc+0x46/0x2e0 [ 1682.290051][T26340] ? avc_has_perm_noaudit+0x19a/0x240 [ 1682.295555][T26340] anon_vma_clone+0x8d/0x380 [ 1682.300190][T26340] anon_vma_fork+0x54/0x2b0 [ 1682.304739][T26340] dup_mmap+0x49c/0x9c0 [ 1682.308893][T26340] dup_mm+0x7c/0x210 [ 1682.312770][T26340] copy_process+0x144f/0x2f70 [ 1682.317447][T26340] kernel_clone+0x14b/0x680 [ 1682.321923][T26340] ? __fget_light+0x21b/0x260 [ 1682.326921][T26340] __do_sys_fork+0x3a/0x60 [ 1682.331328][T26340] do_syscall_64+0x3d/0x90 [ 1682.335722][T26340] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1682.341665][T26340] RIP: 0033:0x4665e9 [ 1682.345576][T26340] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1682.365302][T26340] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1682.373735][T26340] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1682.381774][T26340] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1682.389736][T26340] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1682.397710][T26340] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1682.405667][T26340] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:57 executing program 2: clock_nanosleep(0x7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) clock_getres(0x2, &(0x7f0000000040)) clock_getres(0xec647fae6190341e, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000000080)) 17:08:57 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{0x2}, {0x0, 0xff01}], 0x2) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) semget(0x0, 0x4, 0x100) 17:08:57 executing program 4 (fault-call:3 fault-nth:55): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:57 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "043407eeb41bd08c", "e3ad72da8188b6d5d93e33665f865d01", "487a009d", "650e53ca50bbf1cf"}, 0x28) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r2, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000240)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'syztnl2\x00', 0x0, 0x8000, 0x0, 0x9a, 0x5, {{0xf, 0x4, 0x3, 0xd, 0x3c, 0x64, 0x0, 0x2, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, {[@ssrr={0x89, 0xb, 0x5, [@local, @loopback]}, @timestamp={0x44, 0x18, 0x2b, 0x0, 0x1, [0x5, 0x7f, 0x23, 0x2, 0x3f]}, @ssrr={0x89, 0x3, 0x98}]}}}}}) connect$packet(r1, &(0x7f0000000140)={0x11, 0xf5, r3, 0x1, 0x6, 0x6, @multicast}, 0x14) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000001c0)={'ip_vti0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB='\trx\x00'/13, @ANYRES32=r3, @ANYBLOB="00080027000000050010000246cd0018006700004e2990780a010101e000000194040100"]}) connect$packet(r0, &(0x7f0000000200)={0x11, 0x3, r4, 0x1, 0x8, 0x6, @random="570d81810c01"}, 0x14) recvfrom$packet(r0, 0x0, 0xfffffffffffffcea, 0x40002020, 0x0, 0x0) 17:08:57 executing program 1: clock_nanosleep(0x6, 0x0, &(0x7f0000000000), 0x0) 17:08:57 executing program 5: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, r2) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) r5 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r5, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_INFO(r5, 0x0, 0x13, &(0x7f0000000940)=""/4096) keyctl$search(0xa, r4, &(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x1}, r3) 17:08:58 executing program 5: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, r2) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) r5 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r5, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_INFO(r5, 0x0, 0x13, &(0x7f0000000940)=""/4096) 17:08:58 executing program 1: semctl$SEM_STAT(0xffffffffffffffff, 0x1, 0x12, &(0x7f0000000080)=""/157) clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) msgget(0x2, 0x210) clock_gettime(0x5, &(0x7f0000000040)) [ 1682.868921][T26361] FAULT_INJECTION: forcing a failure. [ 1682.868921][T26361] name failslab, interval 1, probability 0, space 0, times 0 [ 1682.881660][T26361] CPU: 1 PID: 26361 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1682.890422][T26361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1682.900474][T26361] Call Trace: [ 1682.900484][T26361] dump_stack_lvl+0xb7/0x103 [ 1682.900506][T26361] dump_stack+0x11/0x1a 17:08:58 executing program 5: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, r2) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) r5 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r5, 0x3, 0x14, &(0x7f0000000080)=""/83) 17:08:58 executing program 1: clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x5, &(0x7f0000000080)={0x0, 0x0}) r2 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000080)=""/83) semtimedop(r2, &(0x7f0000000000)=[{0x0, 0xf800, 0x800}], 0x1, &(0x7f0000000100)) clock_nanosleep(0x5, 0x0, &(0x7f00000000c0)={r0, r1+60000000}, 0x0) r3 = semget$private(0x0, 0x1, 0x0) semctl$GETPID(r3, 0x1, 0xb, &(0x7f0000000140)=""/160) 17:08:58 executing program 5: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, r2) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) semget(0x0, 0x1, 0x1a) [ 1682.900520][T26361] should_fail+0x23c/0x250 [ 1682.900540][T26361] ? anon_vma_fork+0xb1/0x2b0 [ 1682.900568][T26361] __should_failslab+0x81/0x90 [ 1682.900583][T26361] should_failslab+0x5/0x20 [ 1682.900601][T26361] kmem_cache_alloc+0x46/0x2e0 17:08:58 executing program 4 (fault-call:3 fault-nth:56): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() [ 1682.900622][T26361] anon_vma_fork+0xb1/0x2b0 [ 1682.900747][T26361] dup_mmap+0x49c/0x9c0 [ 1682.900763][T26361] dup_mm+0x7c/0x210 [ 1682.900842][T26361] copy_process+0x144f/0x2f70 [ 1682.900857][T26361] kernel_clone+0x14b/0x680 [ 1682.900873][T26361] ? __fget_light+0x21b/0x260 [ 1682.900956][T26361] __do_sys_fork+0x3a/0x60 [ 1682.900974][T26361] do_syscall_64+0x3d/0x90 [ 1682.900996][T26361] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1682.901021][T26361] RIP: 0033:0x4665e9 [ 1682.901048][T26361] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1682.901066][T26361] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1682.901084][T26361] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1682.901097][T26361] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1682.901109][T26361] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1682.901121][T26361] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1682.901133][T26361] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 [ 1683.008233][T26382] FAULT_INJECTION: forcing a failure. [ 1683.008233][T26382] name failslab, interval 1, probability 0, space 0, times 0 [ 1683.008253][T26382] CPU: 1 PID: 26382 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1683.008273][T26382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1683.008284][T26382] Call Trace: [ 1683.008291][T26382] dump_stack_lvl+0xb7/0x103 [ 1683.008313][T26382] dump_stack+0x11/0x1a [ 1683.008330][T26382] should_fail+0x23c/0x250 [ 1683.008418][T26382] ? anon_vma_fork+0x117/0x2b0 [ 1683.008442][T26382] __should_failslab+0x81/0x90 [ 1683.008579][T26382] should_failslab+0x5/0x20 [ 1683.008598][T26382] kmem_cache_alloc+0x46/0x2e0 [ 1683.008662][T26382] ? anon_vma_fork+0xb1/0x2b0 [ 1683.008681][T26382] anon_vma_fork+0x117/0x2b0 [ 1683.008770][T26382] dup_mmap+0x49c/0x9c0 [ 1683.008789][T26382] dup_mm+0x7c/0x210 [ 1683.008808][T26382] copy_process+0x144f/0x2f70 [ 1683.008824][T26382] kernel_clone+0x14b/0x680 [ 1683.008840][T26382] ? __fget_light+0x21b/0x260 [ 1683.008853][T26382] __do_sys_fork+0x3a/0x60 [ 1683.008868][T26382] do_syscall_64+0x3d/0x90 [ 1683.210843][T26382] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1683.216791][T26382] RIP: 0033:0x4665e9 [ 1683.220690][T26382] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1683.240283][T26382] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1683.248672][T26382] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1683.256622][T26382] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1683.264603][T26382] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1683.272555][T26382] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1683.280518][T26382] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:58 executing program 2: clock_nanosleep(0x7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) clock_getres(0x2, &(0x7f0000000040)) clock_getres(0xec647fae6190341e, &(0x7f0000000140)) 17:08:58 executing program 5: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, r2) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) 17:08:58 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x85) getsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000080)=0x10) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r2, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000100)="9e1a85fc68e4dba8e1b1b08941a094b07467e2bae3b34a2083da9a15e22ac9c8e0cf6dd18909463a78e7c7d33b895f410015879eff5fe8c3e221cd8a0e4e988dd81f35c579033ac2e3863d04b62926a030503ac02f0c5ef2b3a7eab8efac5ddff980c54c728873901666ebe60f9bba19874068e7e530173e2dd747f3afd6c444acafb96a96c0368346300fe765265aa40ab89fe693217b63959552b2a6f506319682aaf4ff96bdf8fde2bf826964f0ab6066b5c7ac47867e68728e391cb8b37ea52585feca9e0d5997", 0xc9, 0x0, &(0x7f0000000200)={0x11, 0x8, 0x0, 0x1, 0xf9}, 0x14) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r3, 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f00000000c0)=0x10) recvfrom$packet(r1, 0x0, 0x0, 0x2000, 0x0, 0x0) 17:08:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f00000000c0)=0x7fffffff, 0x4) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r1, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000240)=0x1, 0x4) semctl$IPC_INFO(0x0, 0x5, 0x3, &(0x7f0000000040)=""/96) clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) clock_getres(0x3, &(0x7f0000000200)) clock_gettime(0x1, &(0x7f0000000180)) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @remote}, 0x10) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) socket$inet_udp(0x2, 0x2, 0x0) fsmount(r3, 0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x24, &(0x7f0000000100), &(0x7f0000000140)=0x4) 17:08:58 executing program 4 (fault-call:3 fault-nth:57): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:58 executing program 0: sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, 0x0, 0x200, 0x70bd28, 0x25dfdbfb, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000041}, 0x10) r0 = semget$private(0x0, 0x4, 0x0) semctl$SEM_STAT_ANY(r0, 0x0, 0x14, &(0x7f0000000180)=""/4096) semop(r0, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) 17:08:58 executing program 5: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, r2) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) [ 1683.754385][T26395] FAULT_INJECTION: forcing a failure. [ 1683.754385][T26395] name failslab, interval 1, probability 0, space 0, times 0 [ 1683.767037][T26395] CPU: 0 PID: 26395 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1683.775800][T26395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1683.785878][T26395] Call Trace: [ 1683.789167][T26395] dump_stack_lvl+0xb7/0x103 [ 1683.793777][T26395] dump_stack+0x11/0x1a [ 1683.797925][T26395] should_fail+0x23c/0x250 17:08:58 executing program 5: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, r2) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) 17:08:59 executing program 5: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, r2) add_key$keyring(&(0x7f0000000700), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) [ 1683.802422][T26395] ? dup_mmap+0x38e/0x9c0 [ 1683.806748][T26395] __should_failslab+0x81/0x90 [ 1683.811518][T26395] should_failslab+0x5/0x20 [ 1683.816067][T26395] kmem_cache_alloc+0x46/0x2e0 [ 1683.820893][T26395] ? anon_vma_fork+0x273/0x2b0 [ 1683.825704][T26395] dup_mmap+0x38e/0x9c0 [ 1683.829903][T26395] dup_mm+0x7c/0x210 [ 1683.833793][T26395] copy_process+0x144f/0x2f70 [ 1683.838467][T26395] kernel_clone+0x14b/0x680 [ 1683.842965][T26395] ? __fget_light+0x21b/0x260 [ 1683.847659][T26395] __do_sys_fork+0x3a/0x60 17:08:59 executing program 5: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, r2) [ 1683.852075][T26395] do_syscall_64+0x3d/0x90 [ 1683.856501][T26395] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1683.862393][T26395] RIP: 0033:0x4665e9 [ 1683.866399][T26395] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1683.886014][T26395] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1683.894422][T26395] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 17:08:59 executing program 5: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r1, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 17:08:59 executing program 4 (fault-call:3 fault-nth:58): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() [ 1683.902392][T26395] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1683.910360][T26395] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1683.918333][T26395] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1683.926308][T26395] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 [ 1683.978948][T26414] FAULT_INJECTION: forcing a failure. [ 1683.978948][T26414] name failslab, interval 1, probability 0, space 0, times 0 [ 1683.991604][T26414] CPU: 0 PID: 26414 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1684.000360][T26414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1684.010431][T26414] Call Trace: [ 1684.013731][T26414] dump_stack_lvl+0xb7/0x103 [ 1684.018506][T26414] dump_stack+0x11/0x1a [ 1684.022676][T26414] should_fail+0x23c/0x250 [ 1684.027080][T26414] ? dup_mmap+0x38e/0x9c0 [ 1684.031393][T26414] __should_failslab+0x81/0x90 [ 1684.036569][T26414] should_failslab+0x5/0x20 [ 1684.041059][T26414] kmem_cache_alloc+0x46/0x2e0 [ 1684.045802][T26414] ? anon_vma_fork+0x273/0x2b0 [ 1684.050557][T26414] dup_mmap+0x38e/0x9c0 [ 1684.054791][T26414] dup_mm+0x7c/0x210 [ 1684.058678][T26414] copy_process+0x144f/0x2f70 [ 1684.063334][T26414] kernel_clone+0x14b/0x680 [ 1684.067817][T26414] ? __fget_light+0x21b/0x260 [ 1684.072473][T26414] __do_sys_fork+0x3a/0x60 [ 1684.076877][T26414] do_syscall_64+0x3d/0x90 [ 1684.081306][T26414] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1684.087277][T26414] RIP: 0033:0x4665e9 [ 1684.091148][T26414] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1684.110877][T26414] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1684.119286][T26414] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1684.127301][T26414] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1684.135323][T26414] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1684.143640][T26414] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1684.151611][T26414] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:08:59 executing program 2: clock_nanosleep(0x7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) clock_getres(0xec647fae6190341e, &(0x7f0000000140)) 17:08:59 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x21, 0x6, 0xff) getsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000040)=0x10) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 17:08:59 executing program 5: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 17:08:59 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x0, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000800}, 0x0) sendmsg$NL802154_CMD_GET_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x402, 0x70bd29, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x2000}, 0x1) 17:08:59 executing program 4 (fault-call:3 fault-nth:59): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:08:59 executing program 0: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) 17:08:59 executing program 5: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 17:08:59 executing program 1: clock_nanosleep(0x1, 0x0, &(0x7f0000000000), 0x0) clock_gettime(0x6, &(0x7f0000000040)) r0 = socket(0x1e, 0x80000, 0xfffffffa) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) [ 1684.622941][T26424] FAULT_INJECTION: forcing a failure. [ 1684.622941][T26424] name failslab, interval 1, probability 0, space 0, times 0 [ 1684.635719][T26424] CPU: 0 PID: 26424 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1684.644483][T26424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1684.654563][T26424] Call Trace: [ 1684.657837][T26424] dump_stack_lvl+0xb7/0x103 [ 1684.662514][T26424] dump_stack+0x11/0x1a [ 1684.666666][T26424] should_fail+0x23c/0x250 17:08:59 executing program 5: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) [ 1684.671079][T26424] ? anon_vma_clone+0x8d/0x380 [ 1684.675930][T26424] __should_failslab+0x81/0x90 [ 1684.680692][T26424] should_failslab+0x5/0x20 [ 1684.685236][T26424] kmem_cache_alloc+0x46/0x2e0 [ 1684.690196][T26424] ? avc_has_perm_noaudit+0x19a/0x240 [ 1684.695687][T26424] anon_vma_clone+0x8d/0x380 [ 1684.700303][T26424] anon_vma_fork+0x54/0x2b0 [ 1684.705064][T26424] dup_mmap+0x49c/0x9c0 [ 1684.709218][T26424] dup_mm+0x7c/0x210 [ 1684.713246][T26424] copy_process+0x144f/0x2f70 [ 1684.717926][T26424] kernel_clone+0x14b/0x680 17:08:59 executing program 5: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) [ 1684.722427][T26424] ? __fget_light+0x21b/0x260 [ 1684.727098][T26424] __do_sys_fork+0x3a/0x60 [ 1684.731512][T26424] do_syscall_64+0x3d/0x90 [ 1684.735936][T26424] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1684.741915][T26424] RIP: 0033:0x4665e9 [ 1684.745807][T26424] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 17:08:59 executing program 1: clock_gettime(0x6, &(0x7f0000000040)) clock_nanosleep(0x2, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) 17:08:59 executing program 5: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) [ 1684.765687][T26424] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1684.774251][T26424] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1684.782227][T26424] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1684.790191][T26424] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1684.798160][T26424] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1684.806127][T26424] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:09:00 executing program 2: clock_getres(0xec647fae6190341e, &(0x7f0000000140)) 17:09:00 executing program 4 (fault-call:3 fault-nth:60): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:00 executing program 3: syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)={0x160, r0, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x2}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x5}, @NL802154_ATTR_SEC_OUT_KEY_ID={0xd4, 0x20, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_IMPLICIT={0x4c, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa1}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0xffff}, @NL802154_DEV_ADDR_ATTR_MODE={0x8}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0102}}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0x7eff8e4ced7f18a5}}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xffff}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0xffff}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa2}]}, @NL802154_KEY_ID_ATTR_MODE={0x8}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x2}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x34, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0002}}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa2}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc}, @NL802154_DEV_ADDR_ATTR_MODE={0x8}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6}]}, @NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x30, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x3}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x2}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x3}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6}]}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x81}]}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}, @NL802154_ATTR_SEC_ENABLED={0x5}, @NL802154_ATTR_SEC_FRAME_COUNTER={0x8, 0x21, 0x8}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_SEC_OUT_KEY_ID={0x44, 0x20, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_IMPLICIT={0x1c, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa3}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa2}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6}]}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x9}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}, @NL802154_KEY_ID_ATTR_MODE={0x8}, @NL802154_KEY_ID_ATTR_INDEX={0x5}]}]}, 0x160}, 0x1, 0x0, 0x0, 0x4c080}, 0x40810) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r1, 0x0, 0x0) sendmsg$IEEE802154_LLSEC_GETPARAMS(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20008800}, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r2, 0x0, 0x0, 0x2000, 0x0, 0x0) 17:09:00 executing program 5: r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 17:09:00 executing program 2: clock_getres(0x0, &(0x7f0000000140)) [ 1685.485173][T26457] FAULT_INJECTION: forcing a failure. [ 1685.485173][T26457] name failslab, interval 1, probability 0, space 0, times 0 [ 1685.497838][T26457] CPU: 0 PID: 26457 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1685.506593][T26457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1685.516641][T26457] Call Trace: [ 1685.519913][T26457] dump_stack_lvl+0xb7/0x103 [ 1685.524503][T26457] dump_stack+0x11/0x1a [ 1685.528688][T26457] should_fail+0x23c/0x250 [ 1685.533127][T26457] ? dup_mmap+0x38e/0x9c0 [ 1685.537466][T26457] __should_failslab+0x81/0x90 [ 1685.542241][T26457] should_failslab+0x5/0x20 [ 1685.546831][T26457] kmem_cache_alloc+0x46/0x2e0 [ 1685.551591][T26457] ? __vma_link_rb+0x3c2/0x3e0 [ 1685.556336][T26457] ? up_write+0x25/0xc0 [ 1685.560550][T26457] dup_mmap+0x38e/0x9c0 [ 1685.564781][T26457] dup_mm+0x7c/0x210 [ 1685.568654][T26457] copy_process+0x144f/0x2f70 [ 1685.573491][T26457] kernel_clone+0x14b/0x680 [ 1685.577989][T26457] ? __fget_light+0x21b/0x260 17:09:00 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semop(r1, &(0x7f0000000040)=[{0x1, 0x81, 0x1000}, {0x4, 0xfff8, 0x2000}, {0x1, 0x4}, {0x2, 0x58c7, 0x1000}], 0x4) 17:09:00 executing program 5: r0 = add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 17:09:00 executing program 5: r0 = add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) [ 1685.582661][T26457] __do_sys_fork+0x3a/0x60 [ 1685.587070][T26457] do_syscall_64+0x3d/0x90 [ 1685.591486][T26457] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1685.597374][T26457] RIP: 0033:0x4665e9 [ 1685.601314][T26457] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1685.621352][T26457] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 17:09:00 executing program 1: clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f00000000c0)) clock_nanosleep(0x0, 0x0, &(0x7f0000000100)={0x0, 0x989680}, 0x0) 17:09:00 executing program 5: r0 = add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 17:09:00 executing program 2: clock_getres(0x0, &(0x7f0000000140)) [ 1685.629784][T26457] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1685.637750][T26457] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1685.645716][T26457] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1685.653740][T26457] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1685.661710][T26457] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:09:00 executing program 4 (fault-call:3 fault-nth:61): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000300)={&(0x7f00000000c0)={0x228, r1, 0x400, 0x70bd28, 0x25dfdbfd, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}, {0x5}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}, {0x5}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}, {0x5, 0x83, 0x6}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}, {0x5, 0x83, 0x2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}, {0x5, 0x83, 0x1}}]}, 0x228}, 0x1, 0x0, 0x0, 0x26895}, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r2, 0x0, 0x0, 0x2000, 0x0, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r3, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(r3, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x8}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x48000}, 0x40000) 17:09:00 executing program 2: clock_getres(0x0, &(0x7f0000000140)) [ 1685.754968][T26490] FAULT_INJECTION: forcing a failure. [ 1685.754968][T26490] name failslab, interval 1, probability 0, space 0, times 0 [ 1685.767689][T26490] CPU: 0 PID: 26490 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1685.776602][T26490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1685.786720][T26490] Call Trace: [ 1685.790006][T26490] dump_stack_lvl+0xb7/0x103 [ 1685.794631][T26490] dump_stack+0x11/0x1a [ 1685.798839][T26490] should_fail+0x23c/0x250 [ 1685.803266][T26490] ? dup_mmap+0x38e/0x9c0 [ 1685.807587][T26490] __should_failslab+0x81/0x90 [ 1685.812349][T26490] should_failslab+0x5/0x20 [ 1685.816882][T26490] kmem_cache_alloc+0x46/0x2e0 [ 1685.821724][T26490] dup_mmap+0x38e/0x9c0 [ 1685.825906][T26490] dup_mm+0x7c/0x210 [ 1685.829895][T26490] copy_process+0x144f/0x2f70 [ 1685.834598][T26490] kernel_clone+0x14b/0x680 [ 1685.839107][T26490] ? __fget_light+0x21b/0x260 [ 1685.843787][T26490] __do_sys_fork+0x3a/0x60 [ 1685.848281][T26490] do_syscall_64+0x3d/0x90 17:09:01 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000640)={'wpan3\x00', 0x0}) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f0000000740)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00032abd7000fcdbdf251f00000008000200", @ANYRES32=r1, @ANYBLOB="08001200", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="0a0001007770616e3400000008000200", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB], 0x60}, 0x1, 0x0, 0x0, 0x8004}, 0x24004080) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(r0, &(0x7f00000005c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000580)={&(0x7f0000000780)={0x8c, r2, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_SEC_DEVKEY={0x70, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0xad2}, @NL802154_DEVKEY_ATTR_ID={0x54, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x40}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x2c, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x3}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa2}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0302}}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0002}}]}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x1}, @NL802154_KEY_ID_ATTR_INDEX={0x5}]}, @NL802154_DEVKEY_ATTR_ID={0x10, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x6}]}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x4041}, 0x24008010) r4 = syz_genetlink_get_family_id$smc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x38, r4, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_ETHNAME={0x14}]}, 0x38}, 0x1, 0x0, 0x0, 0x40}, 0x20000) clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) [ 1685.852710][T26490] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1685.858615][T26490] RIP: 0033:0x4665e9 [ 1685.862502][T26490] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1685.882279][T26490] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1685.890783][T26490] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 17:09:01 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000040)={0x0, 0x989680}, 0x0) sched_rr_get_interval(0x0, &(0x7f0000000140)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)=0x0) sched_rr_get_interval(r0, &(0x7f00000000c0)) clock_gettime(0x4, &(0x7f0000000000)) [ 1685.898797][T26490] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1685.906857][T26490] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1685.914830][T26490] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1685.922908][T26490] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:09:01 executing program 5: r0 = add_key$keyring(&(0x7f0000000280), 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 17:09:01 executing program 0: socket$inet_icmp(0x2, 0x2, 0x1) add_key$fscrypt_provisioning(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x2}, &(0x7f00000002c0)=ANY=[@ANYBLOB="81000000000000003917351e5f3b12173675575a9020d7272cec4faf81f2b647bda5468d4264470249d66cb0235f3ff61fb067ecc96be92f9ba6637a8f16b215aa7df5ba983b1389b11f020e6de028a73c6433295927ec3da053f2"], 0xc, 0xfffffffffffffffc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000040)={'erspan0\x00', 0x0, 0x80, 0x8000, 0x100, 0xa5, {{0x8, 0x4, 0x2, 0x6, 0x20, 0x67, 0x0, 0xb4, 0x4, 0x0, @rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x17}, {[@rr={0x7, 0xb, 0xae, [@loopback, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl0\x00', r0, 0x7, 0x700, 0x401, 0x6, {{0x27, 0x4, 0x1, 0x9, 0x9c, 0x64, 0x0, 0x4, 0x2f, 0x0, @multicast2, @broadcast, {[@timestamp={0x44, 0x1c, 0x3d, 0x0, 0x8, [0x5, 0x0, 0x0, 0xf4ee, 0x20, 0x0]}, @noop, @timestamp_prespec={0x44, 0x4c, 0x8b, 0x3, 0x2, [{@local, 0x9}, {@private=0xa010102, 0x1}, {@local, 0x8}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x5}, {@local}, {@local, 0xa6d1}, {@broadcast, 0xc9}, {@multicast2}, {@local, 0x7}]}, @ssrr={0x89, 0x1f, 0x53, [@local, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, @dev={0xac, 0x14, 0x14, 0x42}, @empty, @local]}]}}}}}) r1 = semget$private(0x0, 0x4, 0x0) semop(r1, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) semctl$GETNCNT(r1, 0x1, 0xe, 0x0) 17:09:01 executing program 2: clock_getres(0xec647fae6190341e, 0x0) 17:09:01 executing program 4 (fault-call:3 fault-nth:62): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:01 executing program 1: clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={r0, r1+60000000}, 0x0) clock_getres(0x1, &(0x7f00000000c0)) semget$private(0x0, 0x0, 0x40) semtimedop(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0xd2b1, 0x1800}, {0x1, 0x7, 0x1000}, {0x3, 0x6, 0x1000}, {0x4, 0x1ff, 0x1000}, {0x0, 0xe342, 0x800}, {0x0, 0xb6, 0x1000}, {0x1, 0x80}, {0x3, 0x5, 0x800}], 0x8, &(0x7f0000000080)={0x0, 0x989680}) 17:09:01 executing program 5: r0 = add_key$keyring(&(0x7f0000000280), 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 17:09:01 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r1, 0x0, 0x0) recvfrom$packet(r1, &(0x7f0000000000)=""/95, 0x5f, 0x2122, &(0x7f0000000080)={0x11, 0x2, 0x0, 0x1, 0x9, 0x6, @multicast}, 0x14) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 17:09:01 executing program 3: sendmsg$SMC_PNETID_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="5000c404", @ANYRES16=0x0, @ANYBLOB="00032dbd7000fbdbdf25040000000900010073797a68662331f8d2810abc8c30000000000900010073797a31000000000500040002000000140002007369743000"/74], 0x50}, 0x1, 0x0, 0x0, 0x8080}, 0x4) r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r1, 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000180)=@buf={0x9, &(0x7f0000000140)="c5b4c0afc95e142626"}) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$IEEE802154_LIST_IFACE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r2, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) [ 1686.486235][T26535] FAULT_INJECTION: forcing a failure. [ 1686.486235][T26535] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1686.499488][T26535] CPU: 0 PID: 26535 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1686.508595][T26535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1686.518643][T26535] Call Trace: [ 1686.521924][T26535] dump_stack_lvl+0xb7/0x103 [ 1686.526512][T26535] dump_stack+0x11/0x1a [ 1686.530667][T26535] should_fail+0x23c/0x250 17:09:01 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) clock_gettime(0x5, &(0x7f0000000080)) clock_gettime(0x3, &(0x7f0000000040)) 17:09:01 executing program 5: r0 = add_key$keyring(&(0x7f0000000280), 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 17:09:01 executing program 5: add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) [ 1686.535078][T26535] __alloc_pages+0x102/0x320 [ 1686.539690][T26535] alloc_pages+0x2e8/0x340 [ 1686.544113][T26535] pte_alloc_one+0x29/0xb0 [ 1686.548533][T26535] __pte_alloc+0x2f/0x210 [ 1686.553039][T26535] copy_pte_range+0x126e/0x1470 [ 1686.557894][T26535] ? __down_write_common+0x42/0x810 [ 1686.563093][T26535] ? __rb_insert_augmented+0x7f/0x350 [ 1686.568494][T26535] copy_page_range+0x5da/0x8e0 [ 1686.573258][T26535] ? anon_vma_fork+0x273/0x2b0 [ 1686.578050][T26535] dup_mmap+0x6ab/0x9c0 [ 1686.582205][T26535] dup_mm+0x7c/0x210 [ 1686.586100][T26535] copy_process+0x144f/0x2f70 [ 1686.590783][T26535] kernel_clone+0x14b/0x680 [ 1686.595280][T26535] ? __fget_light+0x21b/0x260 [ 1686.599952][T26535] __do_sys_fork+0x3a/0x60 [ 1686.604373][T26535] do_syscall_64+0x3d/0x90 [ 1686.608784][T26535] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1686.614669][T26535] RIP: 0033:0x4665e9 17:09:01 executing program 5: add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 17:09:01 executing program 5: add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) [ 1686.618562][T26535] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1686.638592][T26535] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1686.647006][T26535] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1686.654970][T26535] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1686.663056][T26535] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1686.671044][T26535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1686.679025][T26535] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:09:02 executing program 4 (fault-call:3 fault-nth:63): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:02 executing program 2: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffff9, 0xa573478220676a05) clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) clock_gettime(0x5, &(0x7f0000000040)) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x0, 0x2, 0x70bd28, 0x25dfdbff, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x20008801) keyctl$reject(0x13, r0, 0x8, 0xc0, r0) 17:09:02 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = semget$private(0x0, 0x1, 0x424) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0x3, 0x1000}, {0x0, 0x200, 0x800}, {0x3, 0x7fff, 0x1000}, {0x0, 0x5, 0x1000}, {0x4, 0x1, 0x1000}, {0x4, 0x3ff, 0x800}, {0x3, 0x4}], 0x7, &(0x7f00000000c0)={r1, r2+60000000}) 17:09:02 executing program 5: r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, 0x0, &(0x7f0000000080)={'syz', 0x2}, 0x0) 17:09:02 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x240000, 0x0) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x4c, 0x0, 0x800, 0x70bd27, 0x25dfdbff, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1\x00'}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4040004}, 0x4000001) r1 = semget$private(0x0, 0x4, 0x0) semop(r1, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000280)=""/118, &(0x7f0000000300)=0x76) semctl$GETNCNT(r1, 0x1, 0xe, 0x0) r2 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000080)=""/83) semtimedop(r2, &(0x7f0000000040)=[{0x4, 0x4}, {0x0, 0x1, 0x800}], 0x2, &(0x7f0000000080)={0x0, 0x3938700}) semctl$IPC_INFO(r2, 0x2, 0x3, &(0x7f0000000340)=""/85) 17:09:02 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 17:09:02 executing program 5: r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, 0x0, &(0x7f0000000080)={'syz', 0x2}, 0x0) [ 1687.349890][T26566] FAULT_INJECTION: forcing a failure. [ 1687.349890][T26566] name failslab, interval 1, probability 0, space 0, times 0 [ 1687.362511][T26566] CPU: 1 PID: 26566 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1687.371364][T26566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1687.381412][T26566] Call Trace: [ 1687.384683][T26566] dump_stack_lvl+0xb7/0x103 [ 1687.389266][T26566] dump_stack+0x11/0x1a [ 1687.393479][T26566] should_fail+0x23c/0x250 17:09:02 executing program 2: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffff9, 0xa573478220676a05) clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) clock_gettime(0x5, &(0x7f0000000040)) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x0, 0x2, 0x70bd28, 0x25dfdbff, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x20008801) keyctl$reject(0x13, r0, 0x8, 0xc0, r0) [ 1687.397898][T26566] ? dup_mmap+0x38e/0x9c0 [ 1687.402238][T26566] __should_failslab+0x81/0x90 [ 1687.407001][T26566] should_failslab+0x5/0x20 [ 1687.411502][T26566] kmem_cache_alloc+0x46/0x2e0 [ 1687.416317][T26566] ? anon_vma_fork+0x273/0x2b0 [ 1687.421082][T26566] dup_mmap+0x38e/0x9c0 [ 1687.425233][T26566] dup_mm+0x7c/0x210 [ 1687.429120][T26566] copy_process+0x144f/0x2f70 [ 1687.433789][T26566] kernel_clone+0x14b/0x680 [ 1687.438295][T26566] ? __fget_light+0x21b/0x260 [ 1687.442970][T26566] __do_sys_fork+0x3a/0x60 [ 1687.447387][T26566] do_syscall_64+0x3d/0x90 [ 1687.451796][T26566] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1687.457686][T26566] RIP: 0033:0x4665e9 [ 1687.461571][T26566] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1687.481158][T26566] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1687.489584][T26566] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 17:09:02 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) getsockopt$packet_int(r0, 0x107, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0x4) 17:09:02 executing program 4 (fault-call:3 fault-nth:64): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:02 executing program 2: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffff9, 0xa573478220676a05) clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) clock_gettime(0x5, &(0x7f0000000040)) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x0, 0x2, 0x70bd28, 0x25dfdbff, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x20008801) keyctl$reject(0x13, r0, 0x8, 0xc0, r0) [ 1687.497552][T26566] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1687.506050][T26566] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1687.514103][T26566] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1687.522064][T26566] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:09:02 executing program 5: r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, 0x0, &(0x7f0000000080)={'syz', 0x2}, 0x0) [ 1687.613294][T26589] FAULT_INJECTION: forcing a failure. [ 1687.613294][T26589] name failslab, interval 1, probability 0, space 0, times 0 [ 1687.626037][T26589] CPU: 0 PID: 26589 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1687.634793][T26589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1687.644843][T26589] Call Trace: [ 1687.648117][T26589] dump_stack_lvl+0xb7/0x103 [ 1687.652714][T26589] dump_stack+0x11/0x1a [ 1687.656870][T26589] should_fail+0x23c/0x250 17:09:02 executing program 5: r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f0000000040)='dns_resolver\x00', 0x0, 0x0) 17:09:02 executing program 2: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffff9, 0xa573478220676a05) clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) clock_gettime(0x5, &(0x7f0000000040)) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x0, 0x2, 0x70bd28, 0x25dfdbff, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x20008801) 17:09:02 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) 17:09:02 executing program 1: clock_nanosleep(0x7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) clock_gettime(0x5, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f00000000c0)) clock_getres(0x5, &(0x7f0000000040)) [ 1687.661302][T26589] ? anon_vma_fork+0x117/0x2b0 [ 1687.666069][T26589] __should_failslab+0x81/0x90 [ 1687.670828][T26589] should_failslab+0x5/0x20 [ 1687.675328][T26589] kmem_cache_alloc+0x46/0x2e0 [ 1687.680146][T26589] ? anon_vma_fork+0xb1/0x2b0 [ 1687.684977][T26589] anon_vma_fork+0x117/0x2b0 [ 1687.690024][T26589] dup_mmap+0x49c/0x9c0 [ 1687.694185][T26589] dup_mm+0x7c/0x210 [ 1687.698080][T26589] copy_process+0x144f/0x2f70 [ 1687.702815][T26589] kernel_clone+0x14b/0x680 [ 1687.707703][T26589] ? __fget_light+0x21b/0x260 [ 1687.712376][T26589] __do_sys_fork+0x3a/0x60 [ 1687.716789][T26589] do_syscall_64+0x3d/0x90 [ 1687.721239][T26589] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1687.727135][T26589] RIP: 0033:0x4665e9 [ 1687.731256][T26589] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1687.750861][T26589] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1687.759272][T26589] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1687.767237][T26589] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1687.775202][T26589] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1687.783171][T26589] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1687.791171][T26589] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:09:03 executing program 5: r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f0000000040)='dns_resolver\x00', 0x0, 0x0) 17:09:03 executing program 2: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffff9, 0xa573478220676a05) clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) clock_gettime(0x5, &(0x7f0000000040)) 17:09:03 executing program 4 (fault-call:3 fault-nth:65): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:03 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) accept4$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14, 0x800) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) getpgid(0xffffffffffffffff) 17:09:03 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f00000000c0)=[{0x4, 0x5, 0x800}, {0x2, 0x4, 0x2800}, {0x0, 0x1, 0x800}], 0x3) semctl$IPC_RMID(r0, 0x0, 0x0) semop(r0, &(0x7f0000000000)=[{}, {0x0, 0x3}], 0x2) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000180)=""/169) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000340)={0x0, @ax25={0x3, @bcast, 0x3}, @nl=@kern={0x10, 0x0, 0x0, 0x80000}, @can={0x1d, 0x0}, 0x1, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000300)='ip6gre0\x00', 0x3308, 0x9, 0x2}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f00000003c0)={'tunl0\x00', r4, 0x10, 0x1, 0x80, 0xfffff001, {{0x10, 0x4, 0x1, 0x9, 0x40, 0x67, 0x0, 0x0, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, {[@cipso={0x86, 0x2a, 0x3, [{0x1, 0x8, "91be54160870"}, {0x7, 0x6, "212a15bd"}, {0x5, 0x5, "8249f5"}, {0x5, 0x11, "8df51a4052b40817c2e8b6470a08ff"}]}, @noop]}}}}}) semtimedop(r0, &(0x7f0000000240)=[{0x3, 0xff, 0x1000}, {0x2, 0xb5c}, {0x2, 0x4, 0x800}, {0x4, 0x9, 0x1800}, {0x1, 0x6, 0x5b5e734f42c3a7f8}, {0x4, 0xaf, 0x800}, {0x4, 0x3}, {0x1, 0x4, 0x800}, {0x3, 0xaa}], 0x9, &(0x7f00000002c0)={r2, r3+10000000}) semtimedop(r0, &(0x7f0000000100)=[{0x2, 0x7fff, 0x1000}, {0x0, 0x16e2, 0x1800}], 0x2, &(0x7f0000000140)={0x0, 0x989680}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000040)={0x3ff, 0x4000002, 0x1, {0x3, 0x4}, 0x20, 0x2}) [ 1688.234653][T26613] FAULT_INJECTION: forcing a failure. [ 1688.234653][T26613] name failslab, interval 1, probability 0, space 0, times 0 [ 1688.247291][T26613] CPU: 1 PID: 26613 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1688.256051][T26613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1688.266146][T26613] Call Trace: [ 1688.269507][T26613] dump_stack_lvl+0xb7/0x103 [ 1688.274096][T26613] dump_stack+0x11/0x1a [ 1688.278250][T26613] should_fail+0x23c/0x250 17:09:03 executing program 5: r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f0000000040)='dns_resolver\x00', 0x0, 0x0) 17:09:03 executing program 2: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffff9, 0xa573478220676a05) clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) 17:09:03 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) r1 = semget(0x3, 0x1, 0x600) semtimedop(r1, &(0x7f0000000040)=[{0x0, 0x100}, {0x1, 0x0, 0x1000}, {0x0, 0x3f, 0x1800}, {0x4, 0x3}, {0x0, 0x0, 0x800}, {0x2, 0x8, 0x1c00}, {0x3, 0xa5, 0x2000}, {0x2, 0x8, 0x1800}, {0x4, 0x81, 0x1000}], 0x9, &(0x7f00000000c0)) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) [ 1688.282669][T26613] ? dup_mmap+0x38e/0x9c0 [ 1688.286994][T26613] __should_failslab+0x81/0x90 [ 1688.291751][T26613] should_failslab+0x5/0x20 [ 1688.296257][T26613] kmem_cache_alloc+0x46/0x2e0 [ 1688.301064][T26613] ? __vma_link_rb+0x3c2/0x3e0 [ 1688.305826][T26613] ? up_write+0x25/0xc0 [ 1688.309978][T26613] dup_mmap+0x38e/0x9c0 [ 1688.314300][T26613] dup_mm+0x7c/0x210 [ 1688.318264][T26613] copy_process+0x144f/0x2f70 [ 1688.323022][T26613] kernel_clone+0x14b/0x680 [ 1688.327554][T26613] ? __fget_light+0x21b/0x260 17:09:03 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x4) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r3 = fsmount(r2, 0x0, 0xa) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000640), r1) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r3, &(0x7f00000007c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000780)={&(0x7f0000000680)={0xfc, r4, 0x800, 0x70bd2c, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x401}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xffffffff}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x26}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4010}, 0x21082cd285189a34) sendmsg$DEVLINK_CMD_SB_GET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)={0x164, r4, 0x200, 0x70bd2b, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x8}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x20}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x9}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0xffffffff}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0xd89}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x2}}, {@pci={{0x8}, {0x11}}, {0x8}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x5}}]}, 0x164}, 0x1, 0x0, 0x0, 0x10}, 0x800) r5 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r5, 0x0, 0x0, 0x2000, 0x0, 0x0) [ 1688.332219][T26613] __do_sys_fork+0x3a/0x60 [ 1688.336623][T26613] do_syscall_64+0x3d/0x90 [ 1688.341074][T26613] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1688.346965][T26613] RIP: 0033:0x4665e9 [ 1688.350855][T26613] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1688.370461][T26613] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 17:09:03 executing program 2: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:03 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14, 0x800) connect$packet(r1, &(0x7f0000000080)={0x11, 0x7, 0x0, 0x1, 0x7, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0x14) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r2, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x2000, 0x0, 0x0) [ 1688.378962][T26613] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1688.386963][T26613] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1688.395209][T26613] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1688.403187][T26613] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1688.411148][T26613] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:09:03 executing program 1: clock_nanosleep(0x5, 0x1, &(0x7f0000000000)={0x0, 0x989680}, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) semtimedop(0xffffffffffffffff, &(0x7f0000000100)=[{0x0, 0xffff}], 0x1, &(0x7f0000000180)={r2, r3+60000000}) clock_nanosleep(0x1, 0x0, &(0x7f00000000c0)={0x77359400}, 0x0) clock_nanosleep(0x4, 0x1, &(0x7f0000000080)={r0, r1+60000000}, 0x0) 17:09:03 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:03 executing program 4 (fault-call:3 fault-nth:66): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:03 executing program 3: r0 = request_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)='\x00', 0x0) r1 = add_key$fscrypt_provisioning(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000400)=ANY=[@ANYBLOB="0000000000000000616263040066670003f7ee847a0943709a9a400b3c8e4c16ba0ab294871e829ac2f5a7e9188fdb4e3f810efa944cfe1ed187a8fbcfe48833b20ced96de184b0db2f77be97cc5abb6"], 0x18, r0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000380)={0x2ae0, 0x3, 0x4, {0x20, 0x9b79}, 0xcf8, 0xffffd7e6}) recvfrom$packet(r2, 0x0, 0x0, 0x2000, 0x0, 0x0) getpeername$packet(r2, &(0x7f0000000000), &(0x7f0000000040)=0x14) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFCONF(r3, 0x8912, &(0x7f00000001c0)=@buf={0x1b, &(0x7f0000000180)="45bb06704458d2c68541b8b647a97f4a0eb71c8b3c3738476a4bc8"}) r4 = add_key$keyring(&(0x7f0000000280), &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$negate(0xd, r1, 0x4b80, r4) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000080)={@in={{0x2, 0x4e24, @multicast2}}, 0x0, 0x0, 0x0, 0x0, "6888456dc20b71a6ec68bd9043a3c9960ad2164be519aeef991c32b632e0cc896242f39203e50286416901295401835c5ef06fafd3b01d75c434bd48a034cbe12328243800b8c102353138384ac6db52"}, 0xd8) 17:09:03 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x402b40, 0x0) r2 = fsmount(r0, 0x1, 0xfa) syz_genetlink_get_family_id$devlink(&(0x7f00000000c0), r2) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x8040, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3) fsmount(r1, 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r4, 0x0, 0x0) recvfrom$packet(r4, 0x0, 0x17, 0x40000001, 0x0, 0x0) 17:09:03 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0x0) [ 1688.700095][T26651] FAULT_INJECTION: forcing a failure. [ 1688.700095][T26651] name failslab, interval 1, probability 0, space 0, times 0 [ 1688.712902][T26651] CPU: 1 PID: 26651 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1688.721663][T26651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1688.731946][T26651] Call Trace: [ 1688.735224][T26651] dump_stack_lvl+0xb7/0x103 [ 1688.739806][T26651] dump_stack+0x11/0x1a [ 1688.743946][T26651] should_fail+0x23c/0x250 [ 1688.748541][T26651] ? dup_mmap+0x38e/0x9c0 [ 1688.752857][T26651] __should_failslab+0x81/0x90 [ 1688.757607][T26651] should_failslab+0x5/0x20 [ 1688.762103][T26651] kmem_cache_alloc+0x46/0x2e0 [ 1688.766887][T26651] dup_mmap+0x38e/0x9c0 [ 1688.771048][T26651] dup_mm+0x7c/0x210 [ 1688.774925][T26651] copy_process+0x144f/0x2f70 [ 1688.779611][T26651] kernel_clone+0x14b/0x680 [ 1688.784107][T26651] ? __fget_light+0x21b/0x260 [ 1688.788776][T26651] __do_sys_fork+0x3a/0x60 [ 1688.793194][T26651] do_syscall_64+0x3d/0x90 17:09:03 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:03 executing program 3: recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x2000, 0x0, 0x0) [ 1688.797720][T26651] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1688.797747][T26651] RIP: 0033:0x4665e9 [ 1688.797761][T26651] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1688.797779][T26651] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1688.797797][T26651] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1688.797807][T26651] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1688.797877][T26651] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1688.797889][T26651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1688.797901][T26651] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:09:04 executing program 0: semop(0x0, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) semctl$GETNCNT(0x0, 0x1, 0xe, 0x0) r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SETVAL(r0, 0x1, 0x10, &(0x7f0000000040)=0x6) 17:09:04 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:04 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x40200) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000040)={{0x0, 0x3f}, 'port1\x00', 0x54, 0x0, 0x4, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000180)={{0x4, 0x5}, 'port0\x00', 0xc, 0x820, 0x8, 0xffff, 0x80000000, 0xaae6, 0x3, 0x0, 0x0, 0x2}) clock_nanosleep(0x2, 0x1, &(0x7f0000000100)={0x77359400}, &(0x7f0000000140)) r1 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r1, 0x0, 0x0, 0x2000, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) 17:09:04 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x402b40, 0x0) r2 = fsmount(r0, 0x1, 0xfa) syz_genetlink_get_family_id$devlink(&(0x7f00000000c0), r2) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x8040, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3) fsmount(r1, 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r4, 0x0, 0x0) recvfrom$packet(r4, 0x0, 0x17, 0x40000001, 0x0, 0x0) 17:09:04 executing program 4 (fault-call:3 fault-nth:67): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:04 executing program 1: semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000040)=""/147) clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) 17:09:04 executing program 2: semop(0x0, 0x0, 0x1a) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000040)={0x1, 0x80000000, 0x80005, {0x2, 0xfffffb26}, 0x57, 0x2}) 17:09:04 executing program 5: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000000)=""/97) r1 = semget(0x0, 0x1, 0x1a) r2 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000000100)=""/249) r3 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r3, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_STAT_ANY(0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000080)=""/83) semget(0x0, 0x3, 0x3a55bca9e6fa7b72) semctl$IPC_RMID(r1, 0x0, 0x0) semop(r1, 0x0, 0x70e19372b5655d0a) 17:09:04 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000040)={'wpan1\x00'}) semop(r0, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000080)=""/54) 17:09:04 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f00000000c0)={0x77359400}, 0x0) clock_getres(0x1, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000000)) clock_getres(0x7, &(0x7f0000000100)) clock_nanosleep(0x3, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) 17:09:04 executing program 5: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000000)=""/97) r1 = semget(0x0, 0x1, 0x1a) r2 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000000100)=""/249) r3 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r3, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_STAT_ANY(0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000080)=""/83) semget(0x0, 0x3, 0x3a55bca9e6fa7b72) semctl$IPC_RMID(r1, 0x0, 0x0) semop(r1, 0x0, 0x70e19372b5655d0a) [ 1689.617385][T26693] FAULT_INJECTION: forcing a failure. [ 1689.617385][T26693] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1689.630624][T26693] CPU: 0 PID: 26693 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1689.639640][T26693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1689.649776][T26693] Call Trace: [ 1689.649786][T26693] dump_stack_lvl+0xb7/0x103 17:09:04 executing program 5: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000000)=""/97) r1 = semget(0x0, 0x1, 0x1a) r2 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000000100)=""/249) r3 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r3, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_STAT_ANY(0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000080)=""/83) semget(0x0, 0x3, 0x3a55bca9e6fa7b72) semctl$IPC_RMID(r1, 0x0, 0x0) semop(r1, 0x0, 0x70e19372b5655d0a) 17:09:04 executing program 1: semctl$GETNCNT(0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000040)=""/76) clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = semget$private(0x0, 0x2, 0x80) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000000c0)=[0x8, 0x7f, 0x7, 0x5, 0x6, 0x5]) [ 1689.649804][T26693] dump_stack+0x11/0x1a [ 1689.649818][T26693] should_fail+0x23c/0x250 [ 1689.649838][T26693] __alloc_pages+0x102/0x320 [ 1689.649858][T26693] alloc_pages+0x2e8/0x340 [ 1689.649879][T26693] pte_alloc_one+0x29/0xb0 17:09:04 executing program 4 (fault-call:3 fault-nth:68): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() [ 1689.649897][T26693] __pte_alloc+0x2f/0x210 [ 1689.649918][T26693] copy_pte_range+0x126e/0x1470 [ 1689.649935][T26693] copy_page_range+0x5da/0x8e0 [ 1689.649957][T26693] ? anon_vma_fork+0x273/0x2b0 [ 1689.649978][T26693] dup_mmap+0x6ab/0x9c0 [ 1689.649996][T26693] dup_mm+0x7c/0x210 [ 1689.650012][T26693] copy_process+0x144f/0x2f70 [ 1689.650028][T26693] kernel_clone+0x14b/0x680 [ 1689.650045][T26693] ? __fget_light+0x21b/0x260 [ 1689.650060][T26693] __do_sys_fork+0x3a/0x60 [ 1689.650077][T26693] do_syscall_64+0x3d/0x90 [ 1689.650096][T26693] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1689.650115][T26693] RIP: 0033:0x4665e9 [ 1689.650126][T26693] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1689.650140][T26693] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1689.650156][T26693] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1689.650166][T26693] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1689.650177][T26693] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1689.650189][T26693] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1689.650201][T26693] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 [ 1689.743025][T26712] FAULT_INJECTION: forcing a failure. [ 1689.743025][T26712] name failslab, interval 1, probability 0, space 0, times 0 [ 1689.874421][T26712] CPU: 0 PID: 26712 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1689.883179][T26712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1689.893230][T26712] Call Trace: [ 1689.896494][T26712] dump_stack_lvl+0xb7/0x103 [ 1689.901064][T26712] dump_stack+0x11/0x1a [ 1689.905674][T26712] should_fail+0x23c/0x250 [ 1689.910100][T26712] ? dup_mmap+0x38e/0x9c0 [ 1689.914464][T26712] __should_failslab+0x81/0x90 [ 1689.919344][T26712] should_failslab+0x5/0x20 [ 1689.923834][T26712] kmem_cache_alloc+0x46/0x2e0 [ 1689.928613][T26712] ? anon_vma_fork+0x273/0x2b0 [ 1689.933418][T26712] dup_mmap+0x38e/0x9c0 [ 1689.937666][T26712] dup_mm+0x7c/0x210 [ 1689.941541][T26712] copy_process+0x144f/0x2f70 [ 1689.946200][T26712] kernel_clone+0x14b/0x680 [ 1689.950689][T26712] ? __fget_light+0x21b/0x260 [ 1689.955421][T26712] __do_sys_fork+0x3a/0x60 [ 1689.959822][T26712] do_syscall_64+0x3d/0x90 [ 1689.964223][T26712] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1689.970113][T26712] RIP: 0033:0x4665e9 [ 1689.974005][T26712] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1689.993599][T26712] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1690.002046][T26712] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1690.010018][T26712] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1690.017967][T26712] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1690.026020][T26712] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1690.033990][T26712] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:09:05 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x240081, 0x0) r2 = fsmount(r1, 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r4 = fsmount(r3, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000140)={0x6, 0x2, {0x2, 0x2, 0x8, 0x3, 0x8000}, 0xffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r4, 0xc05c5340, &(0x7f00000001c0)={0x1, 0x6, 0x401, {0x10000}, 0x2, 0xfffff800}) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x402200, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r5, 0x1, 0x1, &(0x7f00000000c0)={0x7}, 0x4) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0xa000, 0x0) accept4$packet(r2, &(0x7f0000000000), &(0x7f0000000040)=0x14, 0x0) 17:09:05 executing program 1: clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) clock_nanosleep(0x6, 0x0, &(0x7f0000000000)={r0, r1+60000000}, 0x0) clock_gettime(0x1, &(0x7f0000000080)) sched_rr_get_interval(0xffffffffffffffff, &(0x7f0000000040)) 17:09:05 executing program 5: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000000)=""/97) r1 = semget(0x0, 0x1, 0x1a) r2 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000000100)=""/249) r3 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r3, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_STAT_ANY(0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000080)=""/83) semget(0x0, 0x3, 0x3a55bca9e6fa7b72) semctl$IPC_RMID(r1, 0x0, 0x0) 17:09:05 executing program 2: semop(0x0, 0x0, 0x1a) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000040)={0x1, 0x80000000, 0x80005, {0x2, 0xfffffb26}, 0x57, 0x2}) 17:09:05 executing program 4 (fault-call:3 fault-nth:69): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() [ 1690.197216][T26722] FAULT_INJECTION: forcing a failure. [ 1690.197216][T26722] name failslab, interval 1, probability 0, space 0, times 0 [ 1690.209861][T26722] CPU: 0 PID: 26722 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1690.218710][T26722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1690.228760][T26722] Call Trace: [ 1690.232035][T26722] dump_stack_lvl+0xb7/0x103 [ 1690.236738][T26722] dump_stack+0x11/0x1a [ 1690.240971][T26722] should_fail+0x23c/0x250 [ 1690.245415][T26722] ? anon_vma_fork+0x117/0x2b0 [ 1690.250183][T26722] __should_failslab+0x81/0x90 [ 1690.254931][T26722] should_failslab+0x5/0x20 [ 1690.259418][T26722] kmem_cache_alloc+0x46/0x2e0 [ 1690.264268][T26722] ? anon_vma_fork+0xb1/0x2b0 [ 1690.268952][T26722] anon_vma_fork+0x117/0x2b0 [ 1690.273545][T26722] dup_mmap+0x49c/0x9c0 [ 1690.277699][T26722] dup_mm+0x7c/0x210 [ 1690.281583][T26722] copy_process+0x144f/0x2f70 [ 1690.286235][T26722] kernel_clone+0x14b/0x680 [ 1690.290735][T26722] ? __fget_light+0x21b/0x260 [ 1690.295393][T26722] __do_sys_fork+0x3a/0x60 [ 1690.299788][T26722] do_syscall_64+0x3d/0x90 [ 1690.304392][T26722] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1690.310286][T26722] RIP: 0033:0x4665e9 [ 1690.314156][T26722] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1690.333759][T26722] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 17:09:05 executing program 5: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000000)=""/97) r1 = semget(0x0, 0x1, 0x1a) r2 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000000100)=""/249) r3 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r3, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_STAT_ANY(0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000080)=""/83) semget(0x0, 0x3, 0x3a55bca9e6fa7b72) semctl$IPC_RMID(r1, 0x0, 0x0) [ 1690.342165][T26722] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1690.350320][T26722] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1690.358467][T26722] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1690.366426][T26722] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1690.374564][T26722] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:09:05 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{}, {0x0, 0xff01, 0x1800}], 0x2) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) 17:09:05 executing program 5: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000000)=""/97) semget(0x0, 0x1, 0x1a) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETALL(r1, 0x0, 0xd, &(0x7f0000000100)=""/249) r2 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_STAT_ANY(0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000080)=""/83) semget(0x0, 0x3, 0x3a55bca9e6fa7b72) 17:09:05 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000), 0x4) setfsuid(0x0) 17:09:05 executing program 2 (fault-call:0 fault-nth:0): keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:05 executing program 4 (fault-call:3 fault-nth:70): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:05 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/213, 0xd5, 0x1, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x80, 0x0, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x4}, 0x804) [ 1690.503837][T26747] FAULT_INJECTION: forcing a failure. [ 1690.503837][T26747] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1690.514573][T26746] FAULT_INJECTION: forcing a failure. [ 1690.514573][T26746] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1690.517098][T26747] CPU: 0 PID: 26747 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1690.538810][T26747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1690.548851][T26747] Call Trace: [ 1690.552113][T26747] dump_stack_lvl+0xb7/0x103 [ 1690.556689][T26747] dump_stack+0x11/0x1a [ 1690.560824][T26747] should_fail+0x23c/0x250 [ 1690.565229][T26747] __alloc_pages+0x102/0x320 [ 1690.569810][T26747] alloc_pages+0x2e8/0x340 [ 1690.574221][T26747] get_zeroed_page+0x13/0x40 [ 1690.578801][T26747] __pud_alloc+0x44/0x190 [ 1690.583109][T26747] copy_page_range+0x73a/0x8e0 [ 1690.587859][T26747] ? vma_interval_tree_augment_rotate+0x100/0x100 [ 1690.594260][T26747] ? __do_sys_brk+0x580/0x580 [ 1690.598920][T26747] ? anon_vma_fork+0x273/0x2b0 [ 1690.603667][T26747] dup_mmap+0x6ab/0x9c0 [ 1690.607805][T26747] dup_mm+0x7c/0x210 [ 1690.611699][T26747] copy_process+0x144f/0x2f70 [ 1690.616357][T26747] kernel_clone+0x14b/0x680 [ 1690.620843][T26747] ? __fget_light+0x21b/0x260 [ 1690.625501][T26747] __do_sys_fork+0x3a/0x60 [ 1690.629899][T26747] do_syscall_64+0x3d/0x90 [ 1690.634298][T26747] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1690.640192][T26747] RIP: 0033:0x4665e9 [ 1690.644081][T26747] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1690.663685][T26747] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1690.672165][T26747] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1690.680163][T26747] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1690.688115][T26747] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1690.696070][T26747] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1690.704369][T26747] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 [ 1690.712328][T26746] CPU: 1 PID: 26746 Comm: syz-executor.2 Not tainted 5.14.0-rc6-syzkaller #0 [ 1690.721087][T26746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1690.731137][T26746] Call Trace: [ 1690.735622][T26746] dump_stack_lvl+0xb7/0x103 [ 1690.740212][T26746] dump_stack+0x11/0x1a [ 1690.744368][T26746] should_fail+0x23c/0x250 [ 1690.748789][T26746] should_fail_usercopy+0x16/0x20 17:09:05 executing program 1: clock_nanosleep(0x1, 0x0, &(0x7f0000000000), 0x0) clock_getres(0x5, &(0x7f0000000040)) 17:09:05 executing program 0: clock_getres(0x0, &(0x7f0000000140)) r0 = semget$private(0x0, 0x3, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r1, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000040)={{0x0, 0x5}, 'port1\x00', 0x0, 0x90000, 0x5, 0x8000, 0x3ff, 0x6, 0x7fff, 0x0, 0x4, 0x1}) semop(r0, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f0000000100)) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) 17:09:05 executing program 5: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000000)=""/97) semget(0x0, 0x1, 0x1a) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETALL(r1, 0x0, 0xd, &(0x7f0000000100)=""/249) r2 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_STAT_ANY(0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000080)=""/83) semget(0x0, 0x3, 0x3a55bca9e6fa7b72) 17:09:05 executing program 4 (fault-call:3 fault-nth:71): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() [ 1690.753875][T26746] _copy_to_user+0x1c/0x90 [ 1690.758288][T26746] simple_read_from_buffer+0xab/0x120 [ 1690.763652][T26746] proc_fail_nth_read+0xf6/0x140 [ 1690.768593][T26746] ? rw_verify_area+0x136/0x250 [ 1690.773439][T26746] ? proc_fault_inject_write+0x200/0x200 [ 1690.779076][T26746] vfs_read+0x154/0x5d0 [ 1690.783244][T26746] ? __fget_light+0x21b/0x260 [ 1690.787920][T26746] ? __cond_resched+0x11/0x40 [ 1690.791942][T26753] FAULT_INJECTION: forcing a failure. [ 1690.791942][T26753] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1690.792601][T26746] ksys_read+0xce/0x180 [ 1690.792625][T26746] __x64_sys_read+0x3e/0x50 [ 1690.815080][T26746] do_syscall_64+0x3d/0x90 [ 1690.819538][T26746] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1690.825563][T26746] RIP: 0033:0x41936c [ 1690.829438][T26746] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1690.849028][T26746] RSP: 002b:00007f8dd4b60170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1690.857423][T26746] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041936c [ 1690.865445][T26746] RDX: 000000000000000f RSI: 00007f8dd4b601e0 RDI: 0000000000000003 [ 1690.873398][T26746] RBP: 00007f8dd4b601d0 R08: 0000000000000000 R09: 0000000000000000 [ 1690.881349][T26746] R10: fffffffffffffff9 R11: 0000000000000246 R12: 0000000000000001 [ 1690.889302][T26746] R13: 00007fffdbe9cdef R14: 00007f8dd4b60300 R15: 0000000000022000 [ 1690.897258][T26753] CPU: 0 PID: 26753 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1690.906013][T26753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1690.916071][T26753] Call Trace: [ 1690.919340][T26753] dump_stack_lvl+0xb7/0x103 [ 1690.923918][T26753] dump_stack+0x11/0x1a [ 1690.928066][T26753] should_fail+0x23c/0x250 [ 1690.932491][T26753] __alloc_pages+0x102/0x320 [ 1690.937075][T26753] alloc_pages+0x2e8/0x340 [ 1690.941486][T26753] __pmd_alloc+0x47/0x310 [ 1690.945804][T26753] ? __pud_alloc+0x159/0x190 [ 1690.950394][T26753] copy_page_range+0x695/0x8e0 17:09:06 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:06 executing program 3: recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x2000, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000)=@req={0x0, 0x3ff, 0x2, 0x3}, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000080)=0x14) 17:09:06 executing program 5: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000000)=""/97) semget(0x0, 0x1, 0x1a) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETALL(r1, 0x0, 0xd, &(0x7f0000000100)=""/249) r2 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_STAT_ANY(0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000080)=""/83) semget(0x0, 0x3, 0x3a55bca9e6fa7b72) [ 1690.955162][T26753] ? anon_vma_fork+0x273/0x2b0 [ 1690.959929][T26753] dup_mmap+0x6ab/0x9c0 [ 1690.964091][T26753] dup_mm+0x7c/0x210 [ 1690.967977][T26753] copy_process+0x144f/0x2f70 [ 1690.972658][T26753] kernel_clone+0x14b/0x680 [ 1690.977157][T26753] ? __fget_light+0x21b/0x260 [ 1690.981829][T26753] __do_sys_fork+0x3a/0x60 [ 1690.986241][T26753] do_syscall_64+0x3d/0x90 [ 1690.990653][T26753] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1690.996542][T26753] RIP: 0033:0x4665e9 17:09:06 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) socket$packet(0x11, 0x2, 0x300) [ 1691.000427][T26753] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1691.020114][T26753] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1691.028522][T26753] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1691.036487][T26753] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1691.044446][T26753] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 17:09:06 executing program 2: keyctl$KEYCTL_MOVE(0x2, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:06 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x11, 0x80000, 0x2) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0xd4, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xffffffff}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xd0}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x6}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x1}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x2}}]}, 0xd4}, 0x1, 0x0, 0x0, 0x4000}, 0x14) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 17:09:06 executing program 1: clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x7, &(0x7f0000000080)) clock_nanosleep(0x1, 0x0, &(0x7f0000000000), 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r3 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r3, 0xfffffffffffffffa, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000100)={r0, r1+60000000}, 0x0) 17:09:06 executing program 5: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000000)=""/97) r1 = semget(0x0, 0x1, 0x1a) r2 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000000100)=""/249) r3 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r3, 0x3, 0x14, &(0x7f0000000080)=""/83) semget(0x0, 0x3, 0x3a55bca9e6fa7b72) semctl$IPC_RMID(r1, 0x0, 0x0) [ 1691.052412][T26753] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1691.060466][T26753] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:09:06 executing program 5: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000000)=""/97) r1 = semget(0x0, 0x1, 0x1a) r2 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000000100)=""/249) r3 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r3, 0x3, 0x14, &(0x7f0000000080)=""/83) semget(0x0, 0x3, 0x3a55bca9e6fa7b72) semctl$IPC_RMID(r1, 0x0, 0x0) 17:09:06 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000100), 0x0) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) r1 = semget$private(0x0, 0x4, 0x80) semctl$GETZCNT(r1, 0x1, 0xf, &(0x7f0000000100)=""/232) semop(r1, &(0x7f0000000000)=[{0x1, 0x2}, {0x3, 0x2, 0x1800}, {0x2, 0xffff, 0x800}, {0x4, 0x40, 0x3800}, {0x0, 0x8, 0x1000}, {0x1, 0x2}], 0x6) semctl$IPC_INFO(r0, 0x0, 0x3, &(0x7f0000000040)=""/171) 17:09:06 executing program 3: r0 = semget$private(0x0, 0x3, 0x35d) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000100)=""/77) semctl$GETVAL(r0, 0xef2d59bc1ea88e38, 0xc, &(0x7f0000000000)=""/196) r2 = semget(0x0, 0x1, 0x100) semctl$GETZCNT(r2, 0x1, 0xf, &(0x7f0000001200)=""/69) r3 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r3, 0x0, 0x0, 0x2000, 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0x181003, 0x0) recvfrom$packet(r4, &(0x7f00000001c0)=""/4096, 0x1000, 0x2, &(0x7f00000011c0)={0x11, 0xd, 0x0, 0x1, 0x6, 0x6, @local}, 0x14) 17:09:06 executing program 4 (fault-call:3 fault-nth:72): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:06 executing program 2: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:06 executing program 5: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000000)=""/97) r1 = semget(0x0, 0x1, 0x1a) r2 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000000100)=""/249) semget(0x0, 0x1, 0x1a) semget(0x0, 0x3, 0x3a55bca9e6fa7b72) semctl$IPC_RMID(r1, 0x0, 0x0) 17:09:06 executing program 2: keyctl$KEYCTL_MOVE(0x4, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:06 executing program 5: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000000)=""/97) r1 = semget(0x0, 0x1, 0x1a) r2 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000000100)=""/249) semget(0x0, 0x1, 0x1a) semget(0x0, 0x3, 0x3a55bca9e6fa7b72) semctl$IPC_RMID(r1, 0x0, 0x0) [ 1691.827773][T26793] FAULT_INJECTION: forcing a failure. [ 1691.827773][T26793] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1691.841033][T26793] CPU: 0 PID: 26793 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1691.849795][T26793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1691.859848][T26793] Call Trace: [ 1691.859859][T26793] dump_stack_lvl+0xb7/0x103 [ 1691.867705][T26793] dump_stack+0x11/0x1a [ 1691.871841][T26793] should_fail+0x23c/0x250 [ 1691.876264][T26793] __alloc_pages+0x102/0x320 [ 1691.880859][T26793] alloc_pages+0x2e8/0x340 [ 1691.885279][T26793] pte_alloc_one+0x29/0xb0 [ 1691.889687][T26793] ? kcsan_setup_watchpoint+0x231/0x3e0 [ 1691.895244][T26793] __pte_alloc+0x2f/0x210 [ 1691.899577][T26793] copy_pte_range+0x126e/0x1470 [ 1691.904435][T26793] copy_page_range+0x5da/0x8e0 [ 1691.909235][T26793] ? __vma_link_rb+0x3c2/0x3e0 [ 1691.913975][T26793] ? up_write+0x25/0xc0 [ 1691.918117][T26793] dup_mmap+0x6ab/0x9c0 [ 1691.922256][T26793] dup_mm+0x7c/0x210 [ 1691.926142][T26793] copy_process+0x144f/0x2f70 [ 1691.930907][T26793] kernel_clone+0x14b/0x680 [ 1691.935409][T26793] ? __fget_light+0x21b/0x260 [ 1691.940087][T26793] __do_sys_fork+0x3a/0x60 [ 1691.944497][T26793] do_syscall_64+0x3d/0x90 [ 1691.948934][T26793] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1691.954873][T26793] RIP: 0033:0x4665e9 [ 1691.958757][T26793] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 17:09:07 executing program 1: clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = socket(0x14, 0x4, 0x5) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r2, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x9c, r1, 0x0, 0x70bd2d, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x8}, {0x6, 0x11, 0x1f}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x6}, {0x6, 0x11, 0x6}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x1}, {0x6, 0x11, 0x65fc}}]}, 0x9c}, 0x1, 0x0, 0x0, 0x80}, 0x4000) 17:09:07 executing program 2: keyctl$KEYCTL_MOVE(0x5, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:07 executing program 5: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000000)=""/97) r1 = semget(0x0, 0x1, 0x1a) r2 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000000100)=""/249) semget(0x0, 0x3, 0x3a55bca9e6fa7b72) semctl$IPC_RMID(r1, 0x0, 0x0) [ 1691.978559][T26793] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1691.986978][T26793] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1691.994943][T26793] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1692.003263][T26793] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1692.011231][T26793] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1692.019195][T26793] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:09:07 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc08c5335, &(0x7f00000002c0)) clock_nanosleep(0x7ac95975953878d7, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) 17:09:07 executing program 4 (fault-call:3 fault-nth:73): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:07 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000040)=[0x9]) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_STAT(r0, 0x4, 0x12, &(0x7f0000000100)=""/190) semop(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x800}, {0x0, 0xff01}], 0x2) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) 17:09:07 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000000)="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", 0x1000) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r1, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0xfffffdcc, 0x40, 0x0, 0x0) setsockopt$packet_buf(r0, 0x107, 0x16, &(0x7f0000001000)="826cf1ee471587d8d4180c2180bcc9d85eb66cab1407ce0f66c1ad39705136f54c08918b39574a953ea8d85ad195f1a599554a0e2805c6c344424736e6504d707b0278911609beb50abe6e2fa921a7edb4d94cf69286ec529553612046ee5f6003962ce4e1b0254b2938a45037f4dfed0d313bb251662aa02e957704327a8aa6b36df2047aa40af5b70dae9cad9d9de1fbc6a606e55f0e6ea34f3de0289df97a0ad9d08878e5908ecc50bd49e9edf477a86700b8cbf9f1e14ac70b9db1e0633717a8ead0c51716cdd7eb0eff3da2be8903b05deeda41a1b7f3762aaafc51201478e5b20d3db84101aab8d9c5013d96768b1e99", 0xf3) 17:09:07 executing program 5: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000000)=""/97) r1 = semget(0x0, 0x1, 0x1a) r2 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000000100)=""/249) semget(0x0, 0x3, 0x3a55bca9e6fa7b72) semctl$IPC_RMID(r1, 0x0, 0x0) 17:09:07 executing program 1: keyctl$KEYCTL_MOVE(0x4, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) [ 1692.109306][T26823] FAULT_INJECTION: forcing a failure. [ 1692.109306][T26823] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1692.122602][T26823] CPU: 0 PID: 26823 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1692.131396][T26823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1692.141448][T26823] Call Trace: [ 1692.144719][T26823] dump_stack_lvl+0xb7/0x103 [ 1692.149320][T26823] dump_stack+0x11/0x1a [ 1692.153471][T26823] should_fail+0x23c/0x250 17:09:07 executing program 1: keyctl$KEYCTL_MOVE(0x4, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) [ 1692.157912][T26823] __alloc_pages+0x102/0x320 [ 1692.162522][T26823] alloc_pages+0x2e8/0x340 [ 1692.166936][T26823] pte_alloc_one+0x29/0xb0 [ 1692.171395][T26823] __pte_alloc+0x2f/0x210 [ 1692.175739][T26823] copy_pte_range+0x126e/0x1470 [ 1692.180588][T26823] copy_page_range+0x5da/0x8e0 [ 1692.185359][T26823] ? __vma_link_rb+0x3c2/0x3e0 [ 1692.190120][T26823] ? up_write+0x25/0xc0 [ 1692.194267][T26823] dup_mmap+0x6ab/0x9c0 [ 1692.198419][T26823] dup_mm+0x7c/0x210 [ 1692.202373][T26823] copy_process+0x144f/0x2f70 17:09:07 executing program 1: keyctl$KEYCTL_MOVE(0x4, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:07 executing program 1: keyctl$KEYCTL_MOVE(0x4, 0x0, 0x0, 0xfffffffffffffff9, 0x0) [ 1692.207037][T26823] kernel_clone+0x14b/0x680 [ 1692.211594][T26823] ? __fget_light+0x21b/0x260 [ 1692.216265][T26823] __do_sys_fork+0x3a/0x60 [ 1692.220746][T26823] do_syscall_64+0x3d/0x90 [ 1692.225161][T26823] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1692.231046][T26823] RIP: 0033:0x4665e9 [ 1692.234957][T26823] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 17:09:07 executing program 1: clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x7, &(0x7f0000000080)) clock_nanosleep(0x1, 0x0, &(0x7f0000000000), 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r3 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r3, 0xfffffffffffffffa, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000100)={r0, r1+60000000}, 0x0) 17:09:07 executing program 2: keyctl$KEYCTL_MOVE(0x6, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:07 executing program 5: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000000)=""/97) r1 = semget(0x0, 0x1, 0x1a) r2 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000080)=""/83) semget(0x0, 0x3, 0x3a55bca9e6fa7b72) semctl$IPC_RMID(r1, 0x0, 0x0) [ 1692.254609][T26823] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1692.263011][T26823] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1692.270994][T26823] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1692.278962][T26823] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1692.286926][T26823] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1692.294895][T26823] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:09:07 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) 17:09:07 executing program 4 (fault-call:3 fault-nth:74): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() [ 1692.405155][T26855] FAULT_INJECTION: forcing a failure. [ 1692.405155][T26855] name failslab, interval 1, probability 0, space 0, times 0 [ 1692.417798][T26855] CPU: 1 PID: 26855 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1692.426569][T26855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1692.436609][T26855] Call Trace: [ 1692.439897][T26855] dump_stack_lvl+0xb7/0x103 [ 1692.444481][T26855] dump_stack+0x11/0x1a [ 1692.448623][T26855] should_fail+0x23c/0x250 [ 1692.453067][T26855] ? dup_mmap+0x38e/0x9c0 [ 1692.457378][T26855] __should_failslab+0x81/0x90 [ 1692.462123][T26855] should_failslab+0x5/0x20 [ 1692.466614][T26855] kmem_cache_alloc+0x46/0x2e0 [ 1692.471496][T26855] ? __vma_link_rb+0x3c2/0x3e0 [ 1692.476255][T26855] ? up_write+0x25/0xc0 [ 1692.480408][T26855] dup_mmap+0x38e/0x9c0 [ 1692.484557][T26855] dup_mm+0x7c/0x210 [ 1692.488429][T26855] copy_process+0x144f/0x2f70 [ 1692.493110][T26855] kernel_clone+0x14b/0x680 [ 1692.497599][T26855] ? __fget_light+0x21b/0x260 [ 1692.502275][T26855] __do_sys_fork+0x3a/0x60 [ 1692.506681][T26855] do_syscall_64+0x3d/0x90 [ 1692.511163][T26855] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1692.517082][T26855] RIP: 0033:0x4665e9 [ 1692.521038][T26855] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1692.540715][T26855] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1692.549122][T26855] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1692.557518][T26855] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1692.565486][T26855] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1692.573435][T26855] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1692.581392][T26855] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:09:08 executing program 0: keyctl$KEYCTL_MOVE(0x6, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:08 executing program 2: keyctl$KEYCTL_MOVE(0x7, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:08 executing program 5: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000000)=""/97) r1 = semget(0x0, 0x1, 0x1a) r2 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000080)=""/83) semget(0x0, 0x3, 0x3a55bca9e6fa7b72) semctl$IPC_RMID(r1, 0x0, 0x0) 17:09:08 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640801, 0x0) fsmount(r0, 0x0, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x40000121, 0x0, 0x0) 17:09:08 executing program 4 (fault-call:3 fault-nth:75): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() [ 1693.017803][T26863] FAULT_INJECTION: forcing a failure. [ 1693.017803][T26863] name failslab, interval 1, probability 0, space 0, times 0 [ 1693.030478][T26863] CPU: 0 PID: 26863 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1693.039233][T26863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1693.049279][T26863] Call Trace: [ 1693.052549][T26863] dump_stack_lvl+0xb7/0x103 [ 1693.057133][T26863] dump_stack+0x11/0x1a [ 1693.061280][T26863] should_fail+0x23c/0x250 17:09:08 executing program 0: keyctl$KEYCTL_MOVE(0x6, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:08 executing program 5: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000000)=""/97) r1 = semget(0x0, 0x1, 0x1a) semget(0x0, 0x1, 0x1a) semget(0x0, 0x3, 0x3a55bca9e6fa7b72) semctl$IPC_RMID(r1, 0x0, 0x0) [ 1693.065710][T26863] ? dup_mmap+0x38e/0x9c0 [ 1693.070083][T26863] __should_failslab+0x81/0x90 [ 1693.074852][T26863] should_failslab+0x5/0x20 [ 1693.079355][T26863] kmem_cache_alloc+0x46/0x2e0 [ 1693.084225][T26863] ? __vma_link_rb+0x3c2/0x3e0 [ 1693.088988][T26863] ? up_write+0x25/0xc0 [ 1693.093210][T26863] dup_mmap+0x38e/0x9c0 [ 1693.097356][T26863] dup_mm+0x7c/0x210 [ 1693.101242][T26863] copy_process+0x144f/0x2f70 [ 1693.105975][T26863] kernel_clone+0x14b/0x680 [ 1693.110472][T26863] ? __fget_light+0x21b/0x260 [ 1693.115136][T26863] __do_sys_fork+0x3a/0x60 [ 1693.119610][T26863] do_syscall_64+0x3d/0x90 [ 1693.124097][T26863] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1693.130008][T26863] RIP: 0033:0x4665e9 [ 1693.133893][T26863] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1693.153538][T26863] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 17:09:08 executing program 1: clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x7, &(0x7f0000000080)) clock_nanosleep(0x1, 0x0, &(0x7f0000000000), 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r3 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r3, 0xfffffffffffffffa, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000100)={r0, r1+60000000}, 0x0) 17:09:08 executing program 2: keyctl$KEYCTL_MOVE(0x8, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:08 executing program 5: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000000)=""/97) r1 = semget(0x0, 0x1, 0x1a) semget(0x0, 0x1, 0x1a) semget(0x0, 0x3, 0x3a55bca9e6fa7b72) semctl$IPC_RMID(r1, 0x0, 0x0) 17:09:08 executing program 0: keyctl$KEYCTL_MOVE(0x6, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:08 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, 0x0, 0x5f, 0x2000, 0x0, 0x41) [ 1693.162018][T26863] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1693.169972][T26863] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1693.177930][T26863] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1693.185879][T26863] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1693.193831][T26863] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:09:08 executing program 4 (fault-call:3 fault-nth:76): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:08 executing program 2: keyctl$KEYCTL_MOVE(0x9, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:08 executing program 0: keyctl$KEYCTL_MOVE(0x6, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:08 executing program 5: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000000)=""/97) r1 = semget(0x0, 0x1, 0x1a) semget(0x0, 0x3, 0x3a55bca9e6fa7b72) semctl$IPC_RMID(r1, 0x0, 0x0) [ 1693.290675][T26887] FAULT_INJECTION: forcing a failure. [ 1693.290675][T26887] name failslab, interval 1, probability 0, space 0, times 0 [ 1693.303307][T26887] CPU: 0 PID: 26887 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1693.312127][T26887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1693.322241][T26887] Call Trace: [ 1693.325530][T26887] dump_stack_lvl+0xb7/0x103 [ 1693.330123][T26887] dump_stack+0x11/0x1a [ 1693.334323][T26887] should_fail+0x23c/0x250 [ 1693.338725][T26887] ? dup_mmap+0x38e/0x9c0 [ 1693.343094][T26887] __should_failslab+0x81/0x90 [ 1693.347853][T26887] should_failslab+0x5/0x20 [ 1693.352356][T26887] kmem_cache_alloc+0x46/0x2e0 [ 1693.357124][T26887] ? __vma_link_rb+0x3c2/0x3e0 [ 1693.361875][T26887] ? up_write+0x25/0xc0 [ 1693.366030][T26887] dup_mmap+0x38e/0x9c0 [ 1693.370174][T26887] dup_mm+0x7c/0x210 [ 1693.374073][T26887] copy_process+0x144f/0x2f70 [ 1693.378736][T26887] kernel_clone+0x14b/0x680 [ 1693.383264][T26887] ? __fget_light+0x21b/0x260 [ 1693.387928][T26887] __do_sys_fork+0x3a/0x60 [ 1693.392320][T26887] do_syscall_64+0x3d/0x90 [ 1693.396751][T26887] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1693.402842][T26887] RIP: 0033:0x4665e9 [ 1693.406724][T26887] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1693.426323][T26887] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 17:09:08 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = fsmount(0xffffffffffffffff, 0x1, 0xfc) accept4$packet(r1, &(0x7f0000000000), &(0x7f0000000040)=0x14, 0x80800) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 17:09:08 executing program 0: keyctl$KEYCTL_MOVE(0x5, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:08 executing program 5: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000000)=""/97) r1 = semget(0x0, 0x1, 0x1a) semget(0x0, 0x3, 0x3a55bca9e6fa7b72) semctl$IPC_RMID(r1, 0x0, 0x0) [ 1693.434734][T26887] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1693.442696][T26887] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1693.450660][T26887] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1693.458616][T26887] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1693.466569][T26887] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:09:09 executing program 1: clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x7, &(0x7f0000000080)) clock_nanosleep(0x1, 0x0, &(0x7f0000000000), 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r3 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r3, 0xfffffffffffffffa, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000100)={r0, r1+60000000}, 0x0) 17:09:09 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) bind$packet(r0, &(0x7f0000000080)={0x11, 0x10, 0x0, 0x1, 0x3}, 0x14) socket$packet(0x11, 0x3, 0x300) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r1, 0x1, 0x41) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000000)={0x88, 0x1, {0x3, 0x0, 0x2, 0x1, 0x3}, 0x449}) 17:09:09 executing program 4 (fault-call:3 fault-nth:77): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:09 executing program 2: keyctl$KEYCTL_MOVE(0xa, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:09 executing program 5: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000000)=""/97) semget(0x0, 0x3, 0x3a55bca9e6fa7b72) semctl$IPC_RMID(0x0, 0x0, 0x0) 17:09:09 executing program 0: keyctl$KEYCTL_MOVE(0x5, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:09 executing program 5: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000000)=""/97) semget(0x0, 0x3, 0x3a55bca9e6fa7b72) semctl$IPC_RMID(0x0, 0x0, 0x0) 17:09:09 executing program 3: recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x2000, 0x0, 0x0) 17:09:09 executing program 2: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:09 executing program 0: keyctl$KEYCTL_MOVE(0x5, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) [ 1694.145891][T26918] FAULT_INJECTION: forcing a failure. [ 1694.145891][T26918] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1694.159155][T26918] CPU: 0 PID: 26918 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1694.167911][T26918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1694.177969][T26918] Call Trace: [ 1694.181339][T26918] dump_stack_lvl+0xb7/0x103 [ 1694.185937][T26918] dump_stack+0x11/0x1a [ 1694.190098][T26918] should_fail+0x23c/0x250 17:09:09 executing program 3: semctl$GETNCNT(0x0, 0x4, 0xe, &(0x7f0000000100)=""/91) r0 = socket$packet(0x11, 0x3, 0x300) r1 = fsopen(&(0x7f0000000080)='afs\x00', 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r2, 0x11, 0x67, &(0x7f0000000000), 0x4) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f00000000c0)='P\x00', 0x0, r0) sendto$packet(r0, &(0x7f0000000000)="dffe71389b6e43eb33188648b128995818d2418ca4048b61eb3b", 0x1a, 0x40000, &(0x7f0000000040)={0x11, 0xf5, 0x0, 0x1, 0x80}, 0x14) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) [ 1694.194522][T26918] __alloc_pages+0x102/0x320 [ 1694.199106][T26918] alloc_pages+0x2e8/0x340 [ 1694.203554][T26918] pte_alloc_one+0x29/0xb0 [ 1694.207969][T26918] __pte_alloc+0x2f/0x210 [ 1694.212291][T26918] copy_pte_range+0x126e/0x1470 [ 1694.217134][T26918] copy_page_range+0x5da/0x8e0 [ 1694.221905][T26918] ? __vma_link_rb+0x3c2/0x3e0 [ 1694.226669][T26918] ? up_write+0x25/0xc0 [ 1694.230877][T26918] dup_mmap+0x6ab/0x9c0 [ 1694.235101][T26918] dup_mm+0x7c/0x210 [ 1694.239037][T26918] copy_process+0x144f/0x2f70 17:09:09 executing program 5: r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000000)=""/97) semget(0x0, 0x3, 0x3a55bca9e6fa7b72) semctl$IPC_RMID(0x0, 0x0, 0x0) [ 1694.243712][T26918] kernel_clone+0x14b/0x680 [ 1694.248213][T26918] ? __fget_light+0x21b/0x260 [ 1694.252879][T26918] __do_sys_fork+0x3a/0x60 [ 1694.257285][T26918] do_syscall_64+0x3d/0x90 [ 1694.261698][T26918] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1694.267651][T26918] RIP: 0033:0x4665e9 [ 1694.271554][T26918] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1694.291212][T26918] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1694.299628][T26918] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1694.307703][T26918] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1694.315665][T26918] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1694.323627][T26918] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1694.331622][T26918] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:09:10 executing program 1: clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x7, &(0x7f0000000080)) clock_nanosleep(0x1, 0x0, &(0x7f0000000000), 0x0) clock_gettime(0x0, &(0x7f00000000c0)) r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r0, r1, 0xfffffffffffffffa, 0x0) 17:09:10 executing program 5: semget(0x0, 0x1, 0x1a) r0 = semget(0x0, 0x1, 0x1a) semget(0x0, 0x3, 0x3a55bca9e6fa7b72) semctl$IPC_RMID(r0, 0x0, 0x0) 17:09:10 executing program 0: keyctl$KEYCTL_MOVE(0x5, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:10 executing program 2: keyctl$KEYCTL_MOVE(0xc, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:10 executing program 4 (fault-call:3 fault-nth:78): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:10 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={0x0, 0x1, 0x6, @broadcast}, 0x10) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x48, r2, 0x200, 0x70bd26, 0x25dfdbfe, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x3ff}, {0x6, 0x11, 0x9}}]}, 0x48}}, 0x88000) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) [ 1695.022606][T26950] FAULT_INJECTION: forcing a failure. [ 1695.022606][T26950] name failslab, interval 1, probability 0, space 0, times 0 [ 1695.035238][T26950] CPU: 0 PID: 26950 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1695.044009][T26950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1695.054056][T26950] Call Trace: [ 1695.057331][T26950] dump_stack_lvl+0xb7/0x103 [ 1695.061920][T26950] dump_stack+0x11/0x1a [ 1695.066072][T26950] should_fail+0x23c/0x250 17:09:10 executing program 2: keyctl$KEYCTL_MOVE(0xd, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:10 executing program 5: semget(0x0, 0x1, 0x1a) r0 = semget(0x0, 0x1, 0x1a) semget(0x0, 0x3, 0x3a55bca9e6fa7b72) semctl$IPC_RMID(r0, 0x0, 0x0) [ 1695.070579][T26950] ? dup_mmap+0x38e/0x9c0 [ 1695.074904][T26950] __should_failslab+0x81/0x90 [ 1695.079694][T26950] should_failslab+0x5/0x20 [ 1695.084197][T26950] kmem_cache_alloc+0x46/0x2e0 [ 1695.088997][T26950] ? __vma_link_rb+0x3c2/0x3e0 [ 1695.093758][T26950] ? up_write+0x25/0xc0 [ 1695.097915][T26950] dup_mmap+0x38e/0x9c0 [ 1695.102118][T26950] dup_mm+0x7c/0x210 [ 1695.106007][T26950] copy_process+0x144f/0x2f70 [ 1695.110679][T26950] kernel_clone+0x14b/0x680 [ 1695.115181][T26950] ? __fget_light+0x21b/0x260 17:09:10 executing program 1: clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x7, &(0x7f0000000080)) clock_nanosleep(0x1, 0x0, &(0x7f0000000000), 0x0) clock_gettime(0x0, &(0x7f00000000c0)) r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_MOVE(0x1e, r0, 0x0, 0xfffffffffffffffa, 0x0) [ 1695.119865][T26950] __do_sys_fork+0x3a/0x60 [ 1695.124357][T26950] do_syscall_64+0x3d/0x90 [ 1695.128842][T26950] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1695.134729][T26950] RIP: 0033:0x4665e9 [ 1695.138609][T26950] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1695.158269][T26950] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 17:09:10 executing program 1: clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x7, &(0x7f0000000080)) clock_nanosleep(0x1, 0x0, &(0x7f0000000000), 0x0) clock_gettime(0x0, &(0x7f00000000c0)) r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_MOVE(0x1e, r0, 0x0, 0xfffffffffffffffa, 0x0) 17:09:10 executing program 0: keyctl$KEYCTL_MOVE(0xc, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) [ 1695.166675][T26950] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1695.174641][T26950] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1695.182610][T26950] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1695.190574][T26950] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1695.198546][T26950] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:09:10 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000080)={'tunl0\x00', 0x0, 0x40, 0x20, 0x3513, 0xffffffff, {{0x19, 0x4, 0x0, 0x3a, 0x64, 0x66, 0x0, 0xff, 0x2f, 0x0, @broadcast, @multicast2, {[@end, @ssrr={0x89, 0x27, 0x91, [@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, @empty, @multicast1, @loopback, @broadcast, @local, @private=0xa010102, @multicast1]}, @ssrr={0x89, 0x13, 0x23, [@remote, @local, @broadcast, @broadcast]}, @end, @generic={0x89, 0x7, "a5d83b6f8b"}, @timestamp_prespec={0x44, 0xc, 0xf9, 0x3, 0x0, [{@empty, 0x6dd7}]}]}}}}}) connect$packet(r1, &(0x7f0000000180)={0x11, 0x11, r2, 0x1, 0xfb, 0x6, @local}, 0x14) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x7, 0x40, 0x1, 0x200}, {0x800, 0xf7, 0x1f, 0x2}, {0xffff, 0x4, 0x6, 0x9}, {0x0, 0x8, 0x6}]}, 0x10) 17:09:10 executing program 1: clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x7, &(0x7f0000000080)) clock_nanosleep(0x1, 0x0, &(0x7f0000000000), 0x0) clock_gettime(0x0, &(0x7f00000000c0)) r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_MOVE(0x1e, r0, 0x0, 0xfffffffffffffffa, 0x0) 17:09:10 executing program 2: keyctl$KEYCTL_MOVE(0xe, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:10 executing program 0: keyctl$KEYCTL_MOVE(0xc, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:10 executing program 5: r0 = semget(0x0, 0x1, 0x1a) semget(0x0, 0x3, 0x3a55bca9e6fa7b72) semctl$IPC_RMID(r0, 0x0, 0x0) 17:09:10 executing program 4 (fault-call:3 fault-nth:79): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:10 executing program 1: clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x7, &(0x7f0000000080)) clock_nanosleep(0x1, 0x0, &(0x7f0000000000), 0x0) clock_gettime(0x0, &(0x7f00000000c0)) r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffffa, 0x0) 17:09:10 executing program 0: keyctl$KEYCTL_MOVE(0xc, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:10 executing program 2: keyctl$KEYCTL_MOVE(0xf, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:10 executing program 5: r0 = semget(0x0, 0x1, 0x1a) semget(0x0, 0x3, 0x3a55bca9e6fa7b72) semctl$IPC_RMID(r0, 0x0, 0x0) 17:09:10 executing program 3: r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r2 = fsmount(r1, 0x0, 0xa) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000640), r0) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r2, &(0x7f00000007c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000780)={&(0x7f0000000680)={0xfc, r3, 0x800, 0x70bd2c, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x401}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xffffffff}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x26}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4010}, 0x21082cd285189a34) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x138, r3, 0x4, 0x70bd28, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x1}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x4}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x80cf}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x1000}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x800000}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x7}}, {@pci={{0x8}, {0x11}}, {0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x138}, 0x1, 0x0, 0x0, 0x4}, 0x24040001) r4 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r4, 0x0, 0x0, 0x2000, 0x0, 0x0) r5 = fsmount(0xffffffffffffffff, 0x0, 0x4) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r7 = fsmount(r6, 0x0, 0xa) r8 = syz_genetlink_get_family_id$devlink(&(0x7f0000000640), r5) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r7, &(0x7f00000007c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000780)={&(0x7f0000000680)={0xfc, r8, 0x800, 0x70bd2c, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x401}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xffffffff}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x26}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4010}, 0x21082cd285189a34) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r8, 0x8, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x801}, 0x4000000) 17:09:10 executing program 1: clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x7, &(0x7f0000000080)) clock_nanosleep(0x1, 0x0, &(0x7f0000000000), 0x0) clock_gettime(0x0, &(0x7f00000000c0)) r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffffa, 0x0) 17:09:10 executing program 0: keyctl$KEYCTL_MOVE(0xc, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:10 executing program 2: keyctl$KEYCTL_MOVE(0x10, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) [ 1695.406631][T26993] FAULT_INJECTION: forcing a failure. [ 1695.406631][T26993] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1695.420069][T26993] CPU: 1 PID: 26993 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1695.428821][T26993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1695.438862][T26993] Call Trace: [ 1695.442135][T26993] dump_stack_lvl+0xb7/0x103 [ 1695.446724][T26993] dump_stack+0x11/0x1a [ 1695.450877][T26993] should_fail+0x23c/0x250 17:09:10 executing program 5: r0 = semget(0x0, 0x0, 0x1a) semget(0x0, 0x3, 0x3a55bca9e6fa7b72) semctl$IPC_RMID(r0, 0x0, 0x0) 17:09:10 executing program 5: r0 = semget(0x0, 0x0, 0x1a) semget(0x0, 0x3, 0x3a55bca9e6fa7b72) semctl$IPC_RMID(r0, 0x0, 0x0) [ 1695.455290][T26993] __alloc_pages+0x102/0x320 [ 1695.459882][T26993] alloc_pages+0x2e8/0x340 [ 1695.464381][T26993] pte_alloc_one+0x29/0xb0 [ 1695.468795][T26993] ? kcsan_setup_watchpoint+0x231/0x3e0 [ 1695.474342][T26993] __pte_alloc+0x2f/0x210 [ 1695.478671][T26993] copy_pte_range+0x126e/0x1470 [ 1695.483546][T26993] copy_page_range+0x5da/0x8e0 [ 1695.488307][T26993] ? __vma_link_rb+0x3c2/0x3e0 [ 1695.493114][T26993] ? up_write+0x25/0xc0 [ 1695.497278][T26993] dup_mmap+0x6ab/0x9c0 [ 1695.501468][T26993] dup_mm+0x7c/0x210 17:09:10 executing program 5: r0 = semget(0x0, 0x0, 0x0) semget(0x0, 0x3, 0x3a55bca9e6fa7b72) semctl$IPC_RMID(r0, 0x0, 0x0) [ 1695.505458][T26993] copy_process+0x144f/0x2f70 [ 1695.510152][T26993] kernel_clone+0x14b/0x680 [ 1695.514645][T26993] ? __fget_light+0x21b/0x260 [ 1695.519360][T26993] __do_sys_fork+0x3a/0x60 [ 1695.523846][T26993] do_syscall_64+0x3d/0x90 [ 1695.528267][T26993] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1695.534183][T26993] RIP: 0033:0x4665e9 [ 1695.538068][T26993] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1695.557666][T26993] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1695.566064][T26993] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1695.574023][T26993] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1695.581984][T26993] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1695.589951][T26993] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1695.597915][T26993] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:09:10 executing program 4 (fault-call:3 fault-nth:80): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:10 executing program 2: keyctl$KEYCTL_MOVE(0x11, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:10 executing program 0: keyctl$KEYCTL_MOVE(0x10, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:10 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f0000000000)=""/30, &(0x7f0000000040)=0x1e) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 17:09:10 executing program 1: clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x7, &(0x7f0000000080)) clock_nanosleep(0x1, 0x0, &(0x7f0000000000), 0x0) clock_gettime(0x0, &(0x7f00000000c0)) r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffffa, 0x0) 17:09:10 executing program 5: r0 = semget(0x0, 0x0, 0x0) semget(0x0, 0x3, 0x3a55bca9e6fa7b72) semctl$IPC_RMID(r0, 0x0, 0x0) 17:09:10 executing program 2: keyctl$KEYCTL_MOVE(0x12, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:10 executing program 1: clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x7, &(0x7f0000000080)) clock_nanosleep(0x1, 0x0, &(0x7f0000000000), 0x0) r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r0, r1, 0xfffffffffffffffa, 0x0) [ 1695.700758][T27027] FAULT_INJECTION: forcing a failure. [ 1695.700758][T27027] name failslab, interval 1, probability 0, space 0, times 0 [ 1695.713484][T27027] CPU: 1 PID: 27027 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1695.722245][T27027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1695.732295][T27027] Call Trace: [ 1695.735568][T27027] dump_stack_lvl+0xb7/0x103 [ 1695.740151][T27027] dump_stack+0x11/0x1a [ 1695.744301][T27027] should_fail+0x23c/0x250 17:09:10 executing program 1: clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x7, &(0x7f0000000080)) r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r0, r1, 0xfffffffffffffffa, 0x0) [ 1695.748738][T27027] ? dup_mmap+0x38e/0x9c0 [ 1695.753140][T27027] __should_failslab+0x81/0x90 [ 1695.757891][T27027] should_failslab+0x5/0x20 [ 1695.762387][T27027] kmem_cache_alloc+0x46/0x2e0 [ 1695.767201][T27027] ? __vma_link_rb+0x3c2/0x3e0 [ 1695.771964][T27027] ? up_write+0x25/0xc0 [ 1695.776134][T27027] dup_mmap+0x38e/0x9c0 [ 1695.780322][T27027] dup_mm+0x7c/0x210 [ 1695.784275][T27027] copy_process+0x144f/0x2f70 [ 1695.788944][T27027] kernel_clone+0x14b/0x680 [ 1695.793443][T27027] ? __fget_light+0x21b/0x260 17:09:10 executing program 1: clock_gettime(0x0, &(0x7f0000000040)) r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r0, r1, 0xfffffffffffffffa, 0x0) [ 1695.798108][T27027] __do_sys_fork+0x3a/0x60 [ 1695.802536][T27027] do_syscall_64+0x3d/0x90 [ 1695.806948][T27027] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1695.812912][T27027] RIP: 0033:0x4665e9 [ 1695.816800][T27027] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1695.836394][T27027] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 17:09:11 executing program 5: r0 = semget(0x0, 0x0, 0x0) semget(0x0, 0x0, 0x3a55bca9e6fa7b72) semctl$IPC_RMID(r0, 0x0, 0x0) 17:09:11 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r2 = fsmount(r1, 0x0, 0x0) r3 = fsmount(r2, 0x1, 0x80) setsockopt$packet_buf(r3, 0x107, 0x6, &(0x7f0000000000)="d9d600eec406da58d92859ac6994e725baf536744db04eda67d1d86f93177556b9139c39bd254577b7c296176217691bee8fdbbc87571ed59c18bb55d0684bf1fd30afbd8f18aa1394b4be005e", 0x4d) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) fsmount(r2, 0x0, 0xb8) r4 = accept4$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14, 0x80800) recvfrom$packet(r4, 0x0, 0x0, 0x40000103, 0x0, 0x50) [ 1695.844803][T27027] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1695.852857][T27027] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1695.860873][T27027] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1695.868837][T27027] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1695.876795][T27027] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:09:11 executing program 4 (fault-call:3 fault-nth:81): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:11 executing program 1: r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r0, r1, 0xfffffffffffffffa, 0x0) 17:09:11 executing program 2: keyctl$KEYCTL_MOVE(0x13, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:11 executing program 0: keyctl$KEYCTL_MOVE(0x10, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:11 executing program 5: r0 = semget(0x0, 0x0, 0x0) semget(0x0, 0x0, 0x3a55bca9e6fa7b72) semctl$IPC_RMID(r0, 0x0, 0x0) 17:09:11 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r0, 0x10, 0x70bd29, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x4008001}, 0x880) r1 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r1, 0x0, 0x0, 0x2000, 0x0, 0x0) 17:09:11 executing program 1: r0 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r0, r1, 0xfffffffffffffffa, 0x0) 17:09:11 executing program 1: r0 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r0, r1, 0xfffffffffffffffa, 0x0) 17:09:11 executing program 5: r0 = semget(0x0, 0x0, 0x0) semget(0x0, 0x0, 0x3a55bca9e6fa7b72) semctl$IPC_RMID(r0, 0x0, 0x0) [ 1696.013377][T27060] FAULT_INJECTION: forcing a failure. [ 1696.013377][T27060] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1696.026730][T27060] CPU: 1 PID: 27060 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1696.035485][T27060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1696.045536][T27060] Call Trace: [ 1696.048872][T27060] dump_stack_lvl+0xb7/0x103 [ 1696.053454][T27060] dump_stack+0x11/0x1a [ 1696.057604][T27060] should_fail+0x23c/0x250 17:09:11 executing program 0: keyctl$KEYCTL_MOVE(0x10, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:11 executing program 0: keyctl$KEYCTL_MOVE(0x10, 0x0, 0x0, 0xfffffffffffffff9, 0x0) [ 1696.062061][T27060] __alloc_pages+0x102/0x320 [ 1696.066649][T27060] alloc_pages+0x2e8/0x340 [ 1696.071062][T27060] pte_alloc_one+0x29/0xb0 [ 1696.075537][T27060] __pte_alloc+0x2f/0x210 [ 1696.079868][T27060] copy_pte_range+0x126e/0x1470 [ 1696.084781][T27060] copy_page_range+0x5da/0x8e0 [ 1696.089544][T27060] ? __vma_link_rb+0x3c2/0x3e0 [ 1696.094326][T27060] ? up_write+0x25/0xc0 [ 1696.098514][T27060] dup_mmap+0x6ab/0x9c0 [ 1696.102689][T27060] dup_mm+0x7c/0x210 [ 1696.106591][T27060] copy_process+0x144f/0x2f70 17:09:11 executing program 0: keyctl$KEYCTL_MOVE(0x12, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) [ 1696.111303][T27060] kernel_clone+0x14b/0x680 [ 1696.115799][T27060] ? __fget_light+0x21b/0x260 [ 1696.120482][T27060] __do_sys_fork+0x3a/0x60 [ 1696.124906][T27060] do_syscall_64+0x3d/0x90 [ 1696.129365][T27060] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1696.135252][T27060] RIP: 0033:0x4665e9 [ 1696.139136][T27060] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1696.158732][T27060] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1696.167153][T27060] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1696.175124][T27060] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1696.183104][T27060] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1696.191068][T27060] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1696.199030][T27060] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:09:11 executing program 4 (fault-call:3 fault-nth:82): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:11 executing program 2: keyctl$KEYCTL_MOVE(0x14, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:11 executing program 5: r0 = semget(0x0, 0x0, 0x0) semget(0x0, 0x3, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 17:09:11 executing program 0: keyctl$KEYCTL_MOVE(0x12, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:11 executing program 1: r0 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r0, r1, 0xfffffffffffffffa, 0x0) 17:09:11 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 17:09:11 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r1, 0x0, 0x0) accept4$packet(r1, 0x0, &(0x7f0000000000), 0x80000) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) [ 1696.318743][T27090] FAULT_INJECTION: forcing a failure. [ 1696.318743][T27090] name failslab, interval 1, probability 0, space 0, times 0 [ 1696.331382][T27090] CPU: 0 PID: 27090 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1696.340143][T27090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1696.350194][T27090] Call Trace: [ 1696.353507][T27090] dump_stack_lvl+0xb7/0x103 [ 1696.358194][T27090] dump_stack+0x11/0x1a [ 1696.362345][T27090] should_fail+0x23c/0x250 17:09:11 executing program 2: keyctl$KEYCTL_MOVE(0x15, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:11 executing program 1: r0 = add_key$keyring(&(0x7f0000000140), 0x0, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r0, r1, 0xfffffffffffffffa, 0x0) 17:09:11 executing program 0: keyctl$KEYCTL_MOVE(0x12, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:11 executing program 5: r0 = semget(0x0, 0x0, 0x0) semget(0x0, 0x3, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) [ 1696.366811][T27090] ? dup_mmap+0x38e/0x9c0 [ 1696.371137][T27090] __should_failslab+0x81/0x90 [ 1696.375891][T27090] should_failslab+0x5/0x20 [ 1696.380387][T27090] kmem_cache_alloc+0x46/0x2e0 [ 1696.385212][T27090] ? __vma_link_rb+0x3c2/0x3e0 [ 1696.389974][T27090] ? up_write+0x25/0xc0 [ 1696.394117][T27090] dup_mmap+0x38e/0x9c0 [ 1696.398289][T27090] dup_mm+0x7c/0x210 [ 1696.402174][T27090] copy_process+0x144f/0x2f70 [ 1696.406844][T27090] kernel_clone+0x14b/0x680 [ 1696.411342][T27090] ? __fget_light+0x21b/0x260 17:09:11 executing program 5: r0 = semget(0x0, 0x0, 0x0) semget(0x0, 0x3, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) [ 1696.416097][T27090] __do_sys_fork+0x3a/0x60 [ 1696.420546][T27090] do_syscall_64+0x3d/0x90 [ 1696.424966][T27090] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1696.430929][T27090] RIP: 0033:0x4665e9 [ 1696.434810][T27090] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1696.454425][T27090] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 17:09:11 executing program 4 (fault-call:3 fault-nth:83): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:11 executing program 5: semget(0x0, 0x0, 0x0) semget(0x0, 0x3, 0x3a55bca9e6fa7b72) semctl$IPC_RMID(0x0, 0x0, 0x0) 17:09:11 executing program 2: keyctl$KEYCTL_MOVE(0x18, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:11 executing program 1: r0 = add_key$keyring(&(0x7f0000000140), 0x0, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r0, r1, 0xfffffffffffffffa, 0x0) 17:09:11 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000000), &(0x7f0000000040)=0x4) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000003c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x3}]}) recvfrom$packet(r0, 0x0, 0x5b, 0x110, 0x0, 0x0) 17:09:11 executing program 0: keyctl$KEYCTL_MOVE(0x12, 0x0, 0x0, 0xfffffffffffffff9, 0x0) [ 1696.462830][T27090] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1696.470787][T27090] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1696.478775][T27090] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1696.486736][T27090] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1696.494765][T27090] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:09:11 executing program 0: keyctl$KEYCTL_MOVE(0x12, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:11 executing program 5: keyctl$KEYCTL_MOVE(0x15, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:11 executing program 1: r0 = add_key$keyring(&(0x7f0000000140), 0x0, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r0, r1, 0xfffffffffffffffa, 0x0) 17:09:11 executing program 2: keyctl$KEYCTL_MOVE(0x19, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) [ 1696.612914][ T25] audit: type=1326 audit(1629652151.753:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=27116 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x0 [ 1696.639642][T27120] FAULT_INJECTION: forcing a failure. [ 1696.639642][T27120] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1696.652881][T27120] CPU: 0 PID: 27120 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 17:09:11 executing program 2: keyctl$KEYCTL_MOVE(0x1a, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:11 executing program 0: keyctl$KEYCTL_MOVE(0x12, 0x0, 0x0, 0xfffffffffffffff9, 0x0) [ 1696.661636][T27120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1696.671682][T27120] Call Trace: [ 1696.675041][T27120] dump_stack_lvl+0xb7/0x103 [ 1696.679624][T27120] dump_stack+0x11/0x1a [ 1696.683769][T27120] should_fail+0x23c/0x250 [ 1696.688286][T27120] __alloc_pages+0x102/0x320 [ 1696.692890][T27120] alloc_pages+0x2e8/0x340 [ 1696.697302][T27120] pte_alloc_one+0x29/0xb0 [ 1696.701718][T27120] __pte_alloc+0x2f/0x210 [ 1696.706054][T27120] copy_pte_range+0x126e/0x1470 [ 1696.710905][T27120] copy_page_range+0x5da/0x8e0 [ 1696.715673][T27120] ? __vma_link_rb+0x3c2/0x3e0 [ 1696.720438][T27120] ? up_write+0x25/0xc0 [ 1696.724607][T27120] dup_mmap+0x6ab/0x9c0 [ 1696.728760][T27120] dup_mm+0x7c/0x210 [ 1696.732643][T27120] copy_process+0x144f/0x2f70 [ 1696.737403][T27120] kernel_clone+0x14b/0x680 [ 1696.741905][T27120] ? __fget_light+0x21b/0x260 [ 1696.746633][T27120] __do_sys_fork+0x3a/0x60 [ 1696.751038][T27120] do_syscall_64+0x3d/0x90 [ 1696.755455][T27120] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1696.761370][T27120] RIP: 0033:0x4665e9 [ 1696.765263][T27120] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1696.784892][T27120] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1696.793339][T27120] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1696.801308][T27120] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 17:09:12 executing program 4 (fault-call:3 fault-nth:84): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:12 executing program 5: keyctl$KEYCTL_MOVE(0x15, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:12 executing program 1: r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(0x0, &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r0, r1, 0xfffffffffffffffa, 0x0) 17:09:12 executing program 0: keyctl$KEYCTL_MOVE(0x12, 0x0, 0x0, 0xfffffffffffffff9, 0x0) [ 1696.809392][T27120] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1696.817459][T27120] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1696.825426][T27120] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 [ 1696.870993][T27143] FAULT_INJECTION: forcing a failure. [ 1696.870993][T27143] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1696.884269][T27143] CPU: 0 PID: 27143 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1696.893029][T27143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1696.903079][T27143] Call Trace: [ 1696.906355][T27143] dump_stack_lvl+0xb7/0x103 [ 1696.910960][T27143] dump_stack+0x11/0x1a [ 1696.915105][T27143] should_fail+0x23c/0x250 [ 1696.919537][T27143] __alloc_pages+0x102/0x320 [ 1696.924126][T27143] alloc_pages+0x2e8/0x340 [ 1696.928550][T27143] pte_alloc_one+0x29/0xb0 [ 1696.932948][T27143] ? kcsan_setup_watchpoint+0x231/0x3e0 [ 1696.938507][T27143] __pte_alloc+0x2f/0x210 [ 1696.942830][T27143] copy_pte_range+0x126e/0x1470 [ 1696.947671][T27143] copy_page_range+0x5da/0x8e0 [ 1696.952511][T27143] ? __vma_link_rb+0x3c2/0x3e0 [ 1696.957295][T27143] ? up_write+0x25/0xc0 [ 1696.961424][T27143] dup_mmap+0x6ab/0x9c0 [ 1696.965557][T27143] dup_mm+0x7c/0x210 [ 1696.969689][T27143] copy_process+0x144f/0x2f70 [ 1696.974405][T27143] kernel_clone+0x14b/0x680 [ 1696.978895][T27143] ? __fget_light+0x21b/0x260 [ 1696.983547][T27143] __do_sys_fork+0x3a/0x60 [ 1696.987938][T27143] do_syscall_64+0x3d/0x90 [ 1696.992345][T27143] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1696.998280][T27143] RIP: 0033:0x4665e9 [ 1697.002222][T27143] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1697.022004][T27143] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1697.030396][T27143] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1697.038401][T27143] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1697.046349][T27143] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1697.054337][T27143] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1697.062288][T27143] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:09:12 executing program 5: keyctl$KEYCTL_MOVE(0x15, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:12 executing program 2: keyctl$KEYCTL_MOVE(0x1b, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:12 executing program 1: r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(0x0, &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r0, r1, 0xfffffffffffffffa, 0x0) 17:09:12 executing program 0: keyctl$KEYCTL_MOVE(0x1a, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) [ 1697.420730][ T25] audit: type=1326 audit(1629652152.563:347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=27116 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x0 17:09:12 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0xde, 0x3, 0xfff, 0x0, 0x2, 0x1ff, 0x3}, 0x1c) r1 = accept4$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14, 0x80000) accept4$packet(r0, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001140)=0x14, 0x800) sendto$packet(r1, &(0x7f0000000100)="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", 0x1000, 0x40000, &(0x7f0000001180)={0x11, 0x1c, r2, 0x1, 0x60, 0x6, @remote}, 0x14) bind$packet(r0, &(0x7f0000000040)={0x11, 0xf8, 0x0, 0x1, 0x80}, 0x14) 17:09:12 executing program 4 (fault-call:3 fault-nth:85): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() [ 1697.517775][T27158] FAULT_INJECTION: forcing a failure. [ 1697.517775][T27158] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1697.531039][T27158] CPU: 0 PID: 27158 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1697.539794][T27158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1697.549836][T27158] Call Trace: [ 1697.553112][T27158] dump_stack_lvl+0xb7/0x103 [ 1697.557697][T27158] dump_stack+0x11/0x1a [ 1697.561842][T27158] should_fail+0x23c/0x250 17:09:12 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) 17:09:12 executing program 0: keyctl$KEYCTL_MOVE(0x1a, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:12 executing program 2: keyctl$KEYCTL_MOVE(0x1c, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:12 executing program 5: keyctl$KEYCTL_MOVE(0x15, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:12 executing program 1: r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(0x0, &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r0, r1, 0xfffffffffffffffa, 0x0) [ 1697.566312][T27158] __alloc_pages+0x102/0x320 [ 1697.570939][T27158] alloc_pages+0x2e8/0x340 [ 1697.575354][T27158] pte_alloc_one+0x29/0xb0 [ 1697.579799][T27158] __pte_alloc+0x2f/0x210 [ 1697.584128][T27158] copy_pte_range+0x126e/0x1470 [ 1697.588994][T27158] copy_page_range+0x5da/0x8e0 [ 1697.593824][T27158] ? __vma_link_rb+0x3c2/0x3e0 [ 1697.598620][T27158] ? up_write+0x25/0xc0 [ 1697.602771][T27158] dup_mmap+0x6ab/0x9c0 [ 1697.606928][T27158] dup_mm+0x7c/0x210 [ 1697.610836][T27158] copy_process+0x144f/0x2f70 [ 1697.615593][T27158] kernel_clone+0x14b/0x680 [ 1697.620089][T27158] ? __fget_light+0x21b/0x260 [ 1697.624750][T27158] __do_sys_fork+0x3a/0x60 [ 1697.629156][T27158] do_syscall_64+0x3d/0x90 [ 1697.633570][T27158] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1697.639520][T27158] RIP: 0033:0x4665e9 [ 1697.643413][T27158] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 17:09:12 executing program 0: keyctl$KEYCTL_MOVE(0x1a, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:12 executing program 5: keyctl$KEYCTL_MOVE(0x1b, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:12 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = fsmount(0xffffffffffffffff, 0x0, 0x4) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r3 = fsmount(r2, 0x0, 0xa) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000640), r1) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r3, &(0x7f00000007c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000780)={&(0x7f0000000680)={0xfc, r4, 0x800, 0x70bd2c, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x401}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xffffffff}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x26}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4010}, 0x21082cd285189a34) sendmsg$DEVLINK_CMD_TRAP_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000040)={0x1e0, r4, 0x200, 0x70bd26, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}, {0x5}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}, {0x5}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}, {0x5}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}]}, 0x1e0}, 0x1, 0x0, 0x0, 0x800}, 0x4) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) [ 1697.663014][T27158] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1697.671487][T27158] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1697.679448][T27158] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1697.687405][T27158] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1697.695389][T27158] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1697.703349][T27158] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:09:12 executing program 4 (fault-call:3 fault-nth:86): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:12 executing program 2: keyctl$KEYCTL_MOVE(0x1d, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:12 executing program 1: r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r0, r1, 0xfffffffffffffffa, 0x0) 17:09:12 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) bind$packet(r1, &(0x7f0000000000)={0x11, 0xc, 0x0, 0x1, 0x2, 0x6, @random="4db86d6dfad2"}, 0x14) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 17:09:12 executing program 5: keyctl$KEYCTL_MOVE(0x1b, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:12 executing program 0: keyctl$KEYCTL_MOVE(0x1a, 0x0, 0x0, 0xfffffffffffffff9, 0x0) [ 1697.824589][T27192] FAULT_INJECTION: forcing a failure. [ 1697.824589][T27192] name failslab, interval 1, probability 0, space 0, times 0 [ 1697.837266][T27192] CPU: 0 PID: 27192 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1697.846022][T27192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1697.856070][T27192] Call Trace: [ 1697.859344][T27192] dump_stack_lvl+0xb7/0x103 [ 1697.864290][T27192] dump_stack+0x11/0x1a [ 1697.868495][T27192] should_fail+0x23c/0x250 17:09:13 executing program 1: add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r0 = add_key$keyring(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffffa, 0x0) [ 1697.872908][T27192] ? dup_mmap+0x38e/0x9c0 [ 1697.883321][T27192] __should_failslab+0x81/0x90 [ 1697.888132][T27192] should_failslab+0x5/0x20 [ 1697.892635][T27192] kmem_cache_alloc+0x46/0x2e0 [ 1697.897435][T27192] ? __vma_link_rb+0x3c2/0x3e0 [ 1697.902236][T27192] ? up_write+0x25/0xc0 [ 1697.906377][T27192] dup_mmap+0x38e/0x9c0 [ 1697.910528][T27192] dup_mm+0x7c/0x210 [ 1697.914410][T27192] copy_process+0x144f/0x2f70 [ 1697.919091][T27192] kernel_clone+0x14b/0x680 17:09:13 executing program 1: add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r0 = add_key$keyring(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffffa, 0x0) 17:09:13 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478200000002) [ 1697.923589][T27192] ? __fget_light+0x21b/0x260 [ 1697.928259][T27192] __do_sys_fork+0x3a/0x60 [ 1697.932680][T27192] do_syscall_64+0x3d/0x90 [ 1697.937101][T27192] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1697.943020][T27192] RIP: 0033:0x4665e9 [ 1697.946902][T27192] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1697.966591][T27192] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 17:09:13 executing program 5: keyctl$KEYCTL_MOVE(0x1b, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:13 executing program 0: keyctl$KEYCTL_MOVE(0x1d, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:13 executing program 1: add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r0 = add_key$keyring(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffffa, 0x0) [ 1697.975004][T27192] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1697.982970][T27192] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1697.990927][T27192] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1697.998892][T27192] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1698.006887][T27192] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:09:13 executing program 4 (fault-call:3 fault-nth:87): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:13 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = request_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='{\x00', r0) keyctl$KEYCTL_MOVE(0x1e, r0, r0, r1, 0xa573478220676a05) 17:09:13 executing program 3: ioctl$PTP_PEROUT_REQUEST(0xffffffffffffffff, 0x40383d03, &(0x7f0000000180)={{0x79f, 0x8001}, {0x6, 0xfffffff8}, 0x401}) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000000)={{0xff, 0x6}, 'port0\x00', 0x100, 0x100000, 0x710, 0x5, 0x7ff, 0x5, 0x0, 0x0, 0x0, 0x5}) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000000c0)=""/62) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r2, 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r3, 0x0, 0x0) fsmount(r3, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'gre0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00'/16, @ANYRES32=0x0, @ANYBLOB="000700200000000700000007496e00240064000020299078e00000010000000000897e4e482188db6dadf8f511112b4a7a2a077fffffffff44048f0394040100"]}) sendto$packet(r1, &(0x7f0000000100)="73eea5734a70dd50650e01cbb4a9116dbb3f91900e000f14b557725024fac05f7bedae330e76bf94237b2be3d25d46411d94e68ce2456853700c022bb9c1a1d54c4953ea746f5b162c3ff3522bfe57dcc9bc3c4533790f4279c5fc78eef9826c0c2366a2165fc797f8c0", 0x6a, 0x20004845, &(0x7f0000000240)={0x11, 0x4, r4, 0x1, 0x8, 0x6, @remote}, 0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000280)=0x8, 0x4) 17:09:13 executing program 5: keyctl$KEYCTL_MOVE(0x1b, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:13 executing program 0: keyctl$KEYCTL_MOVE(0x1d, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:13 executing program 1: r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r0, 0x0, 0xfffffffffffffffa, 0x0) [ 1698.134461][T27225] FAULT_INJECTION: forcing a failure. [ 1698.134461][T27225] name failslab, interval 1, probability 0, space 0, times 0 [ 1698.147381][T27225] CPU: 1 PID: 27225 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1698.156251][T27225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1698.166298][T27225] Call Trace: [ 1698.169572][T27225] dump_stack_lvl+0xb7/0x103 [ 1698.174161][T27225] dump_stack+0x11/0x1a [ 1698.178326][T27225] should_fail+0x23c/0x250 [ 1698.182748][T27225] ? dup_mmap+0x38e/0x9c0 [ 1698.187090][T27225] __should_failslab+0x81/0x90 [ 1698.191941][T27225] should_failslab+0x5/0x20 [ 1698.196440][T27225] kmem_cache_alloc+0x46/0x2e0 [ 1698.201269][T27225] ? __vma_link_rb+0x3c2/0x3e0 [ 1698.206032][T27225] ? up_write+0x25/0xc0 [ 1698.210179][T27225] dup_mmap+0x38e/0x9c0 [ 1698.214341][T27225] dup_mm+0x7c/0x210 [ 1698.218228][T27225] copy_process+0x144f/0x2f70 [ 1698.222969][T27225] kernel_clone+0x14b/0x680 [ 1698.227466][T27225] ? __fget_light+0x21b/0x260 17:09:13 executing program 0: keyctl$KEYCTL_MOVE(0x1d, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:13 executing program 5: keyctl$KEYCTL_MOVE(0x1c, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:13 executing program 0: keyctl$KEYCTL_MOVE(0x1d, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:13 executing program 1: keyctl$KEYCTL_MOVE(0x19, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) [ 1698.232133][T27225] __do_sys_fork+0x3a/0x60 [ 1698.236545][T27225] do_syscall_64+0x3d/0x90 [ 1698.240960][T27225] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1698.246857][T27225] RIP: 0033:0x4665e9 [ 1698.250800][T27225] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1698.270408][T27225] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 17:09:13 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wpan4\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_GET_SEC_KEY(r2, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x44, r3, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0xee08c2bbdc5d0c8b}]}, 0x44}, 0x1, 0x0, 0x0, 0x850}, 0x0) 17:09:13 executing program 5: keyctl$KEYCTL_MOVE(0x1c, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) [ 1698.279262][T27225] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1698.287244][T27225] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1698.295219][T27225] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1698.303485][T27225] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1698.311517][T27225] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:09:13 executing program 4 (fault-call:3 fault-nth:88): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:13 executing program 5: keyctl$KEYCTL_MOVE(0x1c, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:13 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r1, 0x0, 0x0) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000040)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={r2, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x24}}, 0x10) 17:09:13 executing program 1: keyctl$KEYCTL_MOVE(0x19, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:13 executing program 0: keyctl$KEYCTL_MOVE(0x18, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:13 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xee01, r0) keyctl$link(0x8, 0x0, r0) 17:09:13 executing program 1: keyctl$KEYCTL_MOVE(0x19, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) [ 1698.424257][T27255] FAULT_INJECTION: forcing a failure. [ 1698.424257][T27255] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1698.437556][T27255] CPU: 1 PID: 27255 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1698.446307][T27255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1698.456353][T27255] Call Trace: [ 1698.459621][T27255] dump_stack_lvl+0xb7/0x103 [ 1698.464212][T27255] dump_stack+0x11/0x1a [ 1698.468410][T27255] should_fail+0x23c/0x250 17:09:13 executing program 1: keyctl$KEYCTL_MOVE(0x19, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:13 executing program 5: keyctl$KEYCTL_MOVE(0x1c, 0x0, 0x0, 0xfffffffffffffff9, 0x0) [ 1698.472836][T27255] __alloc_pages+0x102/0x320 [ 1698.477418][T27255] alloc_pages+0x2e8/0x340 [ 1698.481824][T27255] pte_alloc_one+0x29/0xb0 [ 1698.486234][T27255] __pte_alloc+0x2f/0x210 [ 1698.490602][T27255] copy_pte_range+0x126e/0x1470 [ 1698.495454][T27255] copy_page_range+0x5da/0x8e0 [ 1698.500223][T27255] ? __vma_link_rb+0x3c2/0x3e0 [ 1698.504985][T27255] ? up_write+0x25/0xc0 [ 1698.509162][T27255] dup_mmap+0x6ab/0x9c0 [ 1698.513320][T27255] dup_mm+0x7c/0x210 [ 1698.517210][T27255] copy_process+0x144f/0x2f70 17:09:13 executing program 0: keyctl$KEYCTL_MOVE(0x18, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:13 executing program 5: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wpan4\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_GET_SEC_KEY(r2, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x44, r3, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0xee08c2bbdc5d0c8b}]}, 0x44}, 0x1, 0x0, 0x0, 0x850}, 0x0) [ 1698.521885][T27255] kernel_clone+0x14b/0x680 [ 1698.526386][T27255] ? __fget_light+0x21b/0x260 [ 1698.531066][T27255] __do_sys_fork+0x3a/0x60 [ 1698.535563][T27255] do_syscall_64+0x3d/0x90 [ 1698.540055][T27255] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1698.545940][T27255] RIP: 0033:0x4665e9 [ 1698.549824][T27255] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 17:09:13 executing program 0: keyctl$KEYCTL_MOVE(0x18, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) [ 1698.569438][T27255] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1698.577875][T27255] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1698.585843][T27255] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1698.593886][T27255] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1698.601853][T27255] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1698.609898][T27255] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:09:13 executing program 0: keyctl$KEYCTL_MOVE(0x18, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:13 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x2002, 0x0, 0x0) timerfd_create(0x8, 0x80800) 17:09:13 executing program 4 (fault-call:3 fault-nth:89): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:13 executing program 2: ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000001c0)={'erspan0\x00', &(0x7f0000000140)={'syztnl0\x00', 0x0, 0x7, 0x80, 0x20, 0xc2c0, {{0x17, 0x4, 0x3, 0x7, 0x5c, 0x68, 0x0, 0x7, 0x0, 0x0, @local, @broadcast, {[@ssrr={0x89, 0x7, 0x67, [@rand_addr=0x64010100]}, @timestamp_prespec={0x44, 0x3c, 0xdf, 0x3, 0x7, [{@local, 0x9}, {@dev={0xac, 0x14, 0x14, 0x13}, 0xa8fe}, {@multicast1, 0x10000}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x4}, {@multicast2, 0x6}, {@dev={0xac, 0x14, 0x14, 0x44}, 0x1}, {@remote, 0x81}]}, @generic={0x82, 0x5, "97b624"}]}}}}}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='\x00', r0) 17:09:13 executing program 1: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wpan4\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_GET_SEC_KEY(r2, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x44, r3, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0xee08c2bbdc5d0c8b}]}, 0x44}, 0x1, 0x0, 0x0, 0x850}, 0x0) 17:09:13 executing program 5: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wpan4\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_GET_SEC_KEY(r2, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x44, r3, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0xee08c2bbdc5d0c8b}]}, 0x44}, 0x1, 0x0, 0x0, 0x850}, 0x0) 17:09:13 executing program 5: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wpan4\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_GET_SEC_KEY(r2, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x44, r3, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0xee08c2bbdc5d0c8b}]}, 0x44}, 0x1, 0x0, 0x0, 0x850}, 0x0) 17:09:13 executing program 0: keyctl$KEYCTL_MOVE(0x14, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) [ 1698.724171][T27290] FAULT_INJECTION: forcing a failure. [ 1698.724171][T27290] name failslab, interval 1, probability 0, space 0, times 0 [ 1698.736816][T27290] CPU: 1 PID: 27290 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1698.745577][T27290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1698.755626][T27290] Call Trace: [ 1698.758907][T27290] dump_stack_lvl+0xb7/0x103 [ 1698.763557][T27290] dump_stack+0x11/0x1a [ 1698.767724][T27290] should_fail+0x23c/0x250 17:09:13 executing program 1: keyctl$KEYCTL_MOVE(0x11, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) [ 1698.772194][T27290] ? dup_mmap+0x38e/0x9c0 [ 1698.776533][T27290] __should_failslab+0x81/0x90 [ 1698.781369][T27290] should_failslab+0x5/0x20 [ 1698.785858][T27290] kmem_cache_alloc+0x46/0x2e0 [ 1698.790672][T27290] ? __vma_link_rb+0x3c2/0x3e0 [ 1698.795432][T27290] ? up_write+0x25/0xc0 [ 1698.799582][T27290] dup_mmap+0x38e/0x9c0 [ 1698.803732][T27290] dup_mm+0x7c/0x210 [ 1698.807696][T27290] copy_process+0x144f/0x2f70 [ 1698.812366][T27290] kernel_clone+0x14b/0x680 [ 1698.817115][T27290] ? __fget_light+0x21b/0x260 17:09:13 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x3, 0x0, @d}, 0x18, 0xfffffffffffffff9) keyctl$search(0xa, r0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000100)={'syz', 0x0}, 0xfffffffffffffffa) [ 1698.821779][T27290] __do_sys_fork+0x3a/0x60 [ 1698.826191][T27290] do_syscall_64+0x3d/0x90 [ 1698.830600][T27290] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1698.836526][T27290] RIP: 0033:0x4665e9 [ 1698.840411][T27290] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1698.860106][T27290] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 17:09:14 executing program 1: keyctl$KEYCTL_MOVE(0x11, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:14 executing program 0: keyctl$KEYCTL_MOVE(0x14, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) [ 1698.868532][T27290] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1698.876498][T27290] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1698.884464][T27290] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1698.892519][T27290] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1698.900489][T27290] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:09:14 executing program 4 (fault-call:3 fault-nth:90): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:14 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan3\x00', 0x0}) request_key(&(0x7f0000000240)='encrypted\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='*{@\x00', r0) add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, r1) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wpan4\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x74, 0x0, 0x20, 0x70bd25, 0x25dfdbfd, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x4}, @IEEE802154_ATTR_HW_ADDR={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r2}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x10000}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r3}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x9}]}, 0x74}, 0x1, 0x0, 0x0, 0x1}, 0x40) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900)=ANY=[@ANYBLOB], 0x8, r1) keyctl$KEYCTL_MOVE(0x1e, r0, 0x0, r1, 0x0) 17:09:14 executing program 5: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wpan4\x00'}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wpan3\x00'}) 17:09:14 executing program 3: recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x2000, 0x0, 0x0) 17:09:14 executing program 0: keyctl$KEYCTL_MOVE(0x14, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:14 executing program 1: keyctl$KEYCTL_MOVE(0x11, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:14 executing program 1: keyctl$KEYCTL_MOVE(0x11, 0x0, 0x0, 0xfffffffffffffff9, 0x0) [ 1699.033850][T27329] FAULT_INJECTION: forcing a failure. [ 1699.033850][T27329] name failslab, interval 1, probability 0, space 0, times 0 [ 1699.046514][T27329] CPU: 1 PID: 27329 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1699.055284][T27329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1699.065415][T27329] Call Trace: [ 1699.068717][T27329] dump_stack_lvl+0xb7/0x103 [ 1699.073359][T27329] dump_stack+0x11/0x1a [ 1699.077510][T27329] should_fail+0x23c/0x250 17:09:14 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x3f, 0x18, 0x7}]}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r1, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r2, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x3ff, 0x7, 0x3}, {0xfb, 0x1, 0x1, 0xffff2d5a}]}) r3 = fsmount(r1, 0x1, 0x4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000180)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x2c4443, 0x0) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r5, 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000240)=@gcm_256={{0x304}, "af8ffe319f57ef05", "757f2192e84367de9f76f58d661c1e934c54626cb4de451621139b6f29f23bec", "f1f1825d", "36afc7508b151e11"}, 0x38) fsmount(r4, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) setsockopt$packet_fanout_data(r4, 0x107, 0x16, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0x7, 0x3f, 0x8, 0xffffffff}, {0x5, 0x4, 0x8, 0x2}]}, 0x10) 17:09:14 executing program 0: keyctl$KEYCTL_MOVE(0x14, 0x0, 0x0, 0xfffffffffffffff9, 0x0) [ 1699.082001][T27329] ? dup_mmap+0x38e/0x9c0 [ 1699.086360][T27329] __should_failslab+0x81/0x90 [ 1699.091118][T27329] should_failslab+0x5/0x20 [ 1699.095619][T27329] kmem_cache_alloc+0x46/0x2e0 [ 1699.100386][T27329] ? __vma_link_rb+0x3c2/0x3e0 [ 1699.105167][T27329] ? up_write+0x25/0xc0 [ 1699.109358][T27329] dup_mmap+0x38e/0x9c0 [ 1699.113511][T27329] dup_mm+0x7c/0x210 [ 1699.117439][T27329] copy_process+0x144f/0x2f70 [ 1699.122185][T27329] kernel_clone+0x14b/0x680 [ 1699.126771][T27329] ? __fget_light+0x21b/0x260 [ 1699.131432][T27329] __do_sys_fork+0x3a/0x60 [ 1699.135857][T27329] do_syscall_64+0x3d/0x90 [ 1699.140261][T27329] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1699.146207][T27329] RIP: 0033:0x4665e9 [ 1699.150106][T27329] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1699.169698][T27329] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1699.178161][T27329] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1699.186129][T27329] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1699.194079][T27329] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1699.202119][T27329] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1699.210079][T27329] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:09:14 executing program 5: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wpan4\x00'}) [ 1699.222032][ T25] audit: type=1326 audit(1629652154.373:348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=27335 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x0 17:09:14 executing program 0: keyctl$KEYCTL_MOVE(0xf, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:14 executing program 1: keyctl$KEYCTL_MOVE(0xe, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:14 executing program 4 (fault-call:3 fault-nth:91): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:14 executing program 5: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), 0xffffffffffffffff) 17:09:14 executing program 0: keyctl$KEYCTL_MOVE(0xf, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:14 executing program 1: keyctl$KEYCTL_MOVE(0xe, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:14 executing program 5: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) [ 1699.352322][ T25] audit: type=1326 audit(1629652154.443:349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=27335 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x0 17:09:14 executing program 2: getrusage(0xffffffffffffffff, &(0x7f0000000600)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000280)={'wpan1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000002c0)={'wpan1\x00', 0x0}) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r5, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r6, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0x38}}, 0x10) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(r1, &(0x7f00000009c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000980)={&(0x7f0000000a00)={0x2b4, r6, 0x1, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_SEC_DEVKEY={0x1cc, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0xaaaaaaaaaaaa0202}}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0xaaaaaaaaaaaa0102}}, @NL802154_DEVKEY_ATTR_ID={0x9c, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x100000000}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x200}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x7}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x3}, @NL802154_KEY_ID_ATTR_IMPLICIT={0xc, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x1}]}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x6}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x50, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x1}, @NL802154_DEV_ADDR_ATTR_MODE={0x8}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xffff}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x1}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x3}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa1}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0x5555555555540204}}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x1}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x3}]}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x2}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_DEVKEY_ATTR_ID={0x54, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_IMPLICIT={0x1c, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x1}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x2}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x2}]}, @NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x1}, @NL802154_KEY_ID_ATTR_IMPLICIT={0xc, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa1}]}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x10000}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x3}, @NL802154_KEY_ID_ATTR_MODE={0x8}]}, @NL802154_DEVKEY_ATTR_ID={0x8c, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x7}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x6}, @NL802154_KEY_ID_ATTR_IMPLICIT={0xc, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x3}]}, @NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x5c, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_EXTENDED={0xc}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x3}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x2}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0102}}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xfffe}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x1}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0202}}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x2}]}]}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x7}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0xaaaaaaaaaaaa0202}}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0xaaaaaaaaaaaa0302}}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8}]}, @NL802154_ATTR_SEC_DEVKEY={0xb0, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0xaaaaaaaaaaaa0202}}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0xffff0cc5}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0xaaaaaaaaaaaa0202}}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x10000}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc}, @NL802154_DEVKEY_ATTR_ID={0x54, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0xb8}, @NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x100000000}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x18, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x1}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0002}}]}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x3}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x1}]}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0xaaaaaaaaaaaa0102}}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc}]}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x20000001}, 0x4000000) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x58, 0x0, 0x100, 0x70bd28, 0x25dfdbfd, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r3}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000011) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r2, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0x38}}, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000440)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f00000005c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0xd4, r2, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@NL802154_ATTR_SEC_LEVEL={0x24, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0xff}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x20}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x3f}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5}]}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_SEC_LEVEL={0x14, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x1}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x2}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r7}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_LEVEL={0x14, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_FRAME={0x8}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x2}]}, @NL802154_ATTR_SEC_LEVEL={0x14, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}]}, @NL802154_ATTR_SEC_LEVEL={0x44, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x1f}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x5}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x1}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x1}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x2}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x40}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x3f}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x80}, 0x1) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_KEY(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r2, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r8}]}, 0x34}, 0x1, 0x0, 0x0, 0x1014}, 0x4) 17:09:14 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) [ 1699.411973][T27358] FAULT_INJECTION: forcing a failure. [ 1699.411973][T27358] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1699.425207][T27358] CPU: 1 PID: 27358 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1699.433964][T27358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1699.444112][T27358] Call Trace: [ 1699.447389][T27358] dump_stack_lvl+0xb7/0x103 [ 1699.451974][T27358] dump_stack+0x11/0x1a [ 1699.456301][T27358] should_fail+0x23c/0x250 17:09:14 executing program 0: keyctl$KEYCTL_MOVE(0xf, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) [ 1699.460871][T27358] __alloc_pages+0x102/0x320 [ 1699.465458][T27358] alloc_pages+0x2e8/0x340 [ 1699.469876][T27358] pte_alloc_one+0x29/0xb0 [ 1699.474302][T27358] ? kcsan_setup_watchpoint+0x231/0x3e0 [ 1699.479890][T27358] __pte_alloc+0x2f/0x210 [ 1699.484256][T27358] copy_pte_range+0x126e/0x1470 [ 1699.489113][T27358] copy_page_range+0x5da/0x8e0 [ 1699.493980][T27358] ? __vma_link_rb+0x3c2/0x3e0 [ 1699.498810][T27358] ? up_write+0x25/0xc0 [ 1699.502955][T27358] dup_mmap+0x6ab/0x9c0 [ 1699.507115][T27358] dup_mm+0x7c/0x210 [ 1699.511049][T27358] copy_process+0x144f/0x2f70 [ 1699.515731][T27358] kernel_clone+0x14b/0x680 [ 1699.520239][T27358] ? __fget_light+0x21b/0x260 [ 1699.524941][T27358] __do_sys_fork+0x3a/0x60 [ 1699.529392][T27358] do_syscall_64+0x3d/0x90 [ 1699.533835][T27358] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1699.539730][T27358] RIP: 0033:0x4665e9 17:09:14 executing program 1: keyctl$KEYCTL_MOVE(0xe, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:14 executing program 5: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:14 executing program 0: keyctl$KEYCTL_MOVE(0xf, 0x0, 0x0, 0xfffffffffffffff9, 0x0) [ 1699.543634][T27358] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1699.563327][T27358] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1699.571812][T27358] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1699.579948][T27358] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1699.587916][T27358] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1699.596059][T27358] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1699.604025][T27358] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:09:14 executing program 1: keyctl$KEYCTL_MOVE(0xe, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:14 executing program 4 (fault-call:3 fault-nth:92): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:14 executing program 3: r0 = msgget(0x2, 0x104) r1 = msgget(0x2, 0x9) msgctl$IPC_INFO(r1, 0x3, &(0x7f0000000080)=""/40) msgctl$MSG_STAT_ANY(r0, 0xd, &(0x7f0000000000)=""/74) r2 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r2, 0x0, 0x0, 0x2000, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x3, 0x12, &(0x7f00000000c0)=""/178) 17:09:14 executing program 5: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) keyctl$link(0x8, r0, 0x0) 17:09:14 executing program 2: r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r2 = fsmount(r1, 0x0, 0xa) getsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000640), r0) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r2, &(0x7f00000007c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000780)={&(0x7f0000000680)={0xfc, r3, 0x800, 0x70bd2c, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x401}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xffffffff}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x26}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4010}, 0x21082cd285189a34) sendmsg$DEVLINK_CMD_TRAP_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0xc4, r3, 0x4, 0x70bd25, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, {0x1c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}]}, 0xc4}}, 0x80) 17:09:14 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) [ 1699.775092][T27401] FAULT_INJECTION: forcing a failure. [ 1699.775092][T27401] name failslab, interval 1, probability 0, space 0, times 0 [ 1699.787757][T27401] CPU: 0 PID: 27401 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1699.796515][T27401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1699.806571][T27401] Call Trace: [ 1699.809937][T27401] dump_stack_lvl+0xb7/0x103 [ 1699.814520][T27401] dump_stack+0x11/0x1a [ 1699.818747][T27401] should_fail+0x23c/0x250 17:09:14 executing program 5: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) keyctl$link(0x8, r0, 0x0) 17:09:14 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:14 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x640001, 0x0) r1 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r1, 0x100, 0xdd, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x24}}, 0x40090) fsmount(r0, 0x0, 0x0) recvfrom$packet(r0, 0x0, 0x59, 0x100, 0x0, 0x0) 17:09:15 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='\x00', 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$search(0xa, r0, &(0x7f00000000c0)='trusted\x00', &(0x7f0000000100)={'syz', 0x0}, 0xfffffffffffffff8) [ 1699.823227][T27401] ? dup_mmap+0x38e/0x9c0 [ 1699.827649][T27401] __should_failslab+0x81/0x90 [ 1699.832509][T27401] should_failslab+0x5/0x20 [ 1699.837007][T27401] kmem_cache_alloc+0x46/0x2e0 [ 1699.841808][T27401] ? __vma_link_rb+0x3c2/0x3e0 [ 1699.846581][T27401] ? up_write+0x25/0xc0 [ 1699.850769][T27401] dup_mmap+0x38e/0x9c0 [ 1699.854955][T27401] dup_mm+0x7c/0x210 [ 1699.858853][T27401] copy_process+0x144f/0x2f70 [ 1699.863565][T27401] kernel_clone+0x14b/0x680 [ 1699.868083][T27401] ? __fget_light+0x21b/0x260 17:09:15 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) [ 1699.872787][T27401] __do_sys_fork+0x3a/0x60 [ 1699.877200][T27401] do_syscall_64+0x3d/0x90 [ 1699.881609][T27401] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1699.887524][T27401] RIP: 0033:0x4665e9 [ 1699.891554][T27401] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1699.911597][T27401] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 17:09:15 executing program 5: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) keyctl$link(0x8, r0, 0x0) 17:09:15 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) [ 1699.920003][T27401] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1699.927964][T27401] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1699.935977][T27401] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1699.943965][T27401] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1699.952075][T27401] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:09:15 executing program 4 (fault-call:3 fault-nth:93): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:15 executing program 3: keyctl$KEYCTL_MOVE(0x2, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:15 executing program 5: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:15 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r1) r3 = request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000240)='+sgT\xb4\x17+\x18.\x93\xf8\xbd\xe7\x04\xdc\xda\xae(\x05\xf7\xc531', r2) keyctl$search(0xa, r0, &(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x3}, r3) 17:09:15 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:15 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:15 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:15 executing program 3: keyctl$KEYCTL_MOVE(0x2, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:15 executing program 5: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) [ 1700.091222][T27441] FAULT_INJECTION: forcing a failure. [ 1700.091222][T27441] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1700.104520][T27441] CPU: 0 PID: 27441 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1700.113463][T27441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1700.123533][T27441] Call Trace: [ 1700.126805][T27441] dump_stack_lvl+0xb7/0x103 [ 1700.131397][T27441] dump_stack+0x11/0x1a [ 1700.135548][T27441] should_fail+0x23c/0x250 17:09:15 executing program 5: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 17:09:15 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) [ 1700.140030][T27441] __alloc_pages+0x102/0x320 [ 1700.144650][T27441] alloc_pages+0x2e8/0x340 [ 1700.149069][T27441] pte_alloc_one+0x29/0xb0 [ 1700.153479][T27441] __pte_alloc+0x2f/0x210 [ 1700.157868][T27441] copy_pte_range+0x126e/0x1470 [ 1700.162802][T27441] copy_page_range+0x5da/0x8e0 [ 1700.167612][T27441] ? __vma_link_rb+0x3c2/0x3e0 [ 1700.172371][T27441] ? up_write+0x25/0xc0 [ 1700.176518][T27441] dup_mmap+0x6ab/0x9c0 [ 1700.180671][T27441] dup_mm+0x7c/0x210 [ 1700.184557][T27441] copy_process+0x144f/0x2f70 17:09:15 executing program 3: keyctl$KEYCTL_MOVE(0x2, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) [ 1700.189237][T27441] kernel_clone+0x14b/0x680 [ 1700.193864][T27441] ? __fget_light+0x21b/0x260 [ 1700.198535][T27441] __do_sys_fork+0x3a/0x60 [ 1700.202963][T27441] do_syscall_64+0x3d/0x90 [ 1700.207382][T27441] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1700.213270][T27441] RIP: 0033:0x4665e9 [ 1700.217458][T27441] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 17:09:15 executing program 4 (fault-call:3 fault-nth:94): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:15 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) keyctl$unlink(0x9, r1, r2) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) keyctl$unlink(0x9, r0, r3) 17:09:15 executing program 3: keyctl$KEYCTL_MOVE(0x2, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:15 executing program 1 (fault-call:0 fault-nth:0): keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:15 executing program 0 (fault-call:0 fault-nth:0): keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:15 executing program 5: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) [ 1700.237057][T27441] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1700.245471][T27441] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1700.253481][T27441] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1700.261488][T27441] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1700.269543][T27441] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1700.277516][T27441] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 [ 1700.354034][T27468] FAULT_INJECTION: forcing a failure. [ 1700.354034][T27468] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1700.355136][T27471] FAULT_INJECTION: forcing a failure. [ 1700.355136][T27471] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1700.367119][T27468] CPU: 1 PID: 27468 Comm: syz-executor.1 Not tainted 5.14.0-rc6-syzkaller #0 [ 1700.388896][T27468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1700.398978][T27468] Call Trace: [ 1700.402261][T27468] dump_stack_lvl+0xb7/0x103 [ 1700.406913][T27468] dump_stack+0x11/0x1a [ 1700.411054][T27468] should_fail+0x23c/0x250 [ 1700.415525][T27468] should_fail_usercopy+0x16/0x20 [ 1700.420533][T27468] _copy_to_user+0x1c/0x90 [ 1700.424951][T27468] simple_read_from_buffer+0xab/0x120 [ 1700.430308][T27468] proc_fail_nth_read+0xf6/0x140 [ 1700.435352][T27468] ? rw_verify_area+0x136/0x250 [ 1700.440187][T27468] ? proc_fault_inject_write+0x200/0x200 [ 1700.445817][T27468] vfs_read+0x154/0x5d0 [ 1700.450046][T27468] ? __fget_light+0x21b/0x260 [ 1700.454704][T27468] ? __cond_resched+0x11/0x40 [ 1700.459362][T27468] ksys_read+0xce/0x180 [ 1700.463500][T27468] __x64_sys_read+0x3e/0x50 [ 1700.468089][T27468] do_syscall_64+0x3d/0x90 [ 1700.472521][T27468] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1700.478415][T27468] RIP: 0033:0x41936c [ 1700.482379][T27468] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1700.502191][T27468] RSP: 002b:00007ff7fc4c1170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1700.510687][T27468] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041936c [ 1700.518643][T27468] RDX: 000000000000000f RSI: 00007ff7fc4c11e0 RDI: 0000000000000003 [ 1700.526598][T27468] RBP: 00007ff7fc4c11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1700.534554][T27468] R10: fffffffffffffff9 R11: 0000000000000246 R12: 0000000000000001 [ 1700.542509][T27468] R13: 00007ffc49df4eff R14: 00007ff7fc4c1300 R15: 0000000000022000 [ 1700.550469][T27471] CPU: 0 PID: 27471 Comm: syz-executor.0 Not tainted 5.14.0-rc6-syzkaller #0 [ 1700.558751][T27473] FAULT_INJECTION: forcing a failure. [ 1700.558751][T27473] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1700.559233][T27471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1700.559245][T27471] Call Trace: [ 1700.559253][T27471] dump_stack_lvl+0xb7/0x103 [ 1700.590285][T27471] dump_stack+0x11/0x1a [ 1700.594430][T27471] should_fail+0x23c/0x250 [ 1700.598835][T27471] should_fail_usercopy+0x16/0x20 [ 1700.603854][T27471] _copy_to_user+0x1c/0x90 [ 1700.608253][T27471] simple_read_from_buffer+0xab/0x120 [ 1700.613608][T27471] proc_fail_nth_read+0xf6/0x140 [ 1700.618533][T27471] ? rw_verify_area+0x136/0x250 [ 1700.623369][T27471] ? proc_fault_inject_write+0x200/0x200 [ 1700.628993][T27471] vfs_read+0x154/0x5d0 [ 1700.633194][T27471] ? __fget_light+0x21b/0x260 [ 1700.637892][T27471] ? __cond_resched+0x11/0x40 [ 1700.642552][T27471] ksys_read+0xce/0x180 [ 1700.646735][T27471] __x64_sys_read+0x3e/0x50 [ 1700.651235][T27471] do_syscall_64+0x3d/0x90 [ 1700.655638][T27471] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1700.661541][T27471] RIP: 0033:0x41936c [ 1700.665418][T27471] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1700.685009][T27471] RSP: 002b:00007f49c00ef170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1700.693406][T27471] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041936c [ 1700.701385][T27471] RDX: 000000000000000f RSI: 00007f49c00ef1e0 RDI: 0000000000000003 [ 1700.709338][T27471] RBP: 00007f49c00ef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1700.717293][T27471] R10: fffffffffffffff9 R11: 0000000000000246 R12: 0000000000000001 [ 1700.725259][T27471] R13: 00007ffea1da509f R14: 00007f49c00ef300 R15: 0000000000022000 [ 1700.733218][T27473] CPU: 1 PID: 27473 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1700.741986][T27473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1700.752099][T27473] Call Trace: [ 1700.755372][T27473] dump_stack_lvl+0xb7/0x103 [ 1700.759978][T27473] dump_stack+0x11/0x1a [ 1700.764131][T27473] should_fail+0x23c/0x250 [ 1700.768583][T27473] __alloc_pages+0x102/0x320 [ 1700.773220][T27473] alloc_pages+0x2e8/0x340 [ 1700.777632][T27473] pte_alloc_one+0x29/0xb0 [ 1700.782045][T27473] ? kcsan_setup_watchpoint+0x231/0x3e0 [ 1700.787656][T27473] __pte_alloc+0x2f/0x210 [ 1700.791990][T27473] copy_pte_range+0x126e/0x1470 [ 1700.796828][T27473] copy_page_range+0x5da/0x8e0 [ 1700.801597][T27473] ? __vma_link_rb+0x3c2/0x3e0 [ 1700.806358][T27473] ? up_write+0x25/0xc0 [ 1700.810572][T27473] dup_mmap+0x6ab/0x9c0 [ 1700.814813][T27473] dup_mm+0x7c/0x210 [ 1700.818831][T27473] copy_process+0x144f/0x2f70 [ 1700.823510][T27473] kernel_clone+0x14b/0x680 [ 1700.828014][T27473] ? __fget_light+0x21b/0x260 [ 1700.832691][T27473] __do_sys_fork+0x3a/0x60 [ 1700.837105][T27473] do_syscall_64+0x3d/0x90 [ 1700.841607][T27473] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1700.847508][T27473] RIP: 0033:0x4665e9 [ 1700.851388][T27473] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1700.871203][T27473] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1700.879645][T27473] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1700.887982][T27473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1700.896054][T27473] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 17:09:15 executing program 2: sendmsg$NL802154_CMD_SET_SEC_PARAMS(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@NL802154_ATTR_SEC_ENABLED={0x5}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}, @NL802154_ATTR_SEC_FRAME_COUNTER={0x8, 0x21, 0x1}, @NL802154_ATTR_SEC_FRAME_COUNTER={0x8, 0x21, 0xce8}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000004}, 0x4044890) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) keyctl$reject(0x13, 0x0, 0x2, 0x0, 0xfffffffffffffffb) 17:09:15 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:15 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x2, 0x0, @a}, 0x48, 0xfffffffffffffff8) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$search(0xa, r0, &(0x7f0000000100)='syzkaller\x00', &(0x7f0000000140)={'syz', 0x0}, r1) 17:09:16 executing program 1: keyctl$KEYCTL_MOVE(0x2, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:16 executing program 2: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x1) 17:09:16 executing program 1: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) [ 1700.904016][T27473] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1700.911987][T27473] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:09:16 executing program 4 (fault-call:3 fault-nth:95): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:16 executing program 3: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) keyctl$unlink(0x9, r1, r2) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) keyctl$unlink(0x9, r0, r3) 17:09:16 executing program 1: keyctl$KEYCTL_MOVE(0x4, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:16 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:16 executing program 2: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm, @timestamp, @timestamp, @timestamp], 0x4) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:16 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:16 executing program 1: keyctl$KEYCTL_MOVE(0x5, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:16 executing program 3: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) keyctl$unlink(0x9, r1, r2) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) keyctl$unlink(0x9, r0, r3) [ 1701.036458][T27505] FAULT_INJECTION: forcing a failure. [ 1701.036458][T27505] name failslab, interval 1, probability 0, space 0, times 0 [ 1701.049224][T27505] CPU: 0 PID: 27505 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1701.057981][T27505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1701.068030][T27505] Call Trace: [ 1701.071318][T27505] dump_stack_lvl+0xb7/0x103 [ 1701.075901][T27505] dump_stack+0x11/0x1a [ 1701.080053][T27505] should_fail+0x23c/0x250 17:09:16 executing program 1: keyctl$KEYCTL_MOVE(0x6, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:16 executing program 3: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) keyctl$unlink(0x9, r1, r2) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) keyctl$unlink(0x9, r0, r3) 17:09:16 executing program 0: keyctl$KEYCTL_MOVE(0x2, 0x0, 0x0, 0xfffffffffffffff9, 0x0) [ 1701.084464][T27505] ? dup_mmap+0x38e/0x9c0 [ 1701.088798][T27505] __should_failslab+0x81/0x90 [ 1701.093558][T27505] should_failslab+0x5/0x20 [ 1701.098065][T27505] kmem_cache_alloc+0x46/0x2e0 [ 1701.102863][T27505] ? __vma_link_rb+0x3c2/0x3e0 [ 1701.107660][T27505] ? up_write+0x25/0xc0 [ 1701.111817][T27505] dup_mmap+0x38e/0x9c0 [ 1701.115965][T27505] dup_mm+0x7c/0x210 [ 1701.119857][T27505] copy_process+0x144f/0x2f70 [ 1701.124580][T27505] kernel_clone+0x14b/0x680 [ 1701.129075][T27505] ? __fget_light+0x21b/0x260 17:09:16 executing program 5: r0 = add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) [ 1701.133746][T27505] __do_sys_fork+0x3a/0x60 [ 1701.138220][T27505] do_syscall_64+0x3d/0x90 [ 1701.142636][T27505] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1701.148616][T27505] RIP: 0033:0x4665e9 [ 1701.152498][T27505] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1701.172268][T27505] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 17:09:16 executing program 4 (fault-call:3 fault-nth:96): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:16 executing program 3: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) keyctl$unlink(0x9, r1, r2) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) 17:09:16 executing program 1: keyctl$KEYCTL_MOVE(0x7, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:16 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='-{%+$,&\'\x00', r0) 17:09:16 executing program 0: keyctl$KEYCTL_MOVE(0x4, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:16 executing program 5: r0 = add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) [ 1701.180678][T27505] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1701.188639][T27505] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1701.196606][T27505] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1701.204591][T27505] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1701.212598][T27505] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 [ 1701.309633][T27531] FAULT_INJECTION: forcing a failure. [ 1701.309633][T27531] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1701.322951][T27531] CPU: 1 PID: 27531 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1701.331704][T27531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1701.341848][T27531] Call Trace: [ 1701.345141][T27531] dump_stack_lvl+0xb7/0x103 [ 1701.349724][T27531] dump_stack+0x11/0x1a [ 1701.353953][T27531] should_fail+0x23c/0x250 [ 1701.358372][T27531] __alloc_pages+0x102/0x320 [ 1701.362987][T27531] alloc_pages+0x2e8/0x340 [ 1701.367400][T27531] pte_alloc_one+0x29/0xb0 [ 1701.371887][T27531] __pte_alloc+0x2f/0x210 [ 1701.376213][T27531] copy_pte_range+0x126e/0x1470 [ 1701.381067][T27531] copy_page_range+0x5da/0x8e0 [ 1701.385867][T27531] ? __vma_link_rb+0x3c2/0x3e0 [ 1701.390716][T27531] ? up_write+0x25/0xc0 [ 1701.394961][T27531] dup_mmap+0x6ab/0x9c0 [ 1701.399114][T27531] dup_mm+0x7c/0x210 [ 1701.403031][T27531] copy_process+0x144f/0x2f70 [ 1701.407777][T27531] kernel_clone+0x14b/0x680 [ 1701.412270][T27531] ? __fget_light+0x21b/0x260 [ 1701.417025][T27531] __do_sys_fork+0x3a/0x60 [ 1701.421436][T27531] do_syscall_64+0x3d/0x90 [ 1701.425890][T27531] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1701.431828][T27531] RIP: 0033:0x4665e9 [ 1701.435709][T27531] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 17:09:16 executing program 0: keyctl$KEYCTL_MOVE(0x5, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:16 executing program 3: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) keyctl$unlink(0x9, r1, r2) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 17:09:16 executing program 0: keyctl$KEYCTL_MOVE(0x6, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:16 executing program 3: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) keyctl$unlink(0x9, r1, r2) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) 17:09:16 executing program 0: keyctl$KEYCTL_MOVE(0x7, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:16 executing program 3: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) keyctl$unlink(0x9, r0, r1) [ 1701.455422][T27531] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1701.463924][T27531] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1701.471959][T27531] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1701.479920][T27531] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1701.487886][T27531] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1701.495847][T27531] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:09:16 executing program 4 (fault-call:3 fault-nth:97): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:16 executing program 0: keyctl$KEYCTL_MOVE(0x8, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:16 executing program 3: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) 17:09:16 executing program 1: keyctl$KEYCTL_MOVE(0x8, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:16 executing program 5: r0 = add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:16 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x0, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'wg1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x804}, 0x4800) [ 1701.583482][T27558] FAULT_INJECTION: forcing a failure. [ 1701.583482][T27558] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1701.596781][T27558] CPU: 1 PID: 27558 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1701.605543][T27558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1701.615594][T27558] Call Trace: [ 1701.618867][T27558] dump_stack_lvl+0xb7/0x103 [ 1701.623456][T27558] dump_stack+0x11/0x1a [ 1701.627606][T27558] should_fail+0x23c/0x250 [ 1701.632150][T27558] __alloc_pages+0x102/0x320 [ 1701.636826][T27558] alloc_pages+0x2e8/0x340 [ 1701.641278][T27558] pte_alloc_one+0x29/0xb0 [ 1701.645794][T27558] ? kcsan_setup_watchpoint+0x231/0x3e0 [ 1701.651859][T27558] __pte_alloc+0x2f/0x210 [ 1701.656188][T27558] copy_pte_range+0x126e/0x1470 [ 1701.661087][T27558] copy_page_range+0x5da/0x8e0 [ 1701.665849][T27558] ? __vma_link_rb+0x3c2/0x3e0 [ 1701.670637][T27558] ? up_write+0x25/0xc0 [ 1701.674784][T27558] dup_mmap+0x6ab/0x9c0 [ 1701.679012][T27558] dup_mm+0x7c/0x210 [ 1701.682898][T27558] copy_process+0x144f/0x2f70 [ 1701.687605][T27558] kernel_clone+0x14b/0x680 [ 1701.692103][T27558] ? __fget_light+0x21b/0x260 [ 1701.696812][T27558] __do_sys_fork+0x3a/0x60 [ 1701.701271][T27558] do_syscall_64+0x3d/0x90 [ 1701.705684][T27558] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1701.711576][T27558] RIP: 0033:0x4665e9 17:09:16 executing program 0: keyctl$KEYCTL_MOVE(0x9, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:16 executing program 3: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) keyctl$unlink(0x9, r0, 0x0) 17:09:16 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:16 executing program 1: keyctl$KEYCTL_MOVE(0x9, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:16 executing program 3: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) keyctl$unlink(0x9, r0, 0x0) 17:09:16 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) [ 1701.715455][T27558] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1701.735059][T27558] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1701.743552][T27558] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1701.751521][T27558] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1701.759487][T27558] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1701.767495][T27558] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1701.775457][T27558] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:09:16 executing program 4 (fault-call:3 fault-nth:98): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:16 executing program 3: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) keyctl$unlink(0x9, r0, 0x0) 17:09:16 executing program 2: sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c170000ab1bbc8deb97556bb846306032919a5c28e245da1a2cba2f0c37d4d2671a47d754fbfab48bea4614c81949fac60181ef89f5bc73095c1ef11b131d03a192602e96c043508a91ed2d64c2ccc7dba8ec1fdc4534b3da85ed61898f60f436db38bdb730e5fe357ea8d2b41121b2441d20d09627458f0ca4416a32f3cecdca25d228815a15a06523d222000000000000003f142cee4c3e3cdbc29a2301d9d6a69a2b0e6c184130bec6e3eed111891082d68f7aed7721d3", @ANYRES16=0x0, @ANYRESHEX, @ANYRESHEX=0x0, @ANYBLOB="060006000100000008000200", @ANYRES32=0x0, @ANYBLOB="0600060003000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40026) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:16 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:16 executing program 1: keyctl$KEYCTL_MOVE(0xa, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:16 executing program 0: keyctl$KEYCTL_MOVE(0xa, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:17 executing program 1: keyctl$KEYCTL_MOVE(0xc, 0x0, 0x0, 0xfffffffffffffff9, 0x0) [ 1701.890970][T27585] FAULT_INJECTION: forcing a failure. [ 1701.890970][T27585] name failslab, interval 1, probability 0, space 0, times 0 [ 1701.903642][T27585] CPU: 1 PID: 27585 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1701.912420][T27585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1701.922509][T27585] Call Trace: [ 1701.925785][T27585] dump_stack_lvl+0xb7/0x103 [ 1701.930375][T27585] dump_stack+0x11/0x1a [ 1701.934525][T27585] should_fail+0x23c/0x250 [ 1701.938938][T27585] ? dup_mmap+0x38e/0x9c0 [ 1701.943327][T27585] __should_failslab+0x81/0x90 [ 1701.948095][T27585] should_failslab+0x5/0x20 [ 1701.952593][T27585] kmem_cache_alloc+0x46/0x2e0 [ 1701.957531][T27585] ? __vma_link_rb+0x3c2/0x3e0 [ 1701.962305][T27585] ? up_write+0x25/0xc0 [ 1701.966453][T27585] dup_mmap+0x38e/0x9c0 [ 1701.970637][T27585] dup_mm+0x7c/0x210 [ 1701.974525][T27585] copy_process+0x144f/0x2f70 [ 1701.979208][T27585] kernel_clone+0x14b/0x680 [ 1701.983698][T27585] ? __fget_light+0x21b/0x260 [ 1701.988372][T27585] __do_sys_fork+0x3a/0x60 [ 1701.992809][T27585] do_syscall_64+0x3d/0x90 [ 1701.997254][T27585] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1702.003148][T27585] RIP: 0033:0x4665e9 [ 1702.007032][T27585] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1702.026629][T27585] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 17:09:17 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:17 executing program 0: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:17 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:17 executing program 0: keyctl$KEYCTL_MOVE(0xc, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:17 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:17 executing program 4 (fault-call:3 fault-nth:99): r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:17 executing program 0: keyctl$KEYCTL_MOVE(0xd, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:17 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:17 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:17 executing program 3: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) 17:09:17 executing program 1: keyctl$KEYCTL_MOVE(0xd, 0x0, 0x0, 0xfffffffffffffff9, 0x0) [ 1702.035101][T27585] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1702.043066][T27585] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1702.051118][T27585] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1702.059091][T27585] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1702.067054][T27585] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:09:17 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) clock_getres(0x2, &(0x7f0000000000)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, 0x0, 0x0) clock_getres(0x7, &(0x7f0000000100)) sendmsg$NL802154_CMD_GET_SEC_KEY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}]}, 0x20}, 0x1, 0x0, 0x0, 0x94}, 0x20040010) [ 1702.161788][T27610] FAULT_INJECTION: forcing a failure. [ 1702.161788][T27610] name failslab, interval 1, probability 0, space 0, times 0 [ 1702.175210][T27610] CPU: 1 PID: 27610 Comm: syz-executor.4 Not tainted 5.14.0-rc6-syzkaller #0 [ 1702.184053][T27610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1702.194188][T27610] Call Trace: [ 1702.197462][T27610] dump_stack_lvl+0xb7/0x103 [ 1702.202051][T27610] dump_stack+0x11/0x1a [ 1702.206200][T27610] should_fail+0x23c/0x250 [ 1702.210614][T27610] ? dup_mmap+0x38e/0x9c0 [ 1702.215007][T27610] __should_failslab+0x81/0x90 [ 1702.219820][T27610] should_failslab+0x5/0x20 [ 1702.224315][T27610] kmem_cache_alloc+0x46/0x2e0 [ 1702.229078][T27610] ? __vma_link_rb+0x3c2/0x3e0 [ 1702.233832][T27610] ? up_write+0x25/0xc0 [ 1702.238086][T27610] dup_mmap+0x38e/0x9c0 [ 1702.242301][T27610] dup_mm+0x7c/0x210 [ 1702.246194][T27610] copy_process+0x144f/0x2f70 [ 1702.250944][T27610] kernel_clone+0x14b/0x680 [ 1702.255526][T27610] ? __fget_light+0x21b/0x260 [ 1702.260237][T27610] __do_sys_fork+0x3a/0x60 [ 1702.264686][T27610] do_syscall_64+0x3d/0x90 [ 1702.269097][T27610] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1702.275047][T27610] RIP: 0033:0x4665e9 [ 1702.278933][T27610] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1702.298622][T27610] RSP: 002b:00007fbe2a7f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 17:09:17 executing program 0: keyctl$KEYCTL_MOVE(0xe, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:17 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:17 executing program 0: keyctl$KEYCTL_MOVE(0xf, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:17 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:17 executing program 1: keyctl$KEYCTL_MOVE(0xe, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:17 executing program 1: keyctl$KEYCTL_MOVE(0xf, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:17 executing program 5: add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 17:09:17 executing program 0: keyctl$KEYCTL_MOVE(0x10, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:17 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:17 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r2, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0x38}}, 0x10) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, r2, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@NL802154_ATTR_SEC_LEVEL={0x24, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x8}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}, @NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x8}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x40018a0}, 0xc0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:17 executing program 3: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, 0x0, r0) [ 1702.307046][T27610] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1702.315012][T27610] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1702.322993][T27610] RBP: 00007fbe2a7f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1702.330955][T27610] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1702.339100][T27610] R13: 00007ffe09d5845f R14: 00007fbe2a7f3300 R15: 0000000000022000 17:09:17 executing program 0: keyctl$KEYCTL_MOVE(0x11, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:17 executing program 1: keyctl$KEYCTL_MOVE(0x10, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:17 executing program 3: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, 0x0, r0) 17:09:17 executing program 5: add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 17:09:17 executing program 4: r0 = semget$private(0x0, 0x2, 0x9) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) msgctl$IPC_STAT(0xffffffffffffffff, 0x2, &(0x7f0000000040)=""/177) fork() 17:09:17 executing program 0: keyctl$KEYCTL_MOVE(0x12, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:17 executing program 1: keyctl$KEYCTL_MOVE(0x11, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:17 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) keyctl$KEYCTL_MOVE(0x1e, r0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) keyctl$negate(0xd, r1, 0x2, r2) 17:09:17 executing program 3: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, 0x0, r0) 17:09:17 executing program 5: add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 17:09:17 executing program 0: keyctl$KEYCTL_MOVE(0x13, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:17 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETNCNT(r1, 0x1, 0xe, &(0x7f0000000040)=""/159) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:17 executing program 1: keyctl$KEYCTL_MOVE(0x12, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:17 executing program 3: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) 17:09:17 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, 0x0) 17:09:17 executing program 0: keyctl$KEYCTL_MOVE(0x14, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:17 executing program 2: r0 = request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='@\x00', 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) keyctl$KEYCTL_MOVE(0x1e, r0, 0x0, r1, 0xa573478220676a05) 17:09:17 executing program 1: keyctl$KEYCTL_MOVE(0x13, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:17 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) 17:09:17 executing program 4: semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000), 0x0) r0 = semget(0x0, 0x1, 0x1a) semget(0x0, 0x1, 0x46) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) semctl$IPC_INFO(r0, 0x1, 0x3, &(0x7f0000000040)=""/63) fork() 17:09:17 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, 0x0) 17:09:17 executing program 0: keyctl$KEYCTL_MOVE(0x15, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:17 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) 17:09:17 executing program 1: keyctl$KEYCTL_MOVE(0x14, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:17 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) keyctl$KEYCTL_MOVE(0x1e, r0, 0x0, r1, 0xa573478220676a05) keyctl$clear(0x7, 0xfffffffffffffffe) 17:09:17 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) semtimedop(r0, &(0x7f0000000040)=[{0x2, 0xff, 0x3000}, {0x3, 0x2, 0x1000}, {0x4, 0x1}, {0x3, 0x40}, {0x3, 0x8, 0x1800}, {0x1, 0x8e9}, {0x2, 0x200, 0x1000}, {0x1, 0x1, 0x800}, {0x0, 0x800, 0x1000}], 0x9, &(0x7f0000000080)={0x77359400}) fork() semctl$IPC_INFO(r0, 0x2, 0x3, &(0x7f00000001c0)=""/137) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r1, 0x0, 0x0) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r1, &(0x7f0000000180)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, 0x0, 0x400, 0x70bd28, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}]}, 0x20}, 0x1, 0x0, 0x0, 0x24000010}, 0x4000000) 17:09:18 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) 17:09:18 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, 0x0) 17:09:18 executing program 1: keyctl$KEYCTL_MOVE(0x15, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:18 executing program 0: keyctl$KEYCTL_MOVE(0x18, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:18 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) 17:09:18 executing program 2: r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r2 = fsmount(r1, 0x0, 0xa) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000640), r0) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r2, &(0x7f00000007c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000780)={&(0x7f0000000680)={0xfc, r3, 0x800, 0x70bd2c, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x401}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xffffffff}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x26}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4010}, 0x21082cd285189a34) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000200)=""/136, &(0x7f00000002c0)=0x88) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0xfc, r3, 0x400, 0x70bd26, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x5}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0xffff0001}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x20}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x6}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xff}}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4000010}, 0x2000c940) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:18 executing program 5: r0 = request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='@\x00', 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) keyctl$KEYCTL_MOVE(0x1e, r0, 0x0, r1, 0xa573478220676a05) 17:09:18 executing program 1: keyctl$KEYCTL_MOVE(0x18, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:18 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) r1 = semget$private(0x0, 0x1, 0x8) semctl$SEM_STAT_ANY(r1, 0x4, 0x14, &(0x7f0000000040)=""/120) fork() semctl$GETZCNT(r1, 0x1, 0xf, &(0x7f0000001100)=""/18) r2 = semget(0x0, 0x1, 0x1a) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000100)=""/4096) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SETALL(r2, 0x0, 0x11, &(0x7f00000000c0)=[0x7]) 17:09:18 executing program 0: keyctl$KEYCTL_MOVE(0x19, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:18 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) 17:09:18 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x402001, 0x0) ioctl$PTP_PEROUT_REQUEST(r0, 0x40383d03, &(0x7f0000000040)={{0xffffffff, 0x1ff}, {0x7fff, 0x5}, 0x7f, 0x1}) 17:09:18 executing program 1: keyctl$KEYCTL_MOVE(0x19, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:18 executing program 5 (fault-call:2 fault-nth:0): r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:18 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000ff000000e909e2952883187fbe8bfe"], 0x8, r0) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r1, r2, r3, 0x0) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) keyctl$KEYCTL_MOVE(0x1e, r0, 0x0, r4, 0xa573478220676a05) 17:09:18 executing program 0: keyctl$KEYCTL_MOVE(0x1a, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:18 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) fork() semtimedop(r0, &(0x7f0000000040)=[{0x0, 0x7, 0x800}, {0x2, 0x4, 0x800}, {0x3, 0x1, 0x1800}, {}], 0x4, &(0x7f0000000080)={0x77359400}) semctl$IPC_RMID(r0, 0x0, 0x0) 17:09:18 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) 17:09:18 executing program 1: keyctl$KEYCTL_MOVE(0x1a, 0x0, 0x0, 0xfffffffffffffff9, 0x0) [ 1703.107410][T27761] FAULT_INJECTION: forcing a failure. [ 1703.107410][T27761] name failslab, interval 1, probability 0, space 0, times 0 [ 1703.120128][T27761] CPU: 0 PID: 27761 Comm: syz-executor.5 Not tainted 5.14.0-rc6-syzkaller #0 [ 1703.128889][T27761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1703.138995][T27761] Call Trace: [ 1703.142264][T27761] dump_stack_lvl+0xb7/0x103 [ 1703.146846][T27761] dump_stack+0x11/0x1a [ 1703.151000][T27761] should_fail+0x23c/0x250 17:09:18 executing program 0: keyctl$KEYCTL_MOVE(0x1b, 0x0, 0x0, 0xfffffffffffffff9, 0x0) [ 1703.155458][T27761] __should_failslab+0x81/0x90 [ 1703.160223][T27761] ? assoc_array_insert+0x70/0x1730 [ 1703.165451][T27761] should_failslab+0x5/0x20 [ 1703.170049][T27761] kmem_cache_alloc_trace+0x49/0x310 [ 1703.175432][T27761] assoc_array_insert+0x70/0x1730 [ 1703.180614][T27761] ? __down_write_common+0x42/0x810 [ 1703.185807][T27761] ? security_key_permission+0x7e/0x90 [ 1703.191335][T27761] __key_link_begin+0x96/0x140 [ 1703.196099][T27761] key_link+0xb7/0x3e0 [ 1703.200208][T27761] ? kstrtouint_from_user+0x104/0x130 17:09:18 executing program 1: keyctl$KEYCTL_MOVE(0x1b, 0x0, 0x0, 0xfffffffffffffff9, 0x0) [ 1703.205641][T27761] ? search_process_keyrings_rcu+0x190/0x190 [ 1703.211620][T27761] ? keyring_search_rcu+0x180/0x180 [ 1703.216873][T27761] __se_sys_keyctl+0x747/0x9a0 [ 1703.221683][T27761] ? vfs_write+0x50c/0x770 [ 1703.226120][T27761] ? __fget_light+0x21b/0x260 [ 1703.230787][T27761] ? __cond_resched+0x11/0x40 [ 1703.235451][T27761] ? fput+0x2d/0x130 [ 1703.239341][T27761] ? ksys_write+0x157/0x180 [ 1703.243879][T27761] ? fpregs_assert_state_consistent+0x7d/0x90 [ 1703.249940][T27761] __x64_sys_keyctl+0x63/0x70 [ 1703.254618][T27761] do_syscall_64+0x3d/0x90 [ 1703.259113][T27761] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1703.265007][T27761] RIP: 0033:0x4665e9 [ 1703.268956][T27761] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1703.288635][T27761] RSP: 002b:00007f9321c9b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 1703.297121][T27761] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 17:09:18 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) semctl$GETZCNT(r0, 0x4, 0xf, &(0x7f0000000040)=""/97) 17:09:18 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) 17:09:18 executing program 1: keyctl$KEYCTL_MOVE(0x1c, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:18 executing program 0: keyctl$KEYCTL_MOVE(0x1c, 0x0, 0x0, 0xfffffffffffffff9, 0x0) [ 1703.305116][T27761] RDX: 0000000001baa155 RSI: 000000001b4dd2aa RDI: 0000000000000008 [ 1703.313096][T27761] RBP: 00007f9321c9b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1703.321059][T27761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1703.329100][T27761] R13: 00007fffe2e7aa5f R14: 00007f9321c9b300 R15: 0000000000022000 17:09:18 executing program 5 (fault-call:2 fault-nth:1): r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:18 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffa, 0x0, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)='fscrypt-provisioning\x00', r0) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)={0x4, 0x0, @d}, 0x18, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)=ANY=[@ANYBLOB="78c8c555a39e3256"], 0x8, r2) keyctl$negate(0xd, r0, 0x2, 0xfffffffffffffffe) [ 1703.434975][T27802] FAULT_INJECTION: forcing a failure. [ 1703.434975][T27802] name failslab, interval 1, probability 0, space 0, times 0 [ 1703.447608][T27802] CPU: 0 PID: 27802 Comm: syz-executor.5 Not tainted 5.14.0-rc6-syzkaller #0 [ 1703.456364][T27802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1703.466416][T27802] Call Trace: [ 1703.469685][T27802] dump_stack_lvl+0xb7/0x103 [ 1703.474280][T27802] dump_stack+0x11/0x1a [ 1703.478434][T27802] should_fail+0x23c/0x250 [ 1703.482854][T27802] __should_failslab+0x81/0x90 [ 1703.487672][T27802] ? assoc_array_insert+0x2d2/0x1730 [ 1703.492957][T27802] should_failslab+0x5/0x20 [ 1703.497453][T27802] kmem_cache_alloc_trace+0x49/0x310 [ 1703.502827][T27802] assoc_array_insert+0x2d2/0x1730 [ 1703.507935][T27802] ? __down_write_common+0x42/0x810 [ 1703.513255][T27802] ? security_key_permission+0x7e/0x90 [ 1703.518715][T27802] __key_link_begin+0x96/0x140 [ 1703.523473][T27802] key_link+0xb7/0x3e0 [ 1703.527534][T27802] ? kstrtouint_from_user+0x104/0x130 [ 1703.532905][T27802] ? search_process_keyrings_rcu+0x190/0x190 [ 1703.538900][T27802] ? keyring_search_rcu+0x180/0x180 [ 1703.544090][T27802] __se_sys_keyctl+0x747/0x9a0 [ 1703.548912][T27802] ? vfs_write+0x50c/0x770 [ 1703.553317][T27802] ? __fget_light+0x21b/0x260 [ 1703.557985][T27802] ? __cond_resched+0x11/0x40 [ 1703.562652][T27802] ? fput+0x2d/0x130 [ 1703.566614][T27802] ? ksys_write+0x157/0x180 [ 1703.571110][T27802] ? fpregs_assert_state_consistent+0x7d/0x90 [ 1703.577236][T27802] __x64_sys_keyctl+0x63/0x70 17:09:18 executing program 0: keyctl$KEYCTL_MOVE(0x1d, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:18 executing program 1: keyctl$KEYCTL_MOVE(0x1d, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:18 executing program 0: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:18 executing program 1: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:18 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x1000000) 17:09:18 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x1000000) 17:09:18 executing program 4: r0 = semget$private(0x0, 0x3, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_STAT_ANY(r1, 0x1, 0x14, &(0x7f0000000040)=""/2) timer_create(0x7, &(0x7f0000000300)={0x0, 0x8, 0x2, @thr={&(0x7f0000000200)="533141a1d48a01255e42f72f3abca8f9ae859060a32b3d447c270113bf3de2471912b8ce6183f9b2807c4026f696d48a1badd919eaf597a5be961784c7fea82e339d2d7fbf3306b18b9c2d0a6fc006943262d2393f77", &(0x7f0000000280)="6b9eee8631d105f99fff0254afe75708f947a6a32d696c8a0982a17a7be9c65c4d7645f7fc5909cf44f0a98ebb698cd93618ffad562becd90c1652890b421e4b40d7a05fcb295e75bf5092c6745fe3db334881fb17a0107061e6c518cc431b9a5442e1f3349b3bdb4fe94647a6bcaee55ed6f86113f3855251"}}, &(0x7f0000000340)) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000100)=""/208) 17:09:18 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) 17:09:18 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0xf8ffffff) 17:09:18 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0xf8ffffff) [ 1703.581907][T27802] do_syscall_64+0x3d/0x90 [ 1703.586401][T27802] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1703.592295][T27802] RIP: 0033:0x4665e9 [ 1703.596177][T27802] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1703.615767][T27802] RSP: 002b:00007f9321c9b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 1703.624249][T27802] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 1703.632226][T27802] RDX: 000000002c613040 RSI: 000000001524b696 RDI: 0000000000000008 [ 1703.640214][T27802] RBP: 00007f9321c9b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1703.648180][T27802] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1703.656144][T27802] R13: 00007fffe2e7aa5f R14: 00007f9321c9b300 R15: 0000000000022000 17:09:18 executing program 5 (fault-call:2 fault-nth:2): r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:18 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0xf9ffffff) 17:09:18 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) 17:09:18 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x8, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r0) r3 = request_key(&(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='%)\x00', r2) keyctl$search(0xa, r1, &(0x7f0000000080)='asymmetric\x00', &(0x7f00000000c0)={'syz', 0x2}, r3) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) keyctl$KEYCTL_MOVE(0x1e, r0, 0x0, r4, 0xa573478220676a05) 17:09:18 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() semctl$GETZCNT(r0, 0x1, 0xf, &(0x7f0000000040)=""/30) 17:09:18 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0xf9ffffff) 17:09:18 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) 17:09:18 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0xfaffffff) [ 1703.788181][T27846] FAULT_INJECTION: forcing a failure. [ 1703.788181][T27846] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1703.801283][T27846] CPU: 0 PID: 27846 Comm: syz-executor.5 Not tainted 5.14.0-rc6-syzkaller #0 [ 1703.810149][T27846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1703.820274][T27846] Call Trace: [ 1703.823543][T27846] dump_stack_lvl+0xb7/0x103 [ 1703.828136][T27846] dump_stack+0x11/0x1a [ 1703.832292][T27846] should_fail+0x23c/0x250 17:09:19 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) 17:09:19 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0xfbffffff) [ 1703.836785][T27846] should_fail_usercopy+0x16/0x20 [ 1703.841820][T27846] _copy_to_user+0x1c/0x90 [ 1703.846240][T27846] simple_read_from_buffer+0xab/0x120 [ 1703.851603][T27846] proc_fail_nth_read+0xf6/0x140 [ 1703.856558][T27846] ? rw_verify_area+0x136/0x250 [ 1703.861406][T27846] ? proc_fault_inject_write+0x200/0x200 [ 1703.867078][T27846] vfs_read+0x154/0x5d0 [ 1703.871231][T27846] ? __fget_light+0x21b/0x260 [ 1703.876014][T27846] ? __cond_resched+0x11/0x40 [ 1703.880691][T27846] ksys_read+0xce/0x180 17:09:19 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0xfcffffff) [ 1703.884892][T27846] __x64_sys_read+0x3e/0x50 [ 1703.889398][T27846] do_syscall_64+0x3d/0x90 [ 1703.893808][T27846] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1703.899711][T27846] RIP: 0033:0x41936c [ 1703.903667][T27846] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1703.923267][T27846] RSP: 002b:00007f9321c9b170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 17:09:19 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) keyctl$clear(0x7, 0xfffffffffffffffa) 17:09:19 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:19 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0xfaffffff) 17:09:19 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semctl$IPC_INFO(r0, 0x2, 0x3, &(0x7f0000000240)=""/259) semctl$SEM_STAT(r0, 0x1, 0x12, &(0x7f0000000140)=""/205) semop(0x0, &(0x7f0000000000)=[{}], 0x1) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) semtimedop(r0, &(0x7f0000000040)=[{0x3, 0x4000, 0x800}, {0x4, 0x8, 0x1000}, {0x0, 0x7ff, 0x1000}, {0x0, 0x3972}, {0x3, 0x6, 0x800}], 0x5, &(0x7f00000000c0)={r1, r2+10000000}) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:19 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) [ 1703.931675][T27846] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041936c [ 1703.939638][T27846] RDX: 000000000000000f RSI: 00007f9321c9b1e0 RDI: 0000000000000003 [ 1703.947605][T27846] RBP: 00007f9321c9b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1703.955575][T27846] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1703.963537][T27846] R13: 00007fffe2e7aa5f R14: 00007f9321c9b300 R15: 0000000000022000 17:09:19 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) semctl$IPC_RMID(0xffffffffffffffff, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x3, 0xff, 0xfffffffffffffff9) r0 = semget(0x2, 0x7, 0x101) semctl$SEM_INFO(r0, 0x0, 0x13, &(0x7f0000000000)=""/24) 17:09:19 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0xfbffffff) 17:09:19 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) r1 = semget(0x1, 0x0, 0x21) semctl$IPC_RMID(r1, 0x0, 0x0) semctl$IPC_RMID(r1, 0x0, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) semctl$IPC_STAT(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000040)=""/69) fork() 17:09:19 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0xfcffffff) 17:09:19 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0xfdffffff) 17:09:19 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) 17:09:19 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x2, r0, r1) 17:09:19 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) keyctl$unlink(0x9, r1, r0) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000000)=ANY=[@ANYBLOB="0400005a090000b34842a60000"], 0x8, r0) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) r3 = request_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='@\x8b[(\x00', r2) keyctl$KEYCTL_MOVE(0x1e, r3, 0x0, r0, 0xbfdc3c0c1c2454d0) setfsuid(0xee00) 17:09:19 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0xfeffffff) 17:09:19 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0xfdffffff) 17:09:19 executing program 4: r0 = semget$private(0x0, 0x0, 0x23b) semctl$GETNCNT(r0, 0x3, 0xe, &(0x7f0000000040)=""/154) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000200)) r1 = fork() r2 = semget$private(0x0, 0x0, 0x280) r3 = socket(0x3, 0x1, 0x20) r4 = syz_open_procfs$namespace(r1, &(0x7f0000000240)='ns/uts\x00') r5 = fork() waitid(0x2, r5, &(0x7f00000001c0), 0x8, 0x0) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r6, 0x0, 0x0) r7 = fork() waitid(0x2, r7, &(0x7f00000001c0), 0x8, 0x0) sendmsg$DEVLINK_CMD_RELOAD(r3, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000400)={&(0x7f0000000280)={0x168, 0x0, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r1}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r4}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r5}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r6}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x2}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r7}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x1}}]}, 0x168}, 0x1, 0x0, 0x0, 0x4}, 0x40) semctl$GETZCNT(r2, 0x1, 0xf, &(0x7f0000000100)=""/253) 17:09:19 executing program 3: add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, 0x0, r0) 17:09:19 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x3, r0, r1) 17:09:19 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f0000000000)={'syz', 0x2}, &(0x7f0000000040)={0x1, 0x0, @a}, 0x48, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'erspan0\x00', &(0x7f00000000c0)={'ip_vti0\x00', 0x0, 0x10, 0x80, 0xfffff001, 0x100, {{0x13, 0x4, 0x3, 0x7, 0x4c, 0x67, 0x0, 0x20, 0x6bd0f35414327a85, 0x0, @private=0xa010102, @private=0xa010101, {[@ssrr={0x89, 0x1b, 0xe7, [@broadcast, @rand_addr=0x64010102, @local, @loopback, @remote, @remote]}, @rr={0x7, 0x1b, 0xdc, [@local, @empty, @rand_addr=0x64010101, @multicast1, @empty, @dev={0xac, 0x14, 0x14, 0x2f}]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'ip_vti0\x00', &(0x7f0000000180)={'syztnl1\x00', r3, 0x1, 0x8000, 0xccc0, 0x5, {{0x11, 0x4, 0x0, 0x26, 0x44, 0x64, 0x0, 0x8, 0x2f, 0x0, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@rr={0x7, 0x1b, 0x84, [@multicast2, @multicast1, @local, @local, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @timestamp={0x44, 0x14, 0x98, 0x0, 0x6, [0x3, 0x7, 0x7f, 0xfffffffc]}]}}}}}) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) keyctl$KEYCTL_MOVE(0x1e, r0, r2, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:19 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0xfffffff8) 17:09:19 executing program 3: add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, 0x0, r0) 17:09:19 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0xfeffffff) 17:09:19 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0xfffffff9) 17:09:19 executing program 3: add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, 0x0, r0) 17:09:19 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)={0x1, 0x0, @a}, 0x48, r0) 17:09:19 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x4, r0, r1) 17:09:19 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0xfffffff8) 17:09:19 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) r1 = semget$private(0x0, 0x1, 0x205) semctl$GETNCNT(r1, 0x3, 0xe, &(0x7f0000000040)=""/95) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:19 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0xfffffffa) 17:09:19 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) keyctl$unlink(0x9, 0x0, 0xffffffffffffffff) r0 = request_key(&(0x7f0000000080)='logon\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='(-,\x00', 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r0) 17:09:19 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0xfffffff9) 17:09:19 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, 0x0) 17:09:19 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0xfffffffb) 17:09:19 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0xfffffffa) 17:09:19 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x5, r0, r1) 17:09:19 executing program 2: ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000040)={0x0, @tipc=@nameseq={0x1e, 0x1, 0x1, {0x41, 0x3, 0x4}}, @nl=@kern={0x10, 0x0, 0x0, 0x20000248}, @qipcrtr={0x2a, 0xffffffffffffffff, 0x7fff}, 0x4, 0x0, 0x0, 0x0, 0x652, &(0x7f0000000000)='batadv_slave_1\x00', 0x1000, 0x5}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:19 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semget(0x2, 0x3, 0x101) r1 = semget(0x0, 0x4, 0x429) semop(r1, &(0x7f0000000040), 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:19 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0xfffffffc) 17:09:19 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, 0x0) 17:09:19 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x6, r0, r1) 17:09:19 executing program 2: sendmsg$DEVLINK_CMD_TRAP_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x98, 0x0, 0x20, 0x70bd27, 0x25dfdbff, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x98}, 0x1, 0x0, 0x0, 0x2004c040}, 0x20008000) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_SETPARAMS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xc1180}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x2, 0x70bd27, 0x25dfdbfb, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}]}, 0x1c}}, 0x8) 17:09:19 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0xfffffffb) 17:09:19 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0xfffffffd) 17:09:19 executing program 2: request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='{\xe5\x00', 0xfffffffffffffffa) 17:09:19 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, 0x0) 17:09:19 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x7, r0, r1) 17:09:19 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$IPC_INFO(r1, 0x2, 0x3, &(0x7f00000000c0)=""/112) r2 = semget$private(0x0, 0x3, 0x140) semctl$SEM_INFO(r2, 0x0, 0x13, &(0x7f0000000140)=""/36) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) timer_create(0x3, &(0x7f0000000040)={0x0, 0x1c, 0x4, @tid=0xffffffffffffffff}, &(0x7f0000000080)) fork() 17:09:19 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0xfffffffe) 17:09:19 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0xfffffffc) 17:09:19 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x6, r0, r1) 17:09:19 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x3, 0x0, @b}, 0x48, 0xfffffffffffffffe) 17:09:19 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0xfffffffd) 17:09:19 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x100000000000000) 17:09:19 executing program 4: r0 = semget$private(0x0, 0x0, 0x2) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SEM_INFO(r0, 0x4, 0x13, &(0x7f0000000200)=""/184) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() r1 = semget$private(0x0, 0x1, 0x704) semctl$SETVAL(r1, 0x1, 0x10, &(0x7f0000000040)=0x5) semctl$SEM_STAT_ANY(r1, 0x4, 0x14, &(0x7f00000000c0)=""/86) semctl$SETVAL(0x0, 0x1, 0x10, &(0x7f0000000080)=0xa2d) r2 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_STAT(r2, 0x2, 0x12, &(0x7f0000000140)=""/191) 17:09:19 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x9, r0, r1) 17:09:19 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x6, r0, r1) 17:09:19 executing program 2: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x60c43) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000040)={0x201, 0x5, 0x1, {0x9, 0x4}, 0xfffffffb, 0x4}) semget$private(0x0, 0x1, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:20 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0xfffffffe) 17:09:20 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0xf8ffffff00000000) 17:09:20 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0xa, r0, r1) 17:09:20 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x6, r0, r1) 17:09:20 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r1, 0x0, 0x0) r2 = add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x2}, &(0x7f0000000240)=ANY=[@ANYRESOCT=r1, @ANYRES16, @ANYBLOB="871c2875d2e57dcad13bf827791a6d584c0500000000000000d341cd18f92968dd25da5764a5c9d011472bab9ef14e7c58611f697b09c310a9512689745c"], 0x8, r0) r3 = request_key(&(0x7f0000000100)='blacklist\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)='keyring\x00', r0) keyctl$search(0xa, r2, &(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x3}, r3) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) r6 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, r4) keyctl$search(0xa, r5, &(0x7f00000002c0)='blacklist\x00', &(0x7f0000000300)={'syz', 0x3}, r6) keyctl$reject(0x13, r0, 0xffffffff7fffffff, 0x89, r4) 17:09:20 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x100000000000000) 17:09:20 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$GETVAL(r0, 0x3, 0xc, &(0x7f0000000040)=""/246) semctl$SEM_STAT(r0, 0x3, 0x12, &(0x7f0000000140)=""/145) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETNCNT(r1, 0x4, 0xe, &(0x7f0000000200)) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) semtimedop(r1, &(0x7f0000000200)=[{0x3, 0x100, 0x2000}, {0x1, 0x200, 0x1000}, {0x0, 0x1, 0x1800}, {0x0, 0xfff9, 0x1000}, {0x3, 0x5, 0x1000}, {0x0, 0x8, 0x1800}], 0x6, &(0x7f0000000280)={r2, r3+10000000}) r4 = semget(0x3, 0x2, 0x8) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) semtimedop(r4, &(0x7f0000000300)=[{0x1, 0x4, 0x1000}, {0x0, 0x7f, 0x800}], 0x2, &(0x7f0000000380)={r5, r6+60000000}) fork() semctl$SETVAL(r1, 0x2, 0x10, &(0x7f00000002c0)=0xffff) 17:09:20 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0xb, r0, r1) 17:09:20 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0xf9ffffff00000000) 17:09:20 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x6, r0, 0x0) 17:09:20 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0xf8ffffff00000000) 17:09:20 executing program 2: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x64, 0x0, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r0}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x4a2739eea8e63133}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_SHORT_ADDR={0x6}]}, 0x64}, 0x1, 0x0, 0x0, 0x200080c1}, 0x20000000) r3 = socket(0x21, 0x1, 0x80) sendmsg$SMC_PNETID_FLUSH(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="000000000000e8d9c42150c43d8075b24c6f65d0ca", @ANYRES16=0x0, @ANYBLOB="080028bd7000fbdbdf25040000000900010073797a30000000000900010073797a30000000000900010073797a31000000000900010073797a32000000000900030073797a32000000000900030073797a32000000000500040001000000"], 0x64}, 0x1, 0x0, 0x0, 0x4081}, 0x0) 17:09:20 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0xc, r0, r1) 17:09:20 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0xfaffffff00000000) 17:09:20 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r1, 0x0, 0x0) r2 = fsmount(0xffffffffffffffff, 0x0, 0x4) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r4 = fsmount(r3, 0x0, 0xa) semctl$SETVAL(r0, 0x4, 0x10, &(0x7f0000000240)=0x7ff) r5 = openat$cgroup_procs(r4, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) r6 = getpid() write$cgroup_pid(r5, &(0x7f0000000200)=r6, 0x12) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000640), r2) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r4, &(0x7f00000007c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000780)={&(0x7f0000000680)=ANY=[@ANYBLOB="fc000000", @ANYRES16=r7, @ANYBLOB="00082cbd7000ffdbdf251b000000080001007063690011000200303030303a30303a31302e300000000008000b00030000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b00000000000e0001006e657464657673696d0000000f0002000008000b00010400000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b00ffffffff080001007063690011000200303030303a30303a31302e300000000008000b00260000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b000700"/246], 0xfc}, 0x1, 0x0, 0x0, 0x4010}, 0x21082cd285189a34) sendmsg$DEVLINK_CMD_RELOAD(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x84, r7, 0x10, 0x70bd29, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x2}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}]}, 0x84}}, 0x40841) 17:09:20 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0xf9ffffff00000000) 17:09:20 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = request_key(&(0x7f0000000000)='.dead\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='a*\\\\\x00', 0xfffffffffffffff9) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$search(0xa, r0, &(0x7f00000000c0)='rxrpc\x00', &(0x7f0000000100)={'syz', 0x3}, r1) select(0x40, &(0x7f00000001c0)={0xffffffffffffffff, 0x7, 0x7, 0x0, 0x2000000000002, 0x7, 0x6, 0xf9}, &(0x7f0000000200)={0x7, 0x9, 0x3ff, 0x2e9c, 0x200, 0x3, 0x40, 0xca}, &(0x7f00000002c0)={0x7, 0x8, 0x101, 0x2, 0x60, 0x8, 0xfffffffffffffff9, 0x8}, &(0x7f0000000280)={0x0, 0xea60}) 17:09:20 executing program 3: keyctl$link(0x6, 0x0, 0x0) 17:09:20 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000180)=ANY=[@ANYBLOB="03000000000000006161616161616161616161616161616161616161616161616161616161616161313131e131313131313131313131313131313131313131313131313131313131c43a6ef3a3fbf8218a0d02f42ee52a2dc328b529abbb2c090b88789846b3a987306e1d6a69de9f47e84f6b36b4dd33"], 0x48, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, r0, 0xa573478220676a05) 17:09:20 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0xd, r0, r1) 17:09:20 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0xfaffffff00000000) 17:09:20 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{0x2, 0x0, 0x800}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000040)=@req={0x28, &(0x7f0000000000)={'bridge0\x00', @ifru_map}}) fork() 17:09:20 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0xfbffffff00000000) 17:09:20 executing program 3: keyctl$link(0x6, 0x0, 0x0) 17:09:20 executing program 2: r0 = getpgid(0xffffffffffffffff) wait4(r0, &(0x7f0000000000), 0x2, &(0x7f0000000040)) 17:09:20 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0xfbffffff00000000) 17:09:20 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0xe, r0, r1) 17:09:20 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0xfcffffff00000000) 17:09:20 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, 0x0, r2, r1, 0x1) 17:09:20 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() msgctl$MSG_INFO(0xffffffffffffffff, 0xc, &(0x7f0000000040)=""/164) 17:09:20 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0xfcffffff00000000) 17:09:20 executing program 3: keyctl$link(0x6, 0x0, 0x0) 17:09:20 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0xf, r0, r1) 17:09:20 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0xfdffffff00000000) 17:09:20 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0xfdffffff00000000) 17:09:20 executing program 2: r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)=ANY=[@ANYBLOB="e6ff00000000000061626364656667686d6a6b6c6d6e6f707172737475767778797a30313238343536"], 0x29, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)='+\x00', 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900)=ANY=[@ANYBLOB], 0x8, r1) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f00000008c0)={'syz', 0x2}, &(0x7f0000000100), 0x8, r2) keyctl$KEYCTL_MOVE(0x1e, r0, 0x0, r2, 0xa573478220676a05) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) keyctl$search(0xa, r3, &(0x7f0000000200)='.dead\x00', &(0x7f0000000240)={'syz', 0x1}, r4) keyctl$link(0x8, 0x0, 0xfffffffffffffffe) keyctl$negate(0xd, 0x0, 0x2, 0xfffffffffffffffd) 17:09:20 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$GETZCNT(r0, 0x2, 0xf, &(0x7f0000000040)=""/154) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:20 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x10, r0, r1) 17:09:20 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0xfeffffff00000000) 17:09:20 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x6, r0, 0x0) 17:09:20 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, 0x0, 0x0) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004000}, 0x1) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000040)={0x0, @hci={0x1f, 0x2}, @nfc={0x27, 0x0, 0x0, 0x2}, @llc={0x1a, 0x18, 0x2c, 0x89, 0x3f, 0x0, @random="3d26aeb9ac25"}, 0x1274, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)='geneve0\x00', 0xffffffffffffffff, 0x4, 0xff}) r1 = socket$packet(0x11, 0x0, 0x300) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) keyctl$clear(0x7, 0xfffffffffffffff9) getpeername$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000200)=0x14) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{0x9, 0x2, 0x1f}]}, 0x10) 17:09:20 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0xfeffffff00000000) 17:09:20 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x11, r0, r1) 17:09:20 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x6, r0, 0x0) 17:09:20 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r2 = fsmount(r1, 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST(r2, 0x40383d03, &(0x7f0000000080)={{0x400, 0x1}, {0x3084, 0x3}, 0x8}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:20 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0xffffffff00000000) 17:09:20 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0xffffffff00000000) 17:09:20 executing program 2: r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)={0x0, 0x0, @a}, 0x48, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)=']\'\x00', 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) r3 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r1) add_key$fscrypt_provisioning(&(0x7f0000000340), &(0x7f0000000200)={'syz', 0x0}, &(0x7f00000002c0)={0x1, 0x0, @c}, 0x29, r3) r4 = add_key$keyring(&(0x7f0000000380), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r3) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, r4) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r0, r1, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:20 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x6, r0, 0x0) 17:09:20 executing program 1: setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f0000000100)=0xe93b, 0x4) keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) keyctl$search(0xa, r1, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x1}, r0) 17:09:20 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x12, r0, r1) 17:09:20 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semctl$SEM_STAT(r0, 0x2, 0x12, &(0x7f0000000040)=""/88) semop(0x0, &(0x7f0000000000)=[{}], 0x1) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_STAT(r1, 0x4, 0x12, &(0x7f0000000180)=""/121) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() semget$private(0x0, 0x2, 0x4) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) semtimedop(r1, &(0x7f00000000c0)=[{0x4, 0x1, 0x800}, {0x3, 0x8000, 0x1000}, {0x4, 0x1, 0xab867538678deeab}, {0x4, 0x4, 0x1000}, {0x4, 0xfff, 0x1000}, {0x1, 0x3, 0x800}, {0x4, 0x89, 0x1800}, {0x4, 0xfe00, 0x1000}, {0x1, 0x1000, 0x1800}, {0x4, 0x9, 0x1000}], 0xa, &(0x7f0000000140)={r2, r3+60000000}) 17:09:20 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) keyctl$negate(0xd, 0x0, 0x9, r0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='{*@^&\x00', 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)={0x1, 0x0, @c}, 0x29, 0xfffffffffffffffd) 17:09:20 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x13, r0, r1) 17:09:20 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = request_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='\x00', 0xfffffffffffffffb) keyctl$get_persistent(0x16, 0xffffffffffffffff, r0) 17:09:20 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x6, r0, 0x0) 17:09:20 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0xffffffffffffffff, 0xfffffffffffffff9, 0x0) 17:09:20 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f00000001c0)=0x4, 0x4) keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffc) r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) 17:09:20 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x14, r0, r1) 17:09:21 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{0x0, 0x0, 0x800}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) msgsnd(0x0, &(0x7f0000000040)={0x2, "ca94cf4d66861bc6356355a8ccd0ac48f670a06c767d82155892ddac68c4b6b603bc342a68211eb2e56908d3e57d9d2642f18b33fc9a9acb3d7b2c1c67d3f9fac0678a1e593ace7d6b87ba99dbe992dd6cc5919c55097e6d76e4747cbbccd806d8cfad3d202b6323c48f8dd396e658bc5408f6faaadd8f4780c8691bc47c67b4c7a1c6ff816400155b87aa749353c6c77508c36d60a3a7bfd741d0359bd3385f5157f83e5205224be7c5ad7a5fec"}, 0xb6, 0x800) fork() 17:09:21 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x6, r0, 0x0) 17:09:21 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = request_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='\xdb[\\]\x00', 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) keyctl$negate(0xd, r0, 0xf1, r1) r2 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$search(0xa, r2, &(0x7f00000002c0)='.request_key_auth\x00', &(0x7f0000000300)={'syz', 0x1}, 0xfffffffffffffffc) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) keyctl$search(0xa, r3, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, r4) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r5) 17:09:21 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$clear(0x7, r0) 17:09:21 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) keyctl$unlink(0x9, r0, 0xfffffffffffffffb) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x24a600}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0xfc, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_SEC_DEVKEY={0x80, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0xaaaaaaaaaaaa0302}}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x8}, @NL802154_DEVKEY_ATTR_ID={0x28, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x100}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0xae}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x3}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x3}]}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0xaaaaaaaaaaaa0302}}, @NL802154_DEVKEY_ATTR_ID={0x34, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0xcd2f}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x9e19}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x4}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0xffff}]}]}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_DEVKEY={0x10, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0xaaaaaaaaaaaa0302}}]}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}]}, 0xfc}, 0x1, 0x0, 0x0, 0x10040006}, 0x4000) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) add_key$fscrypt_provisioning(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)={0x3, 0x0, @a}, 0x48, r2) 17:09:21 executing program 4: r0 = semget$private(0x0, 0x4, 0x10) semop(0x0, &(0x7f0000000000)=[{}], 0x1) r1 = semget$private(0x0, 0x0, 0x80) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000040)=""/75) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() semctl$GETVAL(r0, 0x1, 0xc, &(0x7f0000000140)=""/172) r2 = semget$private(0x0, 0x4, 0x40) semctl$GETVAL(r2, 0x2, 0xc, &(0x7f00000000c0)=""/84) 17:09:21 executing program 0: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$KEYCTL_MOVE(0x3, r0, r0, r2, 0x1) 17:09:21 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x15, r0, r1) 17:09:21 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x6, r0, 0x0) 17:09:21 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = request_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='+\x00', 0xfffffffffffffffb) keyctl$link(0x8, r0, 0xfffffffffffffff8) 17:09:21 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r2, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) getsockopt$inet_udp_int(r1, 0x11, 0x66, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:09:21 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r0, &(0x7f0000000080)='cifs.spnego\x00', &(0x7f00000000c0)={'syz', 0x0}, 0xffffffffffffffff) 17:09:21 executing program 3: add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x6, 0x0, 0x0) 17:09:21 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x18, r0, r1) 17:09:21 executing program 4: r0 = semget$private(0x0, 0x4, 0x4c4) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:21 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) keyctl$negate(0xd, 0x0, 0x4, r0) 17:09:21 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000100)={0x6, 0xffffff01, 0x5, {0x7f, 0x1}, 0x649f, 0x3}) keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)={0x1, 0x0, @b}, 0x48, r1) 17:09:21 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) keyctl$KEYCTL_MOVE(0x1e, r1, r0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:21 executing program 3: add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x6, 0x0, 0x0) 17:09:21 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x19, r0, r1) 17:09:21 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) r1 = semget$private(0x0, 0x1, 0x40) semctl$GETALL(r1, 0x0, 0xd, &(0x7f0000000040)=""/199) fork() 17:09:21 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00;'], 0x8, r1) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='syz', r3) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) r5 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r4) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r5) keyctl$KEYCTL_MOVE(0xb, r0, 0x0, r5, 0x1) 17:09:21 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffffd, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) keyctl$reject(0x13, r3, 0x8001, 0x80000001, r4) keyctl$KEYCTL_MOVE(0x1e, r0, r1, r2, 0x0) 17:09:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000000c0)={'tunl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x40, 0x700, 0x2, 0x0, {{0x20, 0x4, 0x0, 0x4, 0x80, 0x65, 0x0, 0x5, 0x29, 0x0, @rand_addr=0x64010101, @multicast1, {[@ra={0x94, 0x4, 0x1}, @ra={0x94, 0x4}, @timestamp={0x44, 0x18, 0x3d, 0x0, 0xf, [0x6, 0x8, 0x200, 0x8, 0xe05]}, @generic={0x86, 0x8, "def453758152"}, @ssrr={0x89, 0x27, 0x1, [@loopback, @private=0xa010100, @empty, @private=0xa010101, @loopback, @dev={0xac, 0x14, 0x14, 0x2b}, @multicast2, @loopback, @rand_addr=0x64010101]}, @lsrr={0x83, 0xf, 0xab, [@local, @dev={0xac, 0x14, 0x14, 0x23}, @multicast1]}, @lsrr={0x83, 0xb, 0x69, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'ip_vti0\x00', &(0x7f0000000100)={'ip_vti0\x00', r1, 0x20, 0x8, 0x9, 0x5f, {{0xd, 0x4, 0x3, 0xc, 0x34, 0x65, 0x0, 0xc5, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, {[@end, @timestamp_prespec={0x44, 0x1c, 0xb5, 0x3, 0x8, [{@rand_addr=0x64010100, 0xc0}, {@multicast1, 0x1ff}, {@rand_addr=0x64010101, 0x6}]}, @end]}}}}}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:21 executing program 3: add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x6, 0x0, 0x0) 17:09:21 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0) keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xffffffffffffffff, 0x0, 0x0) 17:09:21 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x1a, r0, r1) 17:09:21 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_STAT_ANY(r1, 0x4, 0x14, &(0x7f0000000040)=""/99) fork() 17:09:21 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x18, r0, r1) 17:09:21 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, 0x0, 0x0) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xca0012a64bc860b8}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x90}, 0x408c0) 17:09:21 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{0x1}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() timer_create(0x7, &(0x7f0000000040)={0x0, 0x36}, &(0x7f0000000080)) 17:09:21 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x1b, r0, r1) 17:09:21 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) 17:09:21 executing program 2: r0 = fsmount(0xffffffffffffffff, 0x1, 0x70) sendmsg$DEVLINK_CMD_SB_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0xb0, 0x0, 0x10, 0x70bd25, 0x25dfdbfb, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x400}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x4}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x1}}]}, 0xb0}, 0x1, 0x0, 0x0, 0xd0}, 0x40011) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0), r0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000200)={0x148, r1, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0xaf1}, {0x6}, {0x5}, {0x6, 0x11, 0xfff}, {0x8, 0xb, 0x9}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x473}, {0x6, 0x16, 0x8}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x7}, {0x8, 0xb, 0xd0}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x7}, {0x6, 0x16, 0xff}, {0x5}, {0x6, 0x11, 0x200}, {0x8}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0xffff}, {0x6, 0x16, 0x3}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x4}, {0x8, 0xb, 0x2}}]}, 0x148}, 0x1, 0x0, 0x0, 0x20000004}, 0x4004001) 17:09:21 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x18, r0, r1) 17:09:21 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x1c, r0, r1) 17:09:21 executing program 0: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r4 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, r2) request_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='syz', r4) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) keyctl$KEYCTL_MOVE(0x3, r2, r1, r3, 0x1) 17:09:21 executing program 4: r0 = fork() waitid(0x2, r0, &(0x7f00000001c0), 0x8, 0x0) timer_create(0x3, &(0x7f00000001c0)={0x0, 0x23, 0x4, @tid=r0}, &(0x7f0000000200)) r1 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)=[0x20, 0x0]) r2 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SETVAL(r2, 0x0, 0x10, &(0x7f0000000040)=0xd093ffb) r3 = semget(0x0, 0x1, 0x1a) getrusage(0x0, &(0x7f0000000300)) semctl$SEM_STAT_ANY(r2, 0x4, 0x14, &(0x7f0000000240)=""/182) semctl$SEM_STAT_ANY(r3, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETPID(r3, 0x0, 0xb, &(0x7f0000000100)=""/174) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:21 executing program 1: r0 = accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x80000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14) bind$packet(r0, &(0x7f0000000180)={0x11, 0x1c, r1, 0x1, 0xd1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x34}}, 0x14) r2 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='(/!\x00', 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, r2, 0x0) 17:09:21 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) keyctl$KEYCTL_MOVE(0x1e, r0, 0x0, r0, 0xa573478220676a05) 17:09:21 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x18, r0, r1) 17:09:21 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000000)={0x0, 0x0, @auto=[0x1d, 0x2d, 0x3f]}, 0xb, r0) request_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='**!\x00', 0x0) 17:09:21 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x18, r0, 0x0) 17:09:21 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x1d, r0, r1) 17:09:21 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) semctl$SEM_INFO(0x0, 0x2, 0x13, &(0x7f0000000080)=""/157) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) 17:09:21 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x307602, 0x0) connect$packet(r1, &(0x7f0000000140)={0x11, 0x10, 0x0, 0x1, 0x0, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x36}}, 0x14) 17:09:21 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x18, r0, 0x0) 17:09:21 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x1e, r0, r1) 17:09:21 executing program 4: r0 = semget$private(0x0, 0x4, 0x8) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000040)=[0x1000, 0xc5dd, 0x1]) semop(0x0, &(0x7f0000000000), 0x0) semget$private(0x0, 0x0, 0x2) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000000)=[0x8]) fork() 17:09:21 executing program 0: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) keyctl$reject(0x13, r0, 0x6, 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:21 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$link(0x8, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000100)=@req={0x4fa, 0x1, 0x0, 0x7}, 0x10) keyctl$link(0x8, r0, r1) 17:09:21 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x18, r0, 0x0) 17:09:21 executing program 1: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000080)=ANY=[@ANYBLOB="901900f1ff42c58a4ec78b7edc956016387c27d38494c0d65c931a74f30d5c6f325a42bc63944190d3286c8de9d3b34c165efe9189f925e6e87386260938d6cdbb35588f85967cf0c07072d83d7752345ba5e7855f9fc429383acc1e1954fcaa9871cf41e1ca24cad3c64c65b2535e3ad5e76c73f21579ad5b97bcb5176706153834a0c708be16de5f438066f2abbad65410e1a033c9f3b6f18dfa8e9ad9b86c809f0b012c1000800000000000000b2efd5d4733df8345771e08427236a55c7620ad2e614aaf7f36623234e7cdd39b397ee7ef50"], 0x8, r0) keyctl$KEYCTL_MOVE(0xb, 0x0, r0, r0, 0x0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000000)={0x1, 0x0, @a}, 0x48, r1) keyctl$get_persistent(0x16, 0xffffffffffffffff, r1) r2 = request_key(&(0x7f0000000240)='blacklist\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)={0x2, 0x0, @auto=[0x26, 0x3a, 0x39, 0x1d, 0x13, 0x25, 0x36]}, 0xf, r2) 17:09:21 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='\x00', 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) request_key(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)='ceph\x00', r1) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) keyctl$link(0x8, r2, r3) r4 = request_key(&(0x7f0000000140)='.request_key_auth\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x00', r0) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r5, 0x0, 0x0) timerfd_gettime(r5, &(0x7f00000002c0)) keyctl$search(0xa, r0, &(0x7f00000000c0)='ceph\x00', &(0x7f0000000100)={'syz', 0x0}, r4) 17:09:21 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000140)=[{0x4, 0x4, 0x1000}], 0x1) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="344c93cb", @ANYRES16=0x0, @ANYBLOB="04002cbd7000fedbdf250200000005000400020000000900010073797a30000000000900010073797a3200000000"], 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x20008800) semctl$GETPID(r0, 0x0, 0xb, &(0x7f0000000180)=""/148) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) semctl$GETPID(r0, 0x0, 0xb, &(0x7f0000000040)=""/214) r2 = semget(0x3, 0x1, 0x280) semctl$SEM_INFO(r2, 0x3, 0x13, &(0x7f0000000140)) semget(0x3, 0x3, 0x5a0) fork() 17:09:21 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) keyctl$link(0x8, 0x0, 0xfffffffffffffffb) 17:09:21 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x18, 0x0, r0) 17:09:21 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) request_key(&(0x7f0000000000)='.dead\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='{!\x00', r0) 17:09:21 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='!\x00', 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)={0x0, 0x0, @d}, 0x18, r1) 17:09:22 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) keyctl$negate(0xd, r3, 0xfffffffffffffff5, r4) 17:09:22 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x18, 0x0, r0) 17:09:22 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffffb, 0xa573478220676a05) r0 = request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='$$%#!\x00', 0xfffffffffffffff8) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, r0, r1, r2, 0x1) 17:09:22 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() semctl$SETVAL(r0, 0x0, 0x10, &(0x7f0000000040)=0x6) 17:09:22 executing program 2: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{}, {0x0, 0xff01}], 0x2) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) r1 = msgget(0x0, 0x248) msgctl$IPC_RMID(r1, 0x0) msgctl$IPC_RMID(r1, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) keyctl$KEYCTL_MOVE(0x1e, 0x0, r2, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:22 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = request_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)=']\x98-*(#&}#\x00', 0xfffffffffffffff8) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$negate(0xd, r0, 0xb8ac, r1) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) keyctl$negate(0xd, r2, 0xfffffffffffffff8, 0xfffffffffffffffe) 17:09:22 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x18, 0x0, r0) 17:09:22 executing program 2: r0 = semget(0x0, 0x0, 0x1a) r1 = semget$private(0x0, 0x1, 0x480) semctl$IPC_STAT(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000200)=""/88) semctl$SETVAL(r1, 0x4, 0x10, &(0x7f00000001c0)=0xff) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETPID(r0, 0x1, 0xb, &(0x7f0000000100)=""/143) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) semctl$GETPID(0x0, 0x1, 0xb, &(0x7f0000000000)=""/193) 17:09:22 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)={0x1, 0x0, @b}, 0x48, r0) keyctl$link(0x8, r2, r1) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r4, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0x38}}, 0x10) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x50, r4, 0x100, 0x70bd2a, 0x25dfdbfd, {}, [@NL802154_ATTR_SEC_DEVKEY={0x20, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x5}, @NL802154_DEVKEY_ATTR_ID={0xc, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8}]}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x50}}, 0x4008002) 17:09:22 executing program 0: r0 = semget$private(0x0, 0x0, 0x120) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000000)=""/158) semget(0x3, 0x3, 0x91) keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:22 executing program 4: r0 = semget$private(0x0, 0x0, 0x74) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) r1 = msgget(0x0, 0x32) msgget(0x1, 0x200) r2 = semget(0x0, 0x4, 0x1a) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r3, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000001400)={'syztnl2\x00', &(0x7f0000001340)={'erspan0\x00', 0x0, 0x8, 0x7800, 0xffff1658, 0x7, {{0x1d, 0x4, 0x2, 0x5, 0x74, 0x67, 0x0, 0x3f, 0x4, 0x0, @multicast2, @multicast1, {[@generic={0x7, 0xd, "5519ac73676ade0419e7f3"}, @ssrr={0x89, 0xf, 0x76, [@broadcast, @loopback, @remote]}, @timestamp_addr={0x44, 0x4, 0x64, 0x1, 0x2}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x6, [{@broadcast, 0x8}, {@multicast2, 0x5}, {@rand_addr=0x64010102, 0x8}, {@loopback, 0xffff}, {@empty, 0x20}]}, @timestamp_addr={0x44, 0x14, 0xbb, 0x1, 0x3, [{@loopback, 0xfff}, {@loopback, 0x1}]}]}}}}}) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_INFO(r2, 0x1, 0x13, &(0x7f0000000100)=""/195) r4 = semget(0x2, 0x0, 0x1b8b3b9f45f1b221) semctl$GETALL(r4, 0x0, 0xd, &(0x7f00000002c0)=""/4096) msgctl$IPC_INFO(r1, 0x3, &(0x7f0000000040)=""/166) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000001440)='^^[\x00', &(0x7f0000001480)='./file0\x00', 0xffffffffffffffff) semtimedop(r2, &(0x7f0000000200)=[{0x2, 0x101, 0x1800}, {0x0, 0x1, 0x800}, {0x2, 0x3, 0x800}, {0x0, 0x40}, {0x3, 0x3, 0x1000}, {0x2, 0x6}, {0x1, 0x1, 0x800}, {0x3, 0x1, 0x1800}, {0x5, 0xfffa, 0x800}], 0x9, &(0x7f0000000280)={r5, r6+60000000}) fork() semctl$SEM_INFO(r4, 0x0, 0x13, &(0x7f00000012c0)=""/72) 17:09:22 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = fsmount(0xffffffffffffffff, 0x1, 0x80) r1 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)={0x1, 0x0, @b}, 0x48, 0xffffffffffffffff) keyctl$link(0x8, r1, 0xfffffffffffffffb) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 17:09:22 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x18, 0x0, r0) 17:09:22 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) r2 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)={0x1, 0x0, @d}, 0x18, r1) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r4 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)={0x1, 0x0, @c}, 0x29, r4) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x2}, &(0x7f0000000900)=ANY=[@ANYBLOB="0500000000000000"], 0x8, r3) keyctl$negate(0xd, r2, 0x3, r3) 17:09:22 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x20, 0x70bd25, 0x25dfdbfd, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xffff}, @IEEE802154_ATTR_PAN_ID={0x6}, @IEEE802154_ATTR_DEV_INDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x20040080}, 0x800) 17:09:22 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:22 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0xb, r1, r3, r2, 0x0) sendmsg$NL802154_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x44, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@NL802154_ATTR_PAGE={0x5, 0x7, 0x3}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_CHANNEL={0x5}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000003}]}, 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x8000) 17:09:22 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) semget$private(0x0, 0x3, 0x84) fork() semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000040)=""/169) 17:09:22 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x18, 0x0, r0) 17:09:22 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x18, 0x0, r0) 17:09:22 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0xb, 0x0, r0, 0xfffffffffffffff9, 0x0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) r2 = request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='syz', 0xfffffffffffffffd) keyctl$reject(0x13, r1, 0x3, 0x9, r2) 17:09:22 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r2 = fsmount(r1, 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r4) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r5, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000140), 0x200200) msgget(0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f00000000c0)) 17:09:22 executing program 4: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x60, r0, 0x8, 0x70bd29, 0x25dfdbfb, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x8001}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x1}}]}, 0x60}, 0x1, 0x0, 0x0, 0x24040090}, 0x84) r1 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:22 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:22 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)={0x2, 0x0, @d}, 0x18, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) keyctl$link(0x8, r0, r1) 17:09:22 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x18, 0x0, r0) 17:09:22 executing program 1: setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@ccm_128={{0x304}, "ea3ea12d326facf9", "465d3647c456a57e088717c04d912b42", "0f40040f", "4eaa95368c10621f"}, 0x28) keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x1) r0 = socket(0x21, 0x4, 0x1) setsockopt$inet6_tcp_int(r0, 0x6, 0x17, &(0x7f0000000040)=0x2f, 0x4) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) 17:09:22 executing program 5: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x2d, 'memory'}, {0x2d, 'memory'}, {0x2b, 'io'}]}, 0x14) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r2) r3 = fsmount(0xffffffffffffffff, 0x0, 0x4) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r5 = fsmount(r4, 0x0, 0xa) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000640), r3) r7 = request_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='netdevsim\x00', r0) r8 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f00000005c0)=ANY=[@ANYBLOB="005e1435d9fa0a67dbdd490c3999cbbb09"], 0x8, r8) keyctl$clear(0x7, r8) keyctl$reject(0x13, r7, 0x1, 0x9, r0) openat$cgroup_subtree(r4, &(0x7f0000000580), 0x2, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r5, &(0x7f00000007c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000780)={&(0x7f0000000900)={0xfc, r6, 0x20, 0x70bd2c, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}, {@pci, {0x8, 0xb, 0xfffffffe}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x401}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xffffffff}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x26}}, {@nsim={{}, {0x0, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4010}, 0x21082cd285189a34) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10100882}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r6, 0x4, 0x70bd26, 0x25dfdbfc, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4810}, 0x40000054) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$devlink(&(0x7f00000003c0), r4) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r9, &(0x7f0000000540)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)=ANY=[@ANYBLOB="d0000000", @ANYRES16=r10, @ANYBLOB="080025bd7000fcdbdf251c00b300080001007063690011000200303030303a30303a31302e300000000008000b00e6890000080001007063690011000200303030303a30303a31302e300000000008000b00ff0f00000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b00040000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b00ffffff7f0800010070636900cdec0200303030303a30303a31302e300000000008000b0000000100"], 0xd0}, 0x1, 0x0, 0x0, 0x20000840}, 0x40000) 17:09:22 executing program 0: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900)=ANY=[@ANYBLOB='\x00\x00\x00\x00 \x00\x00\x00'], 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000001c0), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000140)={0x0, 0x0, @b}, 0x48, r1) r2 = request_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='\x00', r0) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) keyctl$link(0x8, r2, r3) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) keyctl$unlink(0x9, r4, 0xfffffffffffffffa) r5 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$KEYCTL_MOVE(0x3, r0, r1, r5, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000940)=""/4096) r6 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r6) keyctl$unlink(0x9, r6, r1) 17:09:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={0x0, 0xfffffd6e}}, 0x0) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2301800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x60, 0x0, 0x200, 0x70bd26, 0x25dfdbff, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'bond0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'dummy0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x60}, 0x1, 0x0, 0x0, 0x20008090}, 0xc000) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:22 executing program 3: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x18, 0x0, 0x0) 17:09:22 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST(r0, 0x40383d03, &(0x7f0000000040)) ioctl$PTP_PEROUT_REQUEST(r0, 0x40383d03, &(0x7f0000000140)={{0x3, 0xa}, {0x0, 0x7d7}, 0x3, 0x1}) r1 = fork() waitid(0x2, r1, &(0x7f00000001c0), 0x8, 0x0) wait4(r1, 0x0, 0x2, &(0x7f0000000080)) keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:22 executing program 4: syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x80800) fork() 17:09:22 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r0) 17:09:22 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)=0x0) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000280)=ANY=[@ANYBLOB="000000000000000061626364f49df627231cae6566676869"], 0x18, r4) keyctl$get_persistent(0x16, r2, r3) r5 = request_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='syz', r3) r6 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r6) setfsuid(r2) keyctl$search(0xa, r5, &(0x7f0000000200)='big_key\x00', &(0x7f0000000240)={'syz', 0x0}, r6) keyctl$link(0x8, r0, r1) 17:09:22 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)=ANY=[@ANYBLOB="03000000000000000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b08000000000000003435363738393a3b3c3d3e3f40"], 0x48, 0xfffffffffffffffc) r1 = request_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)=',@\x00', 0xfffffffffffffffe) r2 = semget$private(0x0, 0x4, 0x1a) semctl$GETPID(r2, 0x0, 0xb, &(0x7f00000001c0)=""/70) keyctl$negate(0xd, r0, 0x1000, r1) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x66, &(0x7f0000000240)=0xfff, 0x4) 17:09:22 executing program 3: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x18, 0x0, 0x0) 17:09:22 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket(0x2a, 0x3, 0x80000001) r2 = fsmount(0xffffffffffffffff, 0x0, 0x4) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r4 = fsmount(r3, 0x0, 0xa) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000640), r2) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r4, &(0x7f00000007c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000780)={&(0x7f0000000480)={0xf8, r5, 0x800, 0x70bd2c, 0x25dfdc01, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}, {@pci, {0x8, 0xb, 0x401}}, {@pci, {0x8, 0xb, 0x3ff}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x3}}, {@nsim={{}, {0x0, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x26}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xfffffffffffffe74, 0xb, 0x7}}]}, 0xffffffffffffffa7}, 0x1, 0x0, 0x0, 0x4010}, 0x21082cd285189a34) sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0xf8, r5, 0x200, 0x70bd29, 0x25dfdbfc, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8}, {0x11}}, {0x8}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8800}, 0x24000080) keyctl$reject(0x13, 0x0, 0x9, 0xff, r0) r6 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000002000000a2ed0edd8913a2c4300a6c5803b5dcdcd256f54e548b7a303190488bb32feecae10d3d5068ba86196af9b928c524a3922c15e697756cca49c8bac581b1da23de90e2cb63f8b52b6c7d493588a472be7544d49b2c8dadc29cf3a79dbaf90bbba555b4420d643b0dcac85bbdef69543186548b87ed7f10c923b449d3db3e5bf71fb86e7f9f72a9b4207045d9897e774c3e7752fb2065c2cb535936b80bd4c6ac47d1b1ccd68f5ea386610562570ec3c24c038c1c6cc70db20000000000000000"], 0x8, r6) keyctl$negate(0xd, r6, 0x401, r0) 17:09:22 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) semget$private(0x0, 0x3, 0x441) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000080)=ANY=[@ANYBLOB="3efac6015a2e9471121ce28db9aba565037ad8064b58"], 0x8, r3) keyctl$negate(0xd, r2, 0x9, r3) r4 = add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)={0x0, 0x0, @auto=[0x2d, 0x26, 0x10, 0x3b, 0x12, 0x10, 0x28, 0x36]}, 0x10, r0) r5 = request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='fscrypt-provisioning\x00', r0) keyctl$KEYCTL_MOVE(0x1e, r4, r3, r5, 0x0) keyctl$link(0x8, r0, r1) 17:09:22 executing program 4: fsmount(0xffffffffffffffff, 0x1, 0xc) r0 = semget$private(0x0, 0x2, 0x102) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:22 executing program 3: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x18, 0x0, 0x0) 17:09:22 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000100)={0x1, 0x0, @auto=[0x16, 0x10, 0x29]}, 0xb, r1) keyctl$get_persistent(0x16, 0xee01, r1) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r3, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) keyctl$KEYCTL_MOVE(0x3, 0x0, r2, r0, 0x0) 17:09:22 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0xb, r1, r3, r2, 0x0) sendmsg$NL802154_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x44, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@NL802154_ATTR_PAGE={0x5, 0x7, 0x3}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_CHANNEL={0x5}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000003}]}, 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x8000) 17:09:23 executing program 1: r0 = fsmount(0xffffffffffffffff, 0x1, 0x4) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000340)={0x6}, 0x4) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000002c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="88020000", @ANYRES16=0x0, @ANYBLOB="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"/805], 0x280}, 0x1, 0x0, 0x0, 0x4000080}, 0x890) keyctl$KEYCTL_MOVE(0xb, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) 17:09:23 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, 0x0, 0x0) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="040227bd7000fcdbdf5929a8c38f502c4cff06908c8772251c000000"], 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x4) r1 = semget$private(0x0, 0x4, 0x188) semtimedop(r1, &(0x7f0000000080)=[{0x3, 0x1de4, 0x1800}, {0x1, 0x7fff}, {0x2, 0x2, 0x800}, {0x3, 0x0, 0x800}, {0x3, 0x0, 0x1800}, {0x0, 0x8, 0x1000}, {0x3, 0x2, 0x1000}, {0x0, 0x2, 0x800}, {0x2, 0x1, 0x1000}], 0x9, &(0x7f00000000c0)={0x77359400}) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r2) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, r3) r5 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r4, r5) r6 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900)=ANY=[@ANYBLOB="12e7cd7000000000"], 0x8, r6) r7 = request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='(\x15\x00', r4) keyctl$link(0x8, r7, r7) 17:09:23 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) r1 = semget(0x3, 0x1, 0x20) semctl$GETALL(r1, 0x0, 0xd, &(0x7f0000000040)=""/104) fork() 17:09:23 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="28000000e2c8d8675447b345d9f1591a710bc524767f9d421c9af82c5fb81120a950408c06fe59343e6f19746132a1cf70aee7db17800e6113b46ceebc2b", @ANYRES16=r1, @ANYBLOB="000429bd7000fbdbdf251f0000000a0001007770616e330000000a0001007770616e310000000a0001007770616e33000000"], 0x38}, 0x1, 0x0, 0x0, 0x2}, 0xbe8067bd765eabec) keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:23 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0xb, r1, r3, r2, 0x0) sendmsg$NL802154_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x44, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@NL802154_ATTR_PAGE={0x5, 0x7, 0x3}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_CHANNEL={0x5}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000003}]}, 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x8000) 17:09:23 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = fork() waitid(0x2, r0, &(0x7f00000001c0), 0x8, 0x0) r1 = fork() waitid(0x2, r1, &(0x7f00000001c0), 0x8, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x128, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r0}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x3}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r1}}]}, 0x128}, 0x1, 0x0, 0x0, 0x4890}, 0x8000) 17:09:23 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0xb, r1, r3, r2, 0x0) sendmsg$NL802154_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x44, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@NL802154_ATTR_PAGE={0x5, 0x7, 0x3}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_CHANNEL={0x5}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000003}]}, 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x8000) 17:09:23 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) timerfd_create(0x5, 0x80000) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) r1 = semget$private(0x0, 0x2, 0x48) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000040)=[0x5]) fork() 17:09:23 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0xb, r1, r3, r2, 0x0) 17:09:23 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000200), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x3}, &(0x7f0000000380)={0x1, 0x0, @auto=[0x2b]}, 0x9, 0xfffffffffffffff8) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r1, 0x0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) getresuid(&(0x7f00000001c0), &(0x7f0000000080), &(0x7f0000000100)=0x0) r4 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_persistent(0x16, r3, r4) keyctl$KEYCTL_MOVE(0x1e, r2, 0x0, r2, 0xa573478220676a05) r5 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)=':\x00', r1) keyctl$unlink(0x9, r2, r5) 17:09:23 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_MOVE(0xb, r0, 0x0, 0xfffffffffffffff9, 0x1) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) 17:09:23 executing program 3: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) keyctl$KEYCTL_MOVE(0xb, r0, 0x0, r1, 0x0) 17:09:23 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='-^[%\x00', 0xfffffffffffffff9) keyctl$link(0x8, r0, 0xfffffffffffffffe) 17:09:23 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000300)='*)*--)*\x00', r0) keyctl$link(0x8, r0, r1) r2 = request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000140)='k\x1f\x00\x00\x00ng\x06\x00\x00\x00\x00\x00\x00\x00\xdcf\xe9\xb8\xcd\x16\x92\n\x8b\x98\xc9\xfc\xed\x8c8\xebh{,Y\xd4J\x95.\xfb\xdd\x99\xae\x88\xe6\xe6`\xed\xf1A$u\t\xa1;\x1d\xdc\x93\xb4\x15\x9e\x9f\xa3Q\n\xbb\xac\x00'/80, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) r4 = add_key$fscrypt_provisioning(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)={0x2, 0x0, @d}, 0x18, r1) keyctl$search(0xa, r4, &(0x7f0000000080)='id_legacy\x00', &(0x7f00000001c0)={'syz', 0x3}, r3) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r0, r2, r5, 0x0) 17:09:23 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x1000}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) semctl$SETVAL(r0, 0x0, 0x10, &(0x7f0000000000)=0x7ff) fork() 17:09:23 executing program 3: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, 0x0, r1, 0x0) 17:09:23 executing program 3: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) keyctl$KEYCTL_MOVE(0xb, r0, 0x0, 0x0, 0x0) 17:09:23 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900)=ANY=[@ANYBLOB="0000be0028438abf"], 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) keyctl$reject(0x13, r0, 0x5, 0xc51, r1) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000000)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000040)=ANY=[@ANYBLOB="2fec77eabe4cd50e01b1c30000000000000000456309cae2f7fe0453bf228d832b1880842c37b20b5350460eb9b123040dd381493a64b2cc35e98926d6c9c67b5b8d2c9a6c04b11bf1939a02167103cca875a62f"], 0x8, r3) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) keyctl$KEYCTL_MOVE(0x1e, r2, r3, r4, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, r1) 17:09:23 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = fsopen(&(0x7f0000000040)='autofs\x00', 0x1) fsmount(r0, 0x1, 0x4) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r1, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 17:09:23 executing program 1: r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)={0x1, 0x0, @auto=[0x3e, 0x14]}, 0xa, 0x0) keyctl$KEYCTL_MOVE(0xb, r0, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0) 17:09:23 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000e8a47775c55069192617fb0e3f2fcd4759"], 0x8, r0) r1 = add_key$keyring(&(0x7f0000000200), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, r0) r2 = request_key(&(0x7f0000000080)='logon\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='%[#[-!\x00', 0xfffffffffffffff8) r3 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$link(0x8, r1, r3) add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 17:09:23 executing program 3: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) keyctl$KEYCTL_MOVE(0xb, r0, 0x0, 0x0, 0x0) 17:09:23 executing program 0: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='keyring\x00', r0) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) keyctl$KEYCTL_MOVE(0x3, r2, 0x0, r1, 0x1) 17:09:23 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000180)=[{}, {0x3, 0x1, 0x1800}], 0x2) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)=[0x7fff]) fork() r1 = fork() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)) waitid(0x2, r1, &(0x7f00000001c0), 0x8, 0x0) waitid(0x1, r1, 0x0, 0x80000000, 0x0) r2 = semget(0x0, 0x0, 0xe) semctl$GETPID(r2, 0x0, 0xb, &(0x7f00000003c0)=""/211) r3 = semget$private(0x0, 0x1, 0x102) r4 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x2, 0x14, &(0x7f00000004c0)=""/4096) semctl$SEM_STAT_ANY(r4, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$IPC_STAT(r4, 0x0, 0x2, &(0x7f00000002c0)=""/246) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000240)=""/112) semctl$IPC_INFO(r0, 0x2, 0x3, &(0x7f0000000040)=""/238) 17:09:23 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) getrusage(0xfffffffffffffffe, &(0x7f00000000c0)) getrusage(0x0, &(0x7f0000000000)) 17:09:23 executing program 1: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) keyctl$KEYCTL_MOVE(0xb, 0x0, r0, 0xfffffffffffffff9, 0x1) 17:09:23 executing program 0: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)={0x3}, 0x8, r0) keyctl$KEYCTL_MOVE(0x3, r1, r0, 0xfffffffffffffffc, 0x1) 17:09:23 executing program 3: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) keyctl$KEYCTL_MOVE(0xb, r0, 0x0, 0x0, 0x0) 17:09:23 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$link(0x8, r0, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000080), 0x4) 17:09:23 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='+\'$:\x00', r0) 17:09:23 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0) keyctl$get_persistent(0x16, r1, r0) request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='\x00', r0) 17:09:23 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) getsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f0000000080)=""/96, &(0x7f0000000100)=0x60) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:23 executing program 3: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, 0x0, r1, 0x0) 17:09:23 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$link(0x8, r0, r1) 17:09:23 executing program 4: r0 = semget$private(0x0, 0x0, 0x290) r1 = semget(0x0, 0x1, 0x1a) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000100)=[0xd9c, 0x0, 0xffff, 0x1, 0x91, 0x488, 0x9, 0x4]) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETZCNT(r1, 0x6, 0xf, &(0x7f0000000040)=""/86) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000140)=""/14) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:23 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = fsmount(0xffffffffffffffff, 0x0, 0x1) r1 = fork() waitid(0x2, r1, &(0x7f00000001c0), 0x8, 0x0) syz_open_procfs$namespace(r1, &(0x7f0000000100)='ns/time_for_children\x00') setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req3={0x8e, 0xa, 0x16d, 0x0, 0x8, 0x5, 0xba61}, 0x1c) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f00000000c0)=@req={0xfffff756, 0x101, 0x3, 0x5621}, 0x10) add_key$keyring(&(0x7f0000000040), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$negate(0xd, r2, 0x101, 0xfffffffffffffff8) 17:09:23 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, 0x0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) 17:09:23 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r2, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0x38}}, 0x10) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r2, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@NL802154_ATTR_CHANNEL={0x5, 0x8, 0x18}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0x16}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000000) keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:23 executing program 3: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, r0, 0x0) 17:09:23 executing program 1: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x80, r0, 0x22, 0x70bd2d, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x1}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x101}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x101}}]}, 0x80}, 0x1, 0x0, 0x0, 0x8094}, 0x10) keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:23 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:23 executing program 3: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, r0, 0x0) 17:09:24 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffe) 17:09:24 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) keyctl$reject(0x13, r2, 0x9, 0x1, r0) keyctl$link(0x8, r0, r1) 17:09:24 executing program 3: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, r0, 0x0) 17:09:24 executing program 1: semctl$IPC_INFO(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000000)=""/182) keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:24 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) fsmount(r0, 0x0, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x1, 0x4) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) keyctl$reject(0x13, 0x0, 0x8, 0x4, 0xffffffffffffffff) 17:09:24 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, 0x0, r1, 0x0) 17:09:24 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() getpid() clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) semtimedop(r0, &(0x7f0000000100)=[{0x0, 0x3}, {0x2, 0x2, 0x1800}, {0x2, 0x64bb, 0x1800}], 0x3, &(0x7f0000000140)={0x77359400}) semtimedop(r0, &(0x7f0000000040)=[{0x4, 0x3, 0x2000}, {0x4, 0x401, 0x1800}, {0x4, 0x4, 0x800}, {0x3, 0x80, 0x1000}, {0x4, 0x2, 0x1000}, {0x1, 0x0, 0x1000}, {0x4, 0x5, 0x1800}, {0x3, 0x6, 0x1800}, {0x4, 0x81, 0x800}], 0x9, &(0x7f00000000c0)={r1, r2+10000000}) 17:09:24 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, @can, @rc={0x1f, @any, 0x3f}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xff19, 0x0, 0x0, 0x0, 0x3ff, &(0x7f0000000000)='veth1_to_hsr\x00', 0x9cbf, 0x9, 0x8}) keyctl$KEYCTL_MOVE(0xb, 0x0, 0xfffffffffffffffb, 0xfffffffffffffff8, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f00000000c0), r0) 17:09:24 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$link(0x8, r0, r1) r2 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)={0x1, 0x0, @b}, 0x48, 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x7f, 0xffffffffffffffff) 17:09:24 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x18240, 0x0) r1 = socket(0x27, 0x2, 0x6ed) setsockopt$inet6_tcp_buf(r1, 0x6, 0xe, &(0x7f0000000100)="5c7ac6bef7d9bc8c704583d31a40e60796d259e058c0f390fde7822edf3b4bdc043fe309dd3a643610123817b33e0b9d6a1a0e704522237769c3cb574bf0bcca66dfd37c36f8da1b2acb77b559332ebe74902750d6fd7eacecff8a57dfb7f1d153b65cf6138b0bd9701628c5e20cad3de17041cb2d8833bfbfb3e93f1477af5844a58d92bef8e78c1e5b6fb1dc26377bed31698e7ce2a9c498bc0c010921ec596b60686501f3b2b295485b6b64321f9f9881e4da434492645a7836f76abe6775db8267609114066c", 0xc8) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f00000000c0)=0x4, 0x4) getsockopt$packet_int(r0, 0x107, 0x19, &(0x7f0000000040), &(0x7f0000000080)=0x4) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:24 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, 0x0, r1, 0x0) 17:09:24 executing program 1: r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000080)={0x1, 0x0, @c}, 0x29, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xb, r0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:24 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r1, 0x0) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, r2) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, r4) r5 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r5) r6 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r6) keyctl$KEYCTL_MOVE(0x1e, 0x0, r5, r6, 0x1) r7 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r7) keyctl$reject(0x13, r3, 0x40, 0x40, r7) request_key(&(0x7f0000000080)='rxrpc_s\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='keyring\x00', r2) 17:09:24 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$GETPID(0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000040)=""/119) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:24 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, 0x0, r1, 0x0) 17:09:24 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) add_key$fscrypt_provisioning(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)={0x2, 0x0, @auto=[0x15, 0x35]}, 0xa, r1) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$link(0x8, r0, r2) semget$private(0x0, 0x3, 0x102) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$unlink(0x9, r2, r3) 17:09:24 executing program 1: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0x0) 17:09:24 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) keyctl$unlink(0x9, r0, r2) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r2) r4 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, r3, r4, 0x0) 17:09:24 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x9c, r1, 0x2, 0x70bd2b, 0x25dfdbfb, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x6, 0x4, 0x1}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x3}}]}, 0x9c}}, 0x0) keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r2 = request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='%%-\x00', 0xfffffffffffffffb) keyctl$link(0x8, 0x0, r2) 17:09:24 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, 0x0, r1, 0x0) 17:09:24 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)=',:\x00', 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)={0x0, 0x0, @c}, 0x29, r1) timer_create(0xa81f9159482da4ba, &(0x7f0000000140)={0x0, 0x38, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000180)=0x0) timer_gettime(r2, &(0x7f00000001c0)) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$negate(0xd, r0, 0x1, r3) 17:09:24 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r0) socket(0x10, 0x2, 0x7) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) keyctl$link(0x8, r3, r2) 17:09:24 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) r1 = msgget(0x0, 0x20) msgctl$IPC_INFO(r1, 0x3, &(0x7f0000000040)=""/154) fork() 17:09:24 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900)=ANY=[@ANYBLOB="0000a30000000000"], 0x8, r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) keyctl$KEYCTL_MOVE(0x1e, r0, 0x0, r0, 0x0) 17:09:24 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={0x0, 0x1, 0x6, @link_local}, 0x10) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000040)=0x10001, 0x4) keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:24 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, 0x0, r1, 0x0) 17:09:24 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x2}, &(0x7f0000000080)={0x0, 0x0, @c}, 0x29, r0) keyctl$get_persistent(0x16, 0xee00, r0) keyctl$search(0xa, r0, &(0x7f0000000000)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x3}, r0) 17:09:24 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) 17:09:24 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0xfffffffffffffff8, 0x0, 0x0) 17:09:24 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='keyring\x00', r0) keyctl$negate(0xd, r1, 0x100000000, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r3) clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x1, 0x7, 0x7, 0x7e1d, 0x1, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) add_key$fscrypt_provisioning(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)={0x2, 0x0, @a}, 0x48, 0xfffffffffffffff9) keyctl$link(0x8, r0, r2) 17:09:24 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, 0x0, r1, 0x0) 17:09:24 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:09:24 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000100)=ANY=[@ANYBLOB="68ad803634bdfa180cd99b9120805fbecc9d2e0fb23e6aaa99590bfe4f5d117fb82c3498345bdd86c4"], 0x8, r0) r2 = fork() waitid(0x2, r2, &(0x7f00000001c0), 0x8, 0x0) wait4(r2, &(0x7f0000000000), 0x75934899937b15a6, &(0x7f0000000040)) keyctl$KEYCTL_MOVE(0x1e, r1, 0x0, r0, 0x1) 17:09:24 executing program 0: r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r2 = fsmount(r1, 0x0, 0xa) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000640), r0) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r2, &(0x7f00000007c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000780)={&(0x7f0000000680)={0xfc, r3, 0x800, 0x70bd2c, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x401}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xffffffff}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x26}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4010}, 0x21082cd285189a34) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0xa0, r3, 0x8, 0x70bd2c, 0x25dfdbfd, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}]}, 0xa0}, 0x1, 0x0, 0x0, 0x480d0}, 0x20008801) keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:24 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semctl$GETPID(r0, 0x4, 0xb, &(0x7f0000000040)=""/109) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$negate(0xd, r1, 0x3, r2) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000000c0)=[0x6, 0x4, 0x7ff, 0x3ff, 0x400, 0x40, 0x497]) 17:09:24 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000180)={0x1, 0x0, @b}, 0x48, 0xfffffffffffffff9) 17:09:24 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, 0x0, r1, 0x0) 17:09:24 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000000)='!\x00', 0xfffffffffffffffb) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f00000001c0), 0xffffffffffffffff) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[], 0x34}, 0x1, 0x0, 0x0, 0x40944}, 0x0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000140)=ANY=[@ANYBLOB="be0000000c84b36f1ca428"], 0x8, r1) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) r4 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$negate(0xd, r2, 0x2, r4) 17:09:24 executing program 5: add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) request_key(&(0x7f0000000080)='rxrpc_s\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='fscrypt-provisioning\x00', r0) r1 = add_key$fscrypt_provisioning(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) keyctl$link(0x8, r1, r3) 17:09:24 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x3, r0, 0x0, 0xfffffffffffffff9, 0x0) r1 = socket(0x10, 0x0, 0x10000) r2 = fsmount(0xffffffffffffffff, 0x0, 0x4) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r4 = socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$inet_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f0000000200)={0x4}, 0x4) r5 = fsmount(r3, 0x0, 0xa) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000640), r2) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r5, &(0x7f00000007c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000780)={&(0x7f0000000680)={0xfc, r6, 0x800, 0x70bd2c, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x401}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xffffffff}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x26}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4010}, 0x21082cd285189a34) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xb4, r6, 0x800, 0x70bd26, 0x25dfdbfd, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x80800}, {0x6, 0x11, 0x9}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x100}, {0x6, 0x11, 0x7}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x8, 0xb, 0xd5fe}, {0x6, 0x11, 0xef6}}]}, 0xb4}}, 0x4000880) 17:09:24 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SETVAL(r1, 0x4, 0x10, &(0x7f0000000040)) 17:09:24 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='+!\x00', r1) keyctl$KEYCTL_MOVE(0x1e, r0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) keyctl$unlink(0x9, r0, r0) 17:09:24 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, 0x0, r1, 0x0) 17:09:24 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) r1 = semget(0x3, 0x3, 0x80) semtimedop(r1, &(0x7f0000000040)=[{0x2, 0x1, 0x1800}, {0x0, 0x81, 0x400}, {0x0, 0xfffb, 0x800}, {0x1, 0x9, 0x800}], 0x4, &(0x7f0000000080)={0x77359400}) fork() 17:09:24 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0xfffffffffffffff9, 0xfffffffffffffff9, 0x0) r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) r1 = request_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000100)='\'@+*\xf1@\x00', 0xffffffffffffffff) semctl$IPC_INFO(r0, 0x2, 0x3, &(0x7f0000000140)=""/164) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffd, r1, 0x0) semtimedop(r0, &(0x7f0000000200)=[{0x3, 0xc5e, 0x1000}, {0x1, 0x3f, 0x1000}, {0x4, 0x1}, {0x3, 0x4, 0x1000}, {0x3, 0x374, 0x800}, {0x1, 0x1, 0x1000}, {0x1, 0x2, 0x1000}, {0x0, 0x666, 0x800}, {0x3, 0x8, 0x2400}], 0x9, &(0x7f0000000240)={0x77359400}) semctl$IPC_RMID(r0, 0x0, 0x0) 17:09:24 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='!\x00', r0) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$reject(0x13, r1, 0xa999, 0x9, r2) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) keyctl$negate(0xd, 0x0, 0x82f9, r0) 17:09:24 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r1) 17:09:24 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, 0x0, r1, 0x0) 17:09:24 executing program 2: r0 = semget(0x0, 0x4, 0x111) semop(r0, &(0x7f0000000080)=[{0x2, 0x4a2, 0x1800}, {0x4, 0x1, 0x800}, {0x3}], 0x3) semctl$GETVAL(r0, 0x1, 0xc, &(0x7f0000000180)=""/4096) semtimedop(r0, &(0x7f0000000000)=[{0x2, 0xe7c4}, {0x1, 0x55d, 0x800}, {0x3, 0xfff9, 0x800}, {0x0, 0x4, 0x800}, {0x3, 0x5, 0x1000}], 0x5, &(0x7f0000000040)={0x0, 0x989680}) semctl$GETPID(r0, 0x3, 0xb, &(0x7f00000000c0)=""/140) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) sched_rr_get_interval(0xffffffffffffffff, &(0x7f0000001180)) semctl$IPC_RMID(r0, 0x0, 0x0) 17:09:24 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) r1 = semget(0x0, 0x1, 0x100) semop(r1, &(0x7f0000000040)=[{0x1, 0x3, 0x2000}], 0x1) fork() 17:09:24 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:24 executing program 0: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000000)={0x0, 0x0, @auto=[0x13]}, 0x9, r1) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) keyctl$KEYCTL_MOVE(0x3, r2, r0, 0xfffffffffffffff9, 0x0) 17:09:24 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffa, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='\x00', r0) 17:09:24 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, 0x0, r1, 0x0) 17:09:24 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) keyctl$negate(0xd, 0x0, 0x6, 0xfffffffffffffffb) 17:09:24 executing program 5: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:24 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{0x0, 0x6, 0x1000}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:24 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, 0x0, r1, 0x0) 17:09:24 executing program 0: sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x8000) keyctl$KEYCTL_MOVE(0x3, 0x0, 0xffffffffffffffff, 0xfffffffffffffff9, 0x0) 17:09:24 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), r1) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r2, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0x38}}, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00042bbd7000ffdbdf251c0000000c000600020000000000000008000300", @ANYRES32=0x0, @ANYBLOB="08000300", @ANYRES32=r3, @ANYBLOB="08000300", @ANYRES32=r4, @ANYBLOB="08000300", @ANYRES32=0x0, @ANYBLOB="0c00060002000000020011000c0006000100000001000000080003a2b19e00", @ANYRES32=0x0, @ANYBLOB="08000300", @ANYRES32=r5, @ANYBLOB="08000300", @ANYRES32=0x0, @ANYBLOB], 0x70}, 0x1, 0x0, 0x0, 0x80}, 0x801) 17:09:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x7, 0x0, &(0x7f0000000200)) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r1, 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@ccm_128={{0x303}, "ce8223e5804516da", "d2daeca2cc4971bdf72136484f893e28", "377f6216", "25d2b0b154e2f0bf"}, 0x28) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffa, 0xfffffffffffffff9, 0x1) 17:09:25 executing program 2: r0 = semget(0x1, 0x0, 0x1) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) semtimedop(r0, &(0x7f0000000080)=[{0x0, 0x9, 0x1000}, {0x4, 0x1000, 0x1000}, {0x3, 0x4, 0x1000}], 0x3, &(0x7f0000000100)={r1, r2+60000000}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r3 = fsmount(0xffffffffffffffff, 0x0, 0x64) getsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:09:25 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$link(0x8, r0, r1) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)={0x1, 0x0, @d}, 0x18, 0xfffffffffffffffb) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x48, r2) socket$nl_generic(0x10, 0x3, 0x10) 17:09:25 executing program 0: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) keyctl$KEYCTL_MOVE(0x3, r0, r0, r0, 0x1) 17:09:25 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, 0x0, r1, 0x0) 17:09:25 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_STAT(r1, 0x0, 0x12, &(0x7f0000000040)=""/253) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:25 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, r1, 0x1, 0x70bd26, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20040010}, 0x10) keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:25 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, 0x0, r1, 0x0) 17:09:25 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = timerfd_create(0x0, 0x0) timerfd_gettime(r2, 0x0) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) keyctl$negate(0xd, r3, 0x82c, r0) keyctl$link(0x8, r0, r1) 17:09:25 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x60, r0, 0x300, 0x70bd2b, 0x25dfdbfb, {}, [@NL802154_ATTR_ACKREQ_DEFAULT={0x5}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_ACKREQ_DEFAULT={0x5}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_ACKREQ_DEFAULT={0x5, 0x1a, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x90}, 0x4050) 17:09:25 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) keyctl$get_persistent(0x16, 0x0, r0) 17:09:25 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semget$private(0x0, 0x4, 0x80) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:25 executing program 3: add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, r0, 0x0) 17:09:25 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)={0x2beaa0a0c05660e3, 0x0, @b}, 0x48, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) keyctl$unlink(0x9, 0x0, r1) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) r2 = request_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000400)='%#\\\x00', r1) add_key$fscrypt_provisioning(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000340)={0x3, 0x0, @c}, 0x29, r2) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r3) getresuid(&(0x7f0000000240), &(0x7f0000000280)=0x0, 0xfffffffffffffffc) r7 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r7) keyctl$get_persistent(0x16, r6, r7) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000440)='%#\xc1\xfe', r4) keyctl$KEYCTL_MOVE(0x1e, r4, r1, r5, 0x0) keyctl$link(0x8, r1, r3) 17:09:25 executing program 0: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)='w\n\xb8\xfc\xa6\xbeA\x01\xc2\xae\x05\xabDX\bf\xfcX\x9b\xa7N\x16H\xaf\xe5\xf0~\x90\xc9\x1d\xc1\xee\xfb\x9f\xee\x00\x00\x00\x97\xda\x9c\xc8k\xc3c\xa2S', r0) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000006162636421630900696a6b6c6d6e6f70717273747576777830bad03d623d171236"], 0x29, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x3, 0x0, r0, r1, 0x1) 17:09:25 executing program 5: sendmsg$IEEE802154_LIST_IFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8c000400}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000326bd7000fcdbdf251f0000000a0001007770616e310000000a0001007770616e3300000008000200", @ANYRES32=0x0, @ANYBLOB="a21644daff74384ae89ce5ee436dd65c0019ba4cbc5a4c7d0027f10edaf907281705a705afd2ffe684a079699972917e7bf069bc8c0362f4efb9bf6215cccfda423346c7de9ed731eb122deac619c79ffe52bb1966d135cc7a77a87924363a4cafe06b406f1ad09a240674c591b9494a7fd6881d404e44529eba801c9e009e3fecac7dd2c1a6e9ff30c51d73673ed68859d0cd191b9f8d17dca9fcc86c27"], 0x34}, 0x1, 0x0, 0x0, 0x4000001}, 0x4004084) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:25 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)={0x3, 0x0, @auto=[0x3f, 0x29, 0x3c, 0x25, 0x2f, 0x36]}, 0xe, r1) 17:09:25 executing program 3: add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, r0, 0x0) 17:09:25 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) semctl$GETPID(r0, 0x2, 0xb, &(0x7f0000000040)) fork() r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="20a18f2abbfa8beefd25150000000c000600010000000100000008000300", @ANYRES32=0x0, @ANYBLOB="08001f000400000005001e0001000000"], 0x38}}, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01002abd7000e9dbdf250b0000000800e9d444b8736a01475e2e7f19830e8dee639e00", @ANYRES32=r3, @ANYBLOB="06000a000000000006000a00feff00000c00060000000000000000000c000600030000000300000008000300", @ANYRES32=0x0, @ANYBLOB], 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) 17:09:25 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) getresuid(&(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000100)=0x0) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) keyctl$get_persistent(0x16, r2, r3) 17:09:25 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r2, 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r3, 0x0, 0x0) fsmount(r3, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000140)) r4 = request_key(&(0x7f0000000080)='id_legacy\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='keyring\x00', 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r0, 0x0, r4, 0x1) keyctl$KEYCTL_MOVE(0x1e, r0, r0, 0xfffffffffffffffe, 0x0) 17:09:25 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) keyctl$unlink(0x9, r0, 0xfffffffffffffff8) 17:09:25 executing program 3: add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, r0, 0x0) 17:09:25 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) keyctl$KEYCTL_MOVE(0xb, r0, r1, 0x0, 0x0) 17:09:25 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) r2 = request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='keyring\x00', r0) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) keyctl$KEYCTL_MOVE(0x1e, r1, r2, r3, 0x0) 17:09:25 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, 0x0, 0x0, 0x0) 17:09:25 executing program 0: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) add_key$fscrypt_provisioning(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)=ANY=[@ANYBLOB="02000000524e0000143f35e7223223"], 0xf, r0) r2 = add_key$fscrypt_provisioning(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)={0x1, 0x0, @c}, 0x29, 0x0) keyctl$KEYCTL_MOVE(0x3, r2, 0x0, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)='syz', r0) keyctl$negate(0xd, r2, 0x2, r3) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r3) r5 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x0, 0x0, @auto=[0x38, 0x1f, 0x10]}, 0xb, 0xffffffffffffffff) keyctl$reject(0x13, r5, 0xfffffffffffffffc, 0x9, r4) 17:09:25 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) keyctl$search(0xa, 0x0, &(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, 0xfffffffffffffff8) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) keyctl$search(0xa, r0, &(0x7f0000000080)='blacklist\x00', &(0x7f00000000c0)={'syz', 0x1}, 0xfffffffffffffffc) 17:09:25 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_INFO(r1, 0x3, 0x13, &(0x7f0000000080)=""/102400) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) 17:09:25 executing program 1: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_nanosleep(0x7, 0x1, &(0x7f0000000080)={r0, r1+10000000}, &(0x7f00000000c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000000)) keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000100)) 17:09:25 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_SEC_DEV(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, r1, 0x2, 0x70bd28, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}, 0x1, 0x0, 0x0, 0x20004000}, 0x8000) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r2, 0x0, 0x0) recvfrom$packet(r2, &(0x7f0000000000)=""/248, 0xf8, 0x2000, &(0x7f0000000100)={0x11, 0x16, 0x0, 0x1, 0x3f, 0x6, @local}, 0x14) keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:25 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000000)='\x00', &(0x7f0000000040)='\x00', 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:25 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000100)=ANY=[@ANYBLOB="68ad803634bdfa180cd99b9120805fbecc9d2e0fb23e6aaa99590bfe4f5d117fb82c3498345bdd86c4"], 0x8, r0) r2 = fork() waitid(0x2, r2, &(0x7f00000001c0), 0x8, 0x0) wait4(r2, &(0x7f0000000000), 0x75934899937b15a6, &(0x7f0000000040)) keyctl$KEYCTL_MOVE(0x1e, r1, 0x0, r0, 0x1) 17:09:25 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:25 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{0x3, 0x8, 0x1000}, {0x3, 0x2, 0x1800}, {0x0, 0x800}, {0x2, 0xfff, 0x3800}], 0x4) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:25 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x1) 17:09:25 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000100)=ANY=[@ANYBLOB="68ad803634bdfa180cd99b9120805fbecc9d2e0fb23e6aaa99590bfe4f5d117fb82c3498345bdd86c4"], 0x8, r0) r2 = fork() waitid(0x2, r2, &(0x7f00000001c0), 0x8, 0x0) wait4(r2, &(0x7f0000000000), 0x75934899937b15a6, &(0x7f0000000040)) keyctl$KEYCTL_MOVE(0x1e, r1, 0x0, r0, 0x1) 17:09:25 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) 17:09:25 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x200041, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x400, 0x70bd26, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r1, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000240)={'syztnl0\x00', &(0x7f0000000180)={'gretap0\x00', 0x0, 0x8, 0x80, 0x1948, 0x20, {{0x1c, 0x4, 0x0, 0x6, 0x70, 0x66, 0x0, 0x9, 0x2f, 0x0, @multicast1, @empty, {[@timestamp={0x44, 0x1c, 0xb, 0x0, 0x4, [0x8, 0x80000000, 0xfffffffd, 0x1, 0x800, 0x6]}, @ra={0x94, 0x4, 0x1}, @timestamp_addr={0x44, 0x3c, 0xbf, 0x1, 0x3, [{@broadcast, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x5}, {@dev={0xac, 0x14, 0x14, 0xb}, 0xfffffeff}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, {@private=0xa010102, 0x6}, {@private=0xa010102, 0xfffffe01}]}]}}}}}) 17:09:25 executing program 4: socket(0x9, 0x0, 0x7ff) r0 = semget$private(0x0, 0x4, 0x0) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semop(r1, &(0x7f0000000000)=[{0x1, 0x9}], 0x1) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="8c16ae14646435815cb559d2850c259690fc07ef251b676f149130cf000000", @ANYRES16=0x0, @ANYBLOB="000829bd7000ffdbdf25020000001400020076657468315f746f5f626174616476000900010073797a310000000005000400020000000900030073797a30000000000900010073797a31000000000900030073797a31000000000900030073797a31000000000900030073797a32000000000900030073797a32000000000500040002000000"], 0x8c}, 0x1, 0x0, 0x0, 0x80}, 0x40800) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() r2 = semget(0x1, 0x2, 0x0) semctl$IPC_INFO(r2, 0x2, 0x3, &(0x7f00000001c0)=""/49) 17:09:25 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) keyctl$negate(0xd, 0x0, 0x800, 0xfffffffffffffffc) 17:09:26 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000100)=ANY=[@ANYBLOB="68ad803634bdfa180cd99b9120805fbecc9d2e0fb23e6aaa99590bfe4f5d117fb82c3498345bdd86c4"], 0x8, r0) r2 = fork() waitid(0x2, r2, &(0x7f00000001c0), 0x8, 0x0) wait4(r2, &(0x7f0000000000), 0x75934899937b15a6, &(0x7f0000000040)) keyctl$KEYCTL_MOVE(0x1e, r1, 0x0, r0, 0x1) 17:09:26 executing program 5: semget(0x2, 0x1, 0x244) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:26 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) keyctl$clear(0x7, 0xfffffffffffffffb) 17:09:26 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) r1 = semget$private(0x0, 0x3, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000040)=""/236) fork() 17:09:26 executing program 1: fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000000)='^+\x99*!@:\'[\\]\xb5/\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, r0, 0x0) 17:09:26 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) r1 = add_key$fscrypt_provisioning(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)={0x2, 0x0, @a}, 0x48, r0) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) keyctl$unlink(0x9, r1, r2) keyctl$search(0xa, r0, &(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, 0xfffffffffffffffb) keyctl$clear(0x7, 0xfffffffffffffffd) 17:09:26 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)={0x1, 0x0, @auto=[0x25, 0x25, 0x2f, 0x35]}, 0xc, 0xfffffffffffffff9) keyctl$reject(0x13, r0, 0xe7, 0x10001, 0x0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) keyctl$unlink(0x9, r1, r2) 17:09:26 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000100)=ANY=[@ANYBLOB="68ad803634bdfa180cd99b9120805fbecc9d2e0fb23e6aaa99590bfe4f5d117fb82c3498345bdd86c4"], 0x8, r0) r1 = fork() waitid(0x2, r1, &(0x7f00000001c0), 0x8, 0x0) wait4(r1, &(0x7f0000000000), 0x75934899937b15a6, &(0x7f0000000040)) 17:09:26 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) keyctl$negate(0xd, r1, 0xac, r0) keyctl$unlink(0x9, 0x0, r0) keyctl$link(0x8, r1, r0) keyctl$reject(0x13, 0x0, 0x8000, 0x8, 0x0) 17:09:26 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00'], 0x8, r1) keyctl$KEYCTL_MOVE(0xb, r2, r0, 0xfffffffffffffff9, 0x0) 17:09:26 executing program 2: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, r0) r1 = request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='b./)\'\x15:]^{}\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000380), &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000400)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)={0x2, 0x0, @b}, 0x48, r1) r2 = add_key$fscrypt_provisioning(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)={0x3, 0x0, @b}, 0x48, r1) r3 = request_key(&(0x7f00000002c0)='asymmetric\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000480)='oy\x7f\xbf\x12\xf7a\x86/\x9bSwC\xb5K8,\xf3LI>B\xfd\xeb)9\xb9wK\x83N\x00\xe5T\xf2Vn\x87\x82\xe5\x8a@${\x95\xd5\x04\xab+\x06\xd8\xfa\x86\x0e\xecQZ\xc3l\x98Z\xb3\xf9\xbb\a.P\x17\xa58F{L\xc2\xedn\x9a_e-I\xf5k\x03\xd8\xcd\x89\x06\"`\x05\xdd\xf2)\x95M\x87Ls\xc2G\xd6\xbd\xb4\xbd$#H\x87\x9c\x1c\x9b\xd0*\xe5\x10X9G\x15\x06W\xfe\x95\xca-\xcd8\xfd\x18\xa3\xa5\x97(u\xe9f\x1a\xc73V\xa8\x12\x97Il\xf9G^\xf0qQ\x80\xc6HGx2z\x9e\x8cX\xadu7\xad\xfbh\xd8Y\xf4\nVN+\x9f\x02\xc5\xac\xfd\xf7\x1d\xae\xa0\v\xb1)\xdd\t:\x96\x91\xd9\xb8<\xcb\xc2\x9e\xbf\xb8\x96A\x7f+\xa9\n\\1|a\xcd\xb0\xa8\x8fSrm\x06\x14\x00)\xd2\xc6-\xa9\x02\xbaL6\x8fC\x8a\x01\x15\xc4\xdd\xbfd\xfa\xd3A\xcf\x85\x14\x15~\xbf\xf7\x9f\x14p~\xd6\v\x9e\xd4\xf8F\x97\x98\xe4\x10b\xb1\x80\xf1b!u\xca\x908\x15\x1e2TB\x84\xe5@\xe4\xc5\xd2\xd4\xe9u\x8f\x8f\x121\x91\x97\xee,\xd1\xf3\xe8\x02]\x8d\x83\x91\f\xcc\xc4\xc1\xe1\x03JN\xa6r\x98\xbdo\xe2\xa7r\xda|>@\xcd\xa8\x92\xbc\x83\xb3\xd56\xf07\x9e\x97\x18hR\xda\xff\xa7/\x8d-\xd9\x1d\xb7\xab\x01E\x1d\xd8\xdc*G\xc6\xd9.]\xe848\x0eR2u\x8cs\xf7h<\xd4\xe1?\x80\xc9\xec\x93\xefF\'J\xe7+\xfa\xd1\xbf\x0e\xaa-k\xd0\\\xc2N\x17\'dA\xa6\xdav\xfb|G \x8d&-\xe5*s\xc5e\x1a\xa6]\x87\x02\xb8\xbc$\xa2\xea\x16\x8f\x94\x83\v\x1fOo\xba\xebv*\xed\xc6X\x1a\xb3\xaf\xac\xc3A \r#\x99\xf6', r1) keyctl$KEYCTL_MOVE(0x1e, r2, 0x0, r3, 0xa573478220676a05) 17:09:26 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) keyctl$link(0x8, r0, r1) 17:09:26 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, &(0x7f0000000240)={{0x8, 0x6}, 'port1\x00', 0x60, 0x20, 0x1, 0x2, 0x6, 0x5, 0x9, 0x0, 0x6, 0x2}) r1 = fork() waitid(0x2, r1, &(0x7f00000001c0), 0x8, 0x0) wait4(r1, &(0x7f0000000040), 0x40000000, &(0x7f0000000080)) semop(r0, &(0x7f0000000380)=[{0x1, 0x7}, {0x6, 0xff4f, 0x1800}, {0x3, 0x8, 0x800}], 0x3) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r2, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r4, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0x38}}, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r5, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r6, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0x38}}, 0x10) sendmsg$NL802154_CMD_NEW_INTERFACE(r2, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0x66, &(0x7f0000000300)={&(0x7f0000000180)={0x1c, r6, 0x300, 0x70bd25, 0x25dfdbfd, {}, [@NL802154_ATTR_IFTYPE={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x0) 17:09:26 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000100)=ANY=[@ANYBLOB="68ad803634bdfa180cd99b9120805fbecc9d2e0fb23e6aaa99590bfe4f5d117fb82c3498345bdd86c4"], 0x8, r0) r1 = fork() waitid(0x2, r1, &(0x7f00000001c0), 0x8, 0x0) 17:09:26 executing program 1: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) keyctl$KEYCTL_MOVE(0xb, r0, r1, r2, 0x0) 17:09:26 executing program 0: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, r0, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, r1, r2, 0x1) 17:09:26 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0x0) keyctl$negate(0xd, r0, 0x7, r0) r1 = request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)='keyring\x00', 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$search(0xa, r0, &(0x7f0000000040)='ceph\x00', &(0x7f0000000200)={'syz', 0x2}, r2) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r3) 17:09:26 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) keyctl$reject(0x13, 0x0, 0x3, 0x5, 0xfffffffffffffff9) r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000200)=ANY=[], 0x48, r0) 17:09:26 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, 0x0) keyctl$get_persistent(0x16, 0xee00, 0x0) keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:26 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000100)=ANY=[@ANYBLOB="68ad803634bdfa180cd99b9120805fbecc9d2e0fb23e6aaa99590bfe4f5d117fb82c3498345bdd86c4"], 0x8, r0) fork() 17:09:26 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14, 0x80000) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000180)=ANY=[@ANYBLOB="06ae4293235489dc567945a30000000000"], 0x8, r3) keyctl$negate(0xd, r2, 0x63e, r3) 17:09:26 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r0) 17:09:26 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:26 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) keyctl$get_persistent(0x16, 0xee00, r2) 17:09:27 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x88000, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB='syztnl1\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) fork() 17:09:27 executing program 0: r0 = request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='syz', 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$fscrypt_provisioning(&(0x7f0000000580), &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)={0x2, 0x0, @d}, 0x18, 0x0) r3 = add_key$keyring(&(0x7f0000000640), &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$reject(0x13, r2, 0xf06c, 0x400, r3) r4 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, r1) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r0) r6 = request_key(&(0x7f0000000440)='trusted\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='trusted\x00', r5) add_key$fscrypt_provisioning(&(0x7f0000000280), &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)={0x2, 0x0, @a}, 0x48, r6) r7 = request_key(&(0x7f00000001c0)='rxrpc\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)='*\x00', r0) keyctl$link(0x8, r7, r0) keyctl$KEYCTL_MOVE(0x3, r0, r5, 0xfffffffffffffff9, 0x0) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r9 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r9) add_key$keyring(&(0x7f0000000500), &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, r9) keyctl$unlink(0x9, 0x0, r8) 17:09:27 executing program 3: add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) fork() 17:09:27 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0xfffffffffffffffd, 0xa573478220676a05) r0 = request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='#*\x00', 0xfffffffffffffffd) r1 = add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)={0x3, 0x0, @a}, 0x48, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$reject(0x13, r1, 0x4, 0x9, r2) keyctl$reject(0x13, r0, 0x9, 0x7, 0xfffffffffffffffc) 17:09:27 executing program 1: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = fsmount(0xffffffffffffffff, 0x0, 0x4) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r3 = fsmount(r2, 0x0, 0xa) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000640), r1) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r3, &(0x7f00000007c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000780)={&(0x7f0000000680)={0xfc, r4, 0x800, 0x70bd2c, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x401}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xffffffff}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x26}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4010}, 0x21082cd285189a34) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, r4, 0x100, 0x70bd29, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0xd}}]}, 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000000)={0x0, 0x0, @b}, 0x48, r0) r5 = fsopen(&(0x7f0000000180)='binfmt_misc\x00', 0x1) fsconfig$FSCONFIG_SET_STRING(r5, 0x1, &(0x7f00000001c0)='devlink\x00', &(0x7f0000000200)='keyring\x00', 0x0) r6 = fsopen(&(0x7f0000000240)='9p\x00', 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) sendmsg$DEVLINK_CMD_SB_GET(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x3c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x1}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20004010}, 0x40) fsconfig$FSCONFIG_SET_FD(r6, 0x5, &(0x7f0000000280)='pci\x00', 0x0, r7) keyctl$KEYCTL_MOVE(0xb, r0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:27 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r1, 0x0, 0x0) sendmsg$IEEE802154_LLSEC_SETPARAMS(r1, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r3, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0x38}}, 0x10) sendmsg$NL802154_CMD_SET_PAN_ID(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r3, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x4040001}, 0xc000) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x400, 0x70bd27, 0x25dfdbfe, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc, 0x2d, {0xaaaaaaaaaaaa0202}}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x80}, @IEEE802154_ATTR_LLSEC_SECLEVEL={0x5, 0x2a, 0x7}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4}, 0x20008041) keyctl$link(0x8, r4, r5) 17:09:27 executing program 3: fork() 17:09:27 executing program 3: fork() 17:09:27 executing program 4: r0 = semget$private(0x0, 0x2, 0xa0) getrusage(0x0, &(0x7f0000000100)) semop(0x0, &(0x7f0000000000)=[{0x1, 0x2, 0x800}, {0x4, 0xbc, 0x1800}, {0x1, 0x9, 0x1000}, {0x1, 0x5}, {0x2, 0x81, 0x1000}, {0x3, 0x14, 0x1000}, {0x4, 0x3, 0x800}, {0x0, 0x0, 0x1000}], 0x8) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() semctl$SEM_STAT(r0, 0x1, 0x12, &(0x7f0000000040)=""/65) semget(0x3, 0x1, 0x202) 17:09:27 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = request_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='\x00', 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r1, 0xffffffffffffffff, r0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$negate(0xd, r1, 0x0, r2) 17:09:27 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f0000000000)={0x80000000, 0x5214, 0x2, {0x0, 0x4}, 0x1, 0x6}) 17:09:27 executing program 2: sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x100, 0x70bd29, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_MAX_CSMA_BACKOFFS={0x5, 0x12, 0xff}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x404c040) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(r0, &(0x7f0000000500)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000c}, 0xc, &(0x7f00000004c0)={&(0x7f00000001c0)={0x2cc, r1, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_SEC_DEVKEY={0x10, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0xaaaaaaaaaaaa0302}}]}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_SEC_DEVKEY={0x120, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_ID={0x64, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x1}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x4}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0xfff}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x8}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0xd535}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x3}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x2c, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0xffff}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x1}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa2}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x1}, @NL802154_DEV_ADDR_ATTR_MODE={0x8}]}]}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0xffffff7f}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x5}, @NL802154_DEVKEY_ATTR_ID={0x88, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x7}, @NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x2}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x4c, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_PAN_ID={0x6}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0102}}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x1}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x1}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x3}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0102}}, @NL802154_DEV_ADDR_ATTR_MODE={0x8}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xfffe}]}, @NL802154_KEY_ID_ATTR_MODE={0x8}, @NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x1}]}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0xaaaaaaaaaaaa0302}}]}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_DEVKEY={0x148, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_ID={0x20, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_IMPLICIT={0x10, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0102}}]}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0xfff}]}, @NL802154_DEVKEY_ATTR_ID={0x88, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_IMPLICIT={0x10, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0102}}]}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x3}, @NL802154_KEY_ID_ATTR_MODE={0x8}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x8000000}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x100000001}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x2}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x30, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x3}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa3}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0xffff}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc}]}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x400}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x3}]}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0xaaaaaaaaaaaa0202}}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x9c73}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0xaaaaaaaaaaaa0102}}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x2}, @NL802154_DEVKEY_ATTR_ID={0x18, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x100}]}, @NL802154_DEVKEY_ATTR_ID={0x44, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_IMPLICIT={0x1c, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x1}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x2}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0xffff}]}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x24, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x3}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x3}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x3}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x3}]}]}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0xaaaaaaaaaaaa0002}}]}]}, 0x2cc}, 0x1, 0x0, 0x0, 0x4012}, 0x8050) 17:09:27 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) r2 = msgget(0x0, 0x248) msgctl$IPC_RMID(r2, 0x0) msgrcv(r2, &(0x7f0000000780)={0x0, ""/4096}, 0x1008, 0x1, 0x3000) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x0, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20008000}, 0x6) 17:09:27 executing program 1: getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000000)=""/2, &(0x7f0000000040)=0x2) keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:27 executing program 3: fork() 17:09:27 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f0000000040)=""/71) 17:09:27 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)=':}+o&\x00', r0) add_key$fscrypt_provisioning(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)={0x1, 0x0, @b}, 0x48, 0xfffffffffffffff8) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:27 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$link(0x8, r0, 0xffffffffffffffff) 17:09:27 executing program 3: add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) fork() 17:09:27 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) semctl$GETZCNT(r0, 0x4, 0xf, &(0x7f0000000080)=""/204) fork() r1 = semget(0x0, 0x1, 0x4) semctl$GETVAL(r1, 0x0, 0xc, &(0x7f0000000040)=""/31) 17:09:27 executing program 0: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)={0x2, 0x0, @a}, 0x48, r0) add_key$fscrypt_provisioning(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)={0x1, 0x0, @d}, 0x18, r0) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) keyctl$KEYCTL_MOVE(0x3, r0, r0, 0xfffffffffffffff8, 0x0) 17:09:27 executing program 1: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000100), 0x8, r0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)={0x2, 0x0, @a}, 0x48, r0) keyctl$KEYCTL_MOVE(0xb, 0x0, r0, 0xfffffffffffffff9, 0x0) r1 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r1) 17:09:27 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, 0x0, r1, r0, 0x1) 17:09:27 executing program 3: add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) fork() 17:09:27 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)=ANY=[@ANYBLOB="050000000000ae000000000000006e6f70"], 0x18, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='keyring\x00', 0xfffffffffffffff8) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) keyctl$KEYCTL_MOVE(0xb, r0, 0x0, 0xfffffffffffffff9, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 17:09:27 executing program 4: semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) r0 = semget$private(0x0, 0x1, 0x400) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:27 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) keyctl$clear(0x7, r1) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r2) 17:09:27 executing program 1: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='{\x00', r0) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000000), 0x8, r2) add_key$keyring(&(0x7f0000000080), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:27 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x3, 0x0, 0xfffffffffffffff9, r0, 0x1) 17:09:27 executing program 5: getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000080), &(0x7f00000000c0)=0x10) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) add_key$fscrypt_provisioning(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)={0x2, 0x0, @b}, 0x48, r0) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) r3 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$negate(0xd, r2, 0x9, r3) 17:09:27 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f0000000000)={'syz', 0x1}, &(0x7f0000000040)=ANY=[@ANYBLOB="00f1720000000000"], 0x8, r0) keyctl$get_persistent(0x16, 0xee00, r0) 17:09:27 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_STAT(r1, 0x3, 0x12, &(0x7f0000000040)=""/4096) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() semop(0x0, &(0x7f0000001040), 0x0) 17:09:27 executing program 3: add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) fork() 17:09:27 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) keyctl$KEYCTL_MOVE(0xb, r1, r0, r0, 0x0) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)=0x0) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) keyctl$get_persistent(0x16, r2, r3) 17:09:27 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)={0x1, 0x0, @d}, 0x18, 0xfffffffffffffffa) keyctl$link(0x8, r0, r1) 17:09:27 executing program 0: request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='keyring\x00', 0xfffffffffffffffb) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000080)=ANY=[@ANYBLOB="00aa66a819e4415e681b5f0c81e1c6"], 0x8, 0x0) keyctl$KEYCTL_MOVE(0x3, r1, r1, 0x0, 0x0) 17:09:27 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) r1 = semget(0x0, 0x2, 0x410) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETALL(r1, 0x0, 0xd, &(0x7f0000000040)=""/135) fork() r2 = semget(0x3, 0x1, 0x14) semctl$GETNCNT(r2, 0x2, 0xe, &(0x7f0000000100)=""/145) 17:09:27 executing program 1: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r0, r0, r0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) r2 = request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='(]\x00', r1) r3 = request_key(&(0x7f00000000c0)='blacklist\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='\x00', r0) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r3, 0x0) keyctl$KEYCTL_MOVE(0xb, r0, r1, 0xfffffffffffffff9, 0x0) 17:09:27 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, &(0x7f0000000000)='ro\x00', 0x0, 0x0) 17:09:27 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:28 executing program 1: r0 = request_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='@{&!,!\'', 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, r0, 0x0) 17:09:28 executing program 3: add_key$keyring(&(0x7f0000000700), 0x0, 0x0, 0x0, 0xfffffffffffffffe) fork() 17:09:28 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) keyctl$unlink(0x9, r0, 0xfffffffffffffffe) 17:09:28 executing program 5: add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) keyctl$link(0x8, r0, r1) 17:09:28 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) keyctl$search(0xa, r1, &(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x1}, r0) keyctl$KEYCTL_MOVE(0x1e, r0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) 17:09:28 executing program 1: r0 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='\x00', 0xfffffffffffffffb) r1 = request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='\x00', r0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) keyctl$KEYCTL_MOVE(0xb, 0x0, r1, r2, 0x1) 17:09:28 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r0, r0, r0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) r2 = request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='(]\x00', r1) r3 = request_key(&(0x7f00000000c0)='blacklist\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='\x00', r0) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r3, 0x0) keyctl$KEYCTL_MOVE(0xb, r0, r1, 0xfffffffffffffff9, 0x0) 17:09:28 executing program 0: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900)=ANY=[@ANYBLOB="0000000000000010"], 0x8, r0) keyctl$KEYCTL_MOVE(0x3, 0x0, r0, 0xfffffffffffffffd, 0x0) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) request_key(&(0x7f0000000180)='cifs.spnego\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='syz', r2) keyctl$search(0xa, r1, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, r0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r3, 0x1) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r2) 17:09:28 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) r1 = fork() semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) r2 = fork() r3 = semget(0x0, 0x1, 0x1a) r4 = fsmount(0xffffffffffffffff, 0x0, 0x4) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r6 = fsmount(r5, 0x0, 0xa) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000640), r4) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r6, &(0x7f00000007c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000780)={&(0x7f0000000680)={0xfc, r7, 0x800, 0x70bd2c, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x401}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xffffffff}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x26}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4010}, 0x21082cd285189a34) r8 = syz_open_procfs$namespace(r1, &(0x7f0000000140)='ns/mnt\x00') r9 = getpid() r10 = syz_open_procfs$namespace(r2, &(0x7f0000000180)='ns/net\x00') r11 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r11, 0x0, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x124, r7, 0x100, 0x70bd29, 0x25dfdbfb, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r9}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r10}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r2}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r11}}]}, 0x124}, 0x1, 0x0, 0x0, 0x40084}, 0x405c0c4) semctl$SEM_STAT_ANY(r3, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$IPC_INFO(r3, 0x3, 0x3, &(0x7f0000000040)=""/12) 17:09:28 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff9, 0xa573478220676a05) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r1, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0x38}}, 0x10) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8100}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, r1, 0x421, 0x70bd27, 0x25dfdbfe, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x2040}, 0x80) 17:09:28 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) getresuid(&(0x7f0000000080)=0x0, &(0x7f00000000c0), &(0x7f0000000100)) keyctl$get_persistent(0x16, r2, r0) 17:09:28 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) add_key$fscrypt_provisioning(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)=ANY=[@ANYBLOB="02000000000000007c07000000000000696a6b6c6d6e6f70"], 0x18, r0) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r1) 17:09:28 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r0, r0, r0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) r2 = request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='(]\x00', r1) r3 = request_key(&(0x7f00000000c0)='blacklist\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='\x00', r0) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r3, 0x0) keyctl$KEYCTL_MOVE(0xb, r0, r1, 0xfffffffffffffff9, 0x0) 17:09:28 executing program 0: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x3, 0x0, r1, 0xfffffffffffffffb, 0x0) 17:09:28 executing program 2: r0 = request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='syz', 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$fscrypt_provisioning(&(0x7f0000000580), &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)={0x2, 0x0, @d}, 0x18, 0x0) r3 = add_key$keyring(&(0x7f0000000640), &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$reject(0x13, r2, 0xf06c, 0x400, r3) r4 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, r1) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r0) r6 = request_key(&(0x7f0000000440)='trusted\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='trusted\x00', r5) add_key$fscrypt_provisioning(&(0x7f0000000280), &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)={0x2, 0x0, @a}, 0x48, r6) r7 = request_key(&(0x7f00000001c0)='rxrpc\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)='*\x00', r0) keyctl$link(0x8, r7, r0) keyctl$KEYCTL_MOVE(0x3, r0, r5, 0xfffffffffffffff9, 0x0) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r9 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r9) add_key$keyring(&(0x7f0000000500), &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, r9) keyctl$unlink(0x9, 0x0, r8) 17:09:28 executing program 5: semget(0x3, 0x2, 0x480) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, r0) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) add_key$fscrypt_provisioning(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)={0x1, 0x0, @b}, 0x48, r3) keyctl$link(0x8, 0x0, r2) keyctl$clear(0x7, r0) 17:09:28 executing program 1: r0 = request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='#\'-)\x88\x00', 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, r0, 0x1) 17:09:28 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r1, 0x0, 0x0) r2 = request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='pci\x00', r0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$reject(0x13, r2, 0x20, 0x1, r3) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x84, r4, 0x2, 0x70bd28, 0x25dfdbfb, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8}, {0x11}}, {0x8}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}}]}, 0x84}, 0x1, 0x0, 0x0, 0x4000800}, 0x8040) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, r0, 0x1) 17:09:28 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semctl$SETVAL(r0, 0x4, 0x10, &(0x7f0000000040)=0x1) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:28 executing program 2: r0 = request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='syz', 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$fscrypt_provisioning(&(0x7f0000000580), &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)={0x2, 0x0, @d}, 0x18, 0x0) r3 = add_key$keyring(&(0x7f0000000640), &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$reject(0x13, r2, 0xf06c, 0x400, r3) r4 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, r1) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r0) r6 = request_key(&(0x7f0000000440)='trusted\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='trusted\x00', r5) add_key$fscrypt_provisioning(&(0x7f0000000280), &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)={0x2, 0x0, @a}, 0x48, r6) r7 = request_key(&(0x7f00000001c0)='rxrpc\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)='*\x00', r0) keyctl$link(0x8, r7, r0) keyctl$KEYCTL_MOVE(0x3, r0, r5, 0xfffffffffffffff9, 0x0) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r9 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r9) add_key$keyring(&(0x7f0000000500), &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, r9) keyctl$unlink(0x9, 0x0, r8) 17:09:28 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r0, r0, r0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) r2 = request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='(]\x00', r1) r3 = request_key(&(0x7f00000000c0)='blacklist\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='\x00', r0) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r3, 0x0) keyctl$KEYCTL_MOVE(0xb, r0, r1, 0xfffffffffffffff9, 0x0) 17:09:28 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) r3 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, r0) request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)='fscrypt-provisioning\x00', r3) r4 = add_key$keyring(&(0x7f0000000400), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$keyring(&(0x7f0000000380), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$negate(0xd, 0x0, 0x40, r5) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) r6 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) r7 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)={0x0, 0x0, @a}, 0x48, r7) r8 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r8) keyctl$unlink(0x9, r7, r8) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_MOVE(0x1e, r2, r4, r6, 0x0) keyctl$link(0x8, r0, r1) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r2) 17:09:28 executing program 2: r0 = request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='syz', 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$fscrypt_provisioning(&(0x7f0000000580), &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)={0x2, 0x0, @d}, 0x18, 0x0) r3 = add_key$keyring(&(0x7f0000000640), &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$reject(0x13, r2, 0xf06c, 0x400, r3) r4 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, r1) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r0) r6 = request_key(&(0x7f0000000440)='trusted\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='trusted\x00', r5) add_key$fscrypt_provisioning(&(0x7f0000000280), &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)={0x2, 0x0, @a}, 0x48, r6) r7 = request_key(&(0x7f00000001c0)='rxrpc\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)='*\x00', r0) keyctl$link(0x8, r7, r0) keyctl$KEYCTL_MOVE(0x3, r0, r5, 0xfffffffffffffff9, 0x0) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r9 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r9) add_key$keyring(&(0x7f0000000500), &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, r9) keyctl$unlink(0x9, 0x0, r8) 17:09:28 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() fork() 17:09:28 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)={0x3, 0x0, @a}, 0x48, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r2) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r0) r5 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900)=ANY=[@ANYBLOB="0000000000000010"], 0x8, r5) request_key(&(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='\x00', r5) keyctl$link(0x8, r4, r1) 17:09:28 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) msgget(0x3, 0x60) 17:09:28 executing program 2: r0 = request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='syz', 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$fscrypt_provisioning(&(0x7f0000000580), &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)={0x2, 0x0, @d}, 0x18, 0x0) r3 = add_key$keyring(&(0x7f0000000640), &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$reject(0x13, r2, 0xf06c, 0x400, r3) r4 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, r1) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r0) r6 = request_key(&(0x7f0000000440)='trusted\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='trusted\x00', r5) add_key$fscrypt_provisioning(&(0x7f0000000280), &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)={0x2, 0x0, @a}, 0x48, r6) r7 = request_key(&(0x7f00000001c0)='rxrpc\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)='*\x00', r0) keyctl$link(0x8, r7, r0) keyctl$KEYCTL_MOVE(0x3, r0, r5, 0xfffffffffffffff9, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r8) add_key$keyring(&(0x7f0000000500), &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, r8) 17:09:28 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)={0x1, 0x0, @auto=[0x16, 0x10, 0x24, 0x15, 0x29]}, 0xd, 0xfffffffffffffff9) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r5, 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST(r5, 0x40383d03, &(0x7f0000000240)={{0x10001, 0x1}, {0x7f, 0x4}, 0x2, 0x1}) keyctl$unlink(0x9, r3, r4) keyctl$search(0xa, r2, &(0x7f0000000100)='id_legacy\x00', &(0x7f00000001c0)={'syz', 0x2}, r1) 17:09:28 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) bind$packet(r0, &(0x7f0000000200)={0x11, 0x7, 0x0, 0x1, 0x7, 0x6, @remote}, 0x14) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900)=ANY=[@ANYBLOB="154fc17f00130000"], 0x8, r1) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x1, 0x0, @b}, 0x48, 0x0) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$KEYCTL_MOVE(0xb, r1, r3, r2, 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) 17:09:28 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r0, r0, r0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) r2 = request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='(]\x00', r1) r3 = request_key(&(0x7f00000000c0)='blacklist\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='\x00', r0) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r3, 0x0) 17:09:28 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = semget(0x3, 0x2, 0x30) semctl$GETALL(r1, 0x0, 0xd, &(0x7f0000000080)=""/13) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r2) 17:09:28 executing program 2: r0 = request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='syz', 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$fscrypt_provisioning(&(0x7f0000000580), &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)={0x2, 0x0, @d}, 0x18, 0x0) r3 = add_key$keyring(&(0x7f0000000640), &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$reject(0x13, r2, 0xf06c, 0x400, r3) r4 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, r1) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r0) r6 = request_key(&(0x7f0000000440)='trusted\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='trusted\x00', r5) add_key$fscrypt_provisioning(&(0x7f0000000280), &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)={0x2, 0x0, @a}, 0x48, r6) r7 = request_key(&(0x7f00000001c0)='rxrpc\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)='*\x00', r0) keyctl$link(0x8, r7, r0) keyctl$KEYCTL_MOVE(0x3, r0, r5, 0xfffffffffffffff9, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r8) 17:09:28 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) keyctl$negate(0xd, 0x0, 0xfffffffffffffff9, 0xfffffffffffffffc) 17:09:28 executing program 1: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan1\x00'}) sendmsg$NL802154_CMD_DEL_SEC_KEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x140, 0x0, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@NL802154_ATTR_SEC_KEY={0x12c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x58, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_IMPLICIT={0x30, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0xffff}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa3}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x3}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0002}}]}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x3}, @NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x2}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x2}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "99bff6c33bdb80eb7b07b44ae5f04184"}, @NL802154_KEY_ATTR_ID={0xac, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x3dc}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x14, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x3}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x3}]}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x1}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x1}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x5db6eca3}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x54, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa2}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xfffe}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x1}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0302}}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa1}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0202}}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x1}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x2}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa0}]}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0xa2}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x8001}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x2}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}]}]}, 0x140}, 0x1, 0x0, 0x0, 0x40000}, 0x800) keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:28 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r0, r0, r0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='(]\x00', r1) request_key(&(0x7f00000000c0)='blacklist\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='\x00', r0) 17:09:28 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{0x3, 0x1, 0x1000}, {0x4, 0x78, 0x1800}, {0x4, 0x5, 0x400}], 0x3) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:28 executing program 5: getrusage(0x0, &(0x7f0000000080)) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r1, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x0, &(0x7f0000000140)='posixacl\x00', 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r2) 17:09:28 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) clock_nanosleep(0x1, 0x0, &(0x7f0000000000), &(0x7f0000000040)) r0 = request_key(&(0x7f00000001c0)='blacklist\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='*\x00', 0xfffffffffffffffe) keyctl$search(0xa, 0x0, &(0x7f0000000080)='rxrpc_s\x00', &(0x7f00000000c0)={'syz', 0x3}, r0) 17:09:28 executing program 1: r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000080)={0x2}, 0x8, 0xfffffffffffffff9) r1 = add_key$fscrypt_provisioning(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)={0x2, 0x0, @auto=[0x1f, 0x3b, 0x16]}, 0xb, 0xfffffffffffffffc) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, 0x0) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) keyctl$unlink(0x9, r2, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r1, 0x0, r3, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r4, 0x0, 0x0) semctl$IPC_RMID(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r4, 0xc0105303, &(0x7f00000000c0)={0xbf, 0x3f, 0x80}) keyctl$KEYCTL_MOVE(0xb, r0, 0xfffffffffffffff9, 0xfffffffffffffff9, 0x0) 17:09:28 executing program 2: r0 = request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='syz', 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$fscrypt_provisioning(&(0x7f0000000580), &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)={0x2, 0x0, @d}, 0x18, 0x0) r3 = add_key$keyring(&(0x7f0000000640), &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$reject(0x13, r2, 0xf06c, 0x400, r3) r4 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, r1) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r0) r6 = request_key(&(0x7f0000000440)='trusted\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='trusted\x00', r5) add_key$fscrypt_provisioning(&(0x7f0000000280), &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)={0x2, 0x0, @a}, 0x48, r6) r7 = request_key(&(0x7f00000001c0)='rxrpc\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)='*\x00', r0) keyctl$link(0x8, r7, r0) keyctl$KEYCTL_MOVE(0x3, r0, r5, 0xfffffffffffffff9, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 17:09:28 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r0, r0, r0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='(]\x00', r1) 17:09:28 executing program 0: setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)="05a43571557d76032f1decdea3ab192b6b070d473fe0b41a36982f59f9a68dbb5c8968fd6cd2a2fa1ab9c34e6361e471008e996b4c4022dbf1dce92f83a4de4dd0cb4e3f0d05cf9e5a4011a47f80892d588d522b1248cf02060036d53e1349cd", 0x60) keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:28 executing program 2: r0 = request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='syz', 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$fscrypt_provisioning(&(0x7f0000000580), &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)={0x2, 0x0, @d}, 0x18, 0x0) r3 = add_key$keyring(&(0x7f0000000640), &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$reject(0x13, r2, 0xf06c, 0x400, r3) r4 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, r1) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r0) r6 = request_key(&(0x7f0000000440)='trusted\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='trusted\x00', r5) add_key$fscrypt_provisioning(&(0x7f0000000280), &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)={0x2, 0x0, @a}, 0x48, r6) r7 = request_key(&(0x7f00000001c0)='rxrpc\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)='*\x00', r0) keyctl$link(0x8, r7, r0) keyctl$KEYCTL_MOVE(0x3, r0, r5, 0xfffffffffffffff9, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 17:09:28 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) keyctl$reject(0x13, r1, 0x3, 0xfff, r2) 17:09:28 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0xfffffffffffffff9, 0xfffffffffffffff9, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffff8, 0x0) 17:09:28 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() r1 = semget(0x0, 0x1, 0x2) getpid() semctl$SETVAL(r1, 0x4, 0x10, &(0x7f0000000040)=0x8000) 17:09:28 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) keyctl$reject(0x13, r0, 0x2, 0x1, 0xfffffffffffffffd) 17:09:28 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r0, r0, r0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) 17:09:28 executing program 2: r0 = request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='syz', 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$fscrypt_provisioning(&(0x7f0000000580), &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)={0x2, 0x0, @d}, 0x18, 0x0) r3 = add_key$keyring(&(0x7f0000000640), &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$reject(0x13, r2, 0xf06c, 0x400, r3) r4 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, r1) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r0) r6 = request_key(&(0x7f0000000440)='trusted\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='trusted\x00', r5) add_key$fscrypt_provisioning(&(0x7f0000000280), &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)={0x2, 0x0, @a}, 0x48, r6) r7 = request_key(&(0x7f00000001c0)='rxrpc\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)='*\x00', r0) keyctl$link(0x8, r7, r0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 17:09:28 executing program 5: sysfs$1(0x1, &(0x7f0000000080)='&(+,#@)&:\x00') r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r2, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_GET(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x100, 0x70bd27, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0x1c}}]}, 0x4c}}, 0x2404c000) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_SET_PAN_ID(r3, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x50, 0x0, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_PAN_ID={0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x80) keyctl$link(0x8, r0, r1) 17:09:28 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) keyctl$search(0xa, r0, &(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x0}, 0xfffffffffffffff8) 17:09:28 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r0, r0, r0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 17:09:28 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) socket$inet_udplite(0x2, 0x2, 0x88) keyctl$link(0x8, r0, 0xfffffffffffffffa) 17:09:28 executing program 2: r0 = request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='syz', 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$fscrypt_provisioning(&(0x7f0000000580), &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)={0x2, 0x0, @d}, 0x18, 0x0) r3 = add_key$keyring(&(0x7f0000000640), &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$reject(0x13, r2, 0xf06c, 0x400, r3) r4 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, r1) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r0) r6 = request_key(&(0x7f0000000440)='trusted\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='trusted\x00', r5) add_key$fscrypt_provisioning(&(0x7f0000000280), &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)={0x2, 0x0, @a}, 0x48, r6) request_key(&(0x7f00000001c0)='rxrpc\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)='*\x00', r0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 17:09:28 executing program 0: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:28 executing program 4: r0 = semget$private(0x0, 0x4, 0x8) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) semctl$GETZCNT(r0, 0x0, 0xf, &(0x7f0000000040)=""/189) fork() 17:09:28 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f00000002c0)='big_key\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)='abcdefghijklmnopqrstuvwxyz0123456', r0) keyctl$KEYCTL_MOVE(0x1e, r0, r1, r0, 0x1) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r2) r4 = add_key$keyring(&(0x7f0000000380), &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$link(0x8, 0x0, r4) r5 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r5) keyctl$search(0xa, r3, &(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, r5) r6 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000000000000616263646566767778797a30313233343536"], 0x29, r0) r7 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r2) keyctl$link(0x8, r6, r7) keyctl$link(0x8, r0, r2) 17:09:28 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r0, r0, r0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) 17:09:28 executing program 1: r0 = request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='[${:+\x00', 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) r2 = request_key(&(0x7f0000000240)='id_legacy\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='syz', r0) keyctl$KEYCTL_MOVE(0xb, r1, r2, r0, 0x0) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900)=ANY=[@ANYBLOB="080000008b000000"], 0x8, r3) keyctl$negate(0xd, r3, 0x7, r0) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, r4) r5 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r5) r6 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r6) keyctl$search(0xa, r5, &(0x7f00000001c0)='syzkaller\x00', &(0x7f0000000200)={'syz', 0x0}, r6) 17:09:28 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000040)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_DEV(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000428bd7000fcdbdf251b00000008000300", @ANYRES32=0x0, @ANYBLOB="0000003198675615dfbeee0000000000", @ANYRES32=r2, @ANYBLOB="100023800c0004000200aaaaaaaaaaaa0c0006000100000001000000"], 0x4c}, 0x1, 0x0, 0x0, 0x40080}, 0x20004804) keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_IFACE(r3, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, 0x0, 0x2, 0x70bd26, 0x25dfdbfe, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x2c000080) 17:09:28 executing program 2: r0 = request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='syz', 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$fscrypt_provisioning(&(0x7f0000000580), &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)={0x2, 0x0, @d}, 0x18, 0x0) r3 = add_key$keyring(&(0x7f0000000640), &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$reject(0x13, r2, 0xf06c, 0x400, r3) r4 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, r1) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r0) r6 = request_key(&(0x7f0000000440)='trusted\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='trusted\x00', r5) add_key$fscrypt_provisioning(&(0x7f0000000280), &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)={0x2, 0x0, @a}, 0x48, r6) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 17:09:29 executing program 4: keyctl$reject(0x13, 0x0, 0xe3d2, 0x3, 0xffffffffffffffff) r0 = semget$private(0x0, 0x4, 0x0) semctl$SETVAL(r0, 0x4, 0x10, &(0x7f0000000100)=0x1) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semop(r1, &(0x7f0000000040)=[{0x4}, {0x3, 0x400, 0x1800}, {0x0, 0x7ff, 0x800}, {0x4, 0x100, 0x3000}, {0x2, 0xfff7, 0x1000}], 0x5) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)=[0x8001, 0xb48, 0x0]) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900)=ANY=[@ANYBLOB="00000000f4cd0000"], 0x8, r2) keyctl$unlink(0x9, 0x0, r2) fork() 17:09:29 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="10002cbd7000fbdbdf25110000000c00060002000000000000000500120004000000080003008a57eb9c83f8b757b8ba0d9a814f1ffc80b693e3403407a62a2d894ec0ba48222bfacb9ae26f46b0f15ddd1c2760524457bfa8957853ef13662b398dfe6eaa27a9631ff1f1628341c6b737d0c8cfda284f4fb1c7cb8433fefb06f69e04d096c1dcd826472239a9298b26f711bc82f296d21d641255741ce444f88d0ae86b88eed6085e0d6c0cf511a77bd04e476c521283948f407787623d2ae9b877895298840ecf5d89b5e25267ce5a939f9625660a1efd", @ANYRES32=0x0, @ANYBLOB="0c000600010000000100000008000300", @ANYRES32=0x0, @ANYBLOB], 0x44}, 0x1, 0x0, 0x0, 0x4040004}, 0x0) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffc) 17:09:29 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)={0x5, 0x0, @a}, 0x48, r1) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r2) 17:09:29 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r0, r0, r0, 0x0) 17:09:29 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f00000000c0)=ANY=[@ANYBLOB="00f9369aa600001064b69c8958c6aca8f7a1ece997239e9f55bbdcc2dcbd5633ae8c20854e98573302399d426b206bd97ff6d0f93b56e8b38487c22f50e6205029c2ea4754c121897b6029fecd78f548d6e1c89c01b37da3cf72595c538d488bbf548b05ff651b009063bf13d3f923de404fc9be949fc06dbd993dcd5b49c833457dc08426096ac3bddd48b0197e0d256b41e390c7e8c978059ac71c96352b7e6f141c06d910f35915b3467e60b1dcf465ee7f43945c9074a4d547cad59a1c7234fc3700000000000000"], 0x8, r0) r1 = request_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='^(\x00', 0xfffffffffffffffc) keyctl$negate(0xd, r0, 0x9, r1) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) 17:09:29 executing program 2: r0 = request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='syz', 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$fscrypt_provisioning(&(0x7f0000000580), &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)={0x2, 0x0, @d}, 0x18, 0x0) r3 = add_key$keyring(&(0x7f0000000640), &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$reject(0x13, r2, 0xf06c, 0x400, r3) r4 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, r1) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r0) request_key(&(0x7f0000000440)='trusted\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='trusted\x00', r5) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 17:09:29 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) r1 = semget(0x2, 0x3, 0x1) semtimedop(r1, &(0x7f00000000c0)=[{0x0, 0x1000, 0x800}, {0x1, 0x4813, 0x1000}, {0x2, 0xc00, 0x800}, {0x0, 0x200}, {0x4, 0x2, 0x1800}, {0x0, 0x2, 0x2800}], 0x6, &(0x7f0000000100)={0x77359400}) fork() r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r3 = fsmount(r2, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000040)) 17:09:29 executing program 5: sendmsg$NL802154_CMD_GET_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x0, 0x400, 0x70bd28, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:29 executing program 3: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) 17:09:29 executing program 1: waitid(0x0, 0x0, &(0x7f0000000000), 0x1, &(0x7f0000000140)) getrusage(0xffffffffffffffff, &(0x7f0000000080)) keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:29 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) keyctl$reject(0x13, 0x0, 0x1ff, 0x1b, 0xfffffffffffffffa) 17:09:29 executing program 2: r0 = request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='syz', 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$fscrypt_provisioning(&(0x7f0000000580), &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)={0x2, 0x0, @d}, 0x18, 0x0) r3 = add_key$keyring(&(0x7f0000000640), &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$reject(0x13, r2, 0xf06c, 0x400, r3) r4 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, r1) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 17:09:29 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semctl$SEM_INFO(r0, 0x4, 0x13, &(0x7f0000000040)=""/100) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semop(r0, &(0x7f00000000c0)=[{0x2, 0xfffb, 0x1800}, {0x2, 0x40, 0x800}, {0x1, 0x2, 0x1eb36b5565acab9a}, {0x0, 0x3, 0x1400}, {0x4, 0x9}], 0x5) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:29 executing program 3: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) 17:09:29 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x480) 17:09:29 executing program 2: r0 = request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='syz', 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$fscrypt_provisioning(&(0x7f0000000580), &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)={0x2, 0x0, @d}, 0x18, 0x0) r3 = add_key$keyring(&(0x7f0000000640), &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$reject(0x13, r2, 0xf06c, 0x400, r3) r4 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, r1) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 17:09:29 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='*\x00', 0xfffffffffffffffe) r1 = request_key(&(0x7f00000000c0)='logon\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='.&%:]/\x00', r0) r2 = request_key(&(0x7f0000000180)='blacklist\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)='syz', r0) keyctl$KEYCTL_MOVE(0x1e, r1, r2, r0, 0x1) keyctl$unlink(0x9, 0x0, r0) 17:09:29 executing program 1: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f0000000000)={0x3, 0x80000000, 0x7, {0x800}, 0xffffffff, 0x1000100}) keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:29 executing program 3: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) 17:09:29 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) r2 = socket(0x1, 0x3, 0x9) syz_genetlink_get_family_id$smc(&(0x7f0000000080), r2) 17:09:29 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='%.#()&\x00', 0xfffffffffffffffa) 17:09:29 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) semtimedop(r0, &(0x7f0000000040)=[{0x2, 0xc373, 0x3c00}, {0x0, 0xaaf, 0x1000}], 0x2, &(0x7f0000000080)={0x77359400}) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{}, "ae52da4e42f98589", "eaac2a816f0c081906f905ffd48ad87668d7ab29672b45bd191d3e20082e252e", "3c070269", "78bec1a97ff64218"}, 0x38) fork() 17:09:29 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r0, r0, r0, 0x0) 17:09:29 executing program 2: r0 = request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='syz', 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$fscrypt_provisioning(&(0x7f0000000580), &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)={0x2, 0x0, @d}, 0x18, 0x0) r3 = add_key$keyring(&(0x7f0000000640), &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$reject(0x13, r2, 0xf06c, 0x400, r3) add_key$keyring(&(0x7f0000000340), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 17:09:29 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) keyctl$negate(0xd, 0x0, 0x1, r0) 17:09:29 executing program 1: timerfd_create(0x9, 0x80000) keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:29 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x300200, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0), 0x4800, 0x0) fsmount(r2, 0x0, 0x2) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r3) accept4$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x3, 0x80000) 17:09:29 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r0, r0, r0, 0x0) 17:09:29 executing program 2: r0 = request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='syz', 0xffffffffffffffff) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$fscrypt_provisioning(&(0x7f0000000580), &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)={0x2, 0x0, @d}, 0x18, 0x0) r2 = add_key$keyring(&(0x7f0000000640), &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$reject(0x13, r1, 0xf06c, 0x400, r2) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 17:09:29 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) r1 = semget(0x2, 0x1, 0xbb) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000580)=""/77) semctl$GETNCNT(r1, 0x2, 0xe, &(0x7f0000000600)) semop(0x0, &(0x7f0000000000)=[{0x4, 0x0, 0x1400}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) r2 = semget$private(0x0, 0x1, 0x0) semctl$IPC_RMID(r2, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) semtimedop(r0, &(0x7f0000000040)=[{0x1, 0xe5}, {0x1, 0x4, 0x1800}], 0x2, &(0x7f00000000c0)={r3, r4+10000000}) clock_nanosleep(0x0, 0x1, &(0x7f00000002c0)={0x77359400}, &(0x7f0000000300)) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f00000006c0)=""/159) fork() r5 = semget(0x0, 0x1, 0x1a) waitid(0x1, 0x0, &(0x7f00000003c0), 0x40000005, &(0x7f0000000600)) semctl$SEM_STAT_ANY(r5, 0x3, 0x14, &(0x7f0000000080)=""/83) r6 = semget(0x1, 0x4, 0x15) semctl$GETVAL(r6, 0x4, 0xc, &(0x7f0000000480)=""/246) semctl$IPC_INFO(r5, 0x1, 0x3, &(0x7f0000000100)=""/205) 17:09:29 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r0, r0, r0, 0x0) 17:09:29 executing program 2: r0 = request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='syz', 0xffffffffffffffff) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000580), &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)={0x2, 0x0, @d}, 0x18, 0x0) add_key$keyring(&(0x7f0000000640), &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 17:09:29 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_MOVE(0xb, 0x0, r0, 0xfffffffffffffff9, 0x0) 17:09:29 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) keyctl$unlink(0x9, r0, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 17:09:29 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r0, r0, r0, 0x0) 17:09:29 executing program 2: request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='syz', 0xffffffffffffffff) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000580), &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)={0x2, 0x0, @d}, 0x18, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 17:09:29 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$search(0xa, r0, &(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x3}, 0xfffffffffffffffa) 17:09:29 executing program 0: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x34, r0, 0xfe, 0x70bd28, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x3b}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0x0, 0x6, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x4040090}, 0x4000000) keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r3, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000280)={'wpan3\x00'}) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000002c0)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r3, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)={0x68, 0x0, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_ACKREQ_DEFAULT={0x5}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_ACKREQ_DEFAULT={0x5}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000000}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_ACKREQ_DEFAULT={0x5, 0x1a, 0x1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_ACKREQ_DEFAULT={0x5}]}, 0x68}}, 0x1040) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r5, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0x38}}, 0x10) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r5, @ANYBLOB="20002abd7000fcdbdf25350000000c0022800800020001000000"], 0x20}, 0x1, 0x0, 0x0, 0x20040000}, 0x44) 17:09:29 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r0, r0, r0, 0x0) 17:09:29 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f00000000c0)={{0xfd, 0xe3}, 'port0\x00', 0x10, 0x70010, 0x6, 0x6, 0x3, 0x3, 0x2, 0x0, 0x4, 0x3c}) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$link(0x8, r1, r2) 17:09:29 executing program 2: request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='syz', 0xffffffffffffffff) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 17:09:30 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) semctl$IPC_RMID(r0, 0x0, 0x0) fork() 17:09:30 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x642401, 0x0) fsmount(r0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000000)={0x80000001, 0x70, 0xbe9b7b3e, {0x2, 0x10001}, 0x9c, 0x6}) 17:09:30 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getresuid(&(0x7f0000000080)=0x0, &(0x7f00000000c0), &(0x7f0000000100)) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000140)=ANY=[@ANYBLOB="cabebc46ec9ca1cc9dada34506727bc1c4a6921518a39a2c859800000000000000559d844287af472e000000000000000187ca14330b546d139f066ea4a20398e632cd70d228b5e1afe2afc4f12aa7b6ef5fd72d4678d6682f43526a57e9f2a3414b576fe1c10e"], 0x8, r2) keyctl$get_persistent(0x16, r1, r2) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) alarm(0x4) keyctl$link(0x8, r0, r3) 17:09:30 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r0, r0, r0, 0x0) 17:09:30 executing program 2: request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='syz', 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 17:09:30 executing program 0: r0 = request_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='![!}\x00', 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x3, r0, r0, 0xfffffffffffffff9, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$clear(0x7, r1) 17:09:30 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:30 executing program 2: request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='syz', 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 17:09:30 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x0) 17:09:30 executing program 0: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='fscrypt-provisioning\x00', r0) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900)=ANY=[@ANYBLOB="000000000000f500"], 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='\x00', r2) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) keyctl$KEYCTL_MOVE(0x3, r0, 0x0, r1, 0x0) 17:09:30 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="00022dbd7000fddbdf251300000008000300884c7ae0174d8bf37092a9831f84fa074cf47eabcca6728bc1f09bbcc55be1cc7d1ee981fec1157ad30fa82201dc372ca4be192c33129752c9dac685a6df13a93fd9484500549a0b8ce77d1475d8fb33ac515f1615a4dae23b82edb4f8fd807ca1f404a1fb8edae1c9d00e962d00000000", @ANYRES32=0x0, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0xc890}, 0x20040001) keyctl$link(0x8, r0, 0xfffffffffffffffe) 17:09:30 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semctl$SETVAL(r0, 0x1, 0x10, &(0x7f0000000100)=0x1ff) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) semctl$SEM_STAT(r0, 0x1, 0x12, &(0x7f0000000040)=""/154) fork() 17:09:30 executing program 2: request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='syz', 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 17:09:30 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000180)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='-\x00', r0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000080)={0x5, 0x20, 0x3}) r2 = request_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)='@\'.$.\'^%\x00', r1) keyctl$link(0x8, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r3) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, r3) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000240)=ANY=[@ANYBLOB="0700000fb5a07900c44ecd353a8af1973c4dd29f49f58f413026176cb485cfc7d8a97e6e6c1637f805a769df9e349b4be099edc8a539ab175566a7c8ffff8d7f37d20694dd67639a760671a79e4477f2bd1107e7de70217225cc2941ed484578795cc016bc05c3bbda182c734a76f0e87187f8a4c1afd7cd9e16c3b90c88d27731cc2c1844e3efbf98695a72d5cc322fcc6a8cbc45651762b2b298a207c1515a4b11a86926ae304a8a60e398a74b133ed19a1b2ac682599adeb78359a49676ae778fdcdc1fb88dc5416aa55a6138c4c0d012f69874ceb0b862943511327127"], 0x8, r5) keyctl$reject(0x13, 0x0, 0x4, 0x2, r4) 17:09:30 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x4800, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0x650001, 0x0) r2 = fsmount(r1, 0x0, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000140)='THAWED\x00', 0x7) fsmount(r0, 0x0, 0x0) clock_nanosleep(0x3, 0x1, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000300)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f00000001c0)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000000000)) r3 = request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='\x00', 0xffffffffffffffff) fsmount(r1, 0x1, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000340)) keyctl$KEYCTL_MOVE(0x3, 0x0, r3, 0xfffffffffffffffc, 0x0) 17:09:30 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x0) 17:09:30 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semctl$GETZCNT(r0, 0x2, 0xf, &(0x7f0000000080)=""/23) semop(r0, &(0x7f0000000040)=[{0x3, 0xfffd, 0x1800}, {0x5, 0x342, 0x1800}], 0x2) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000000)=""/4) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:30 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$link(0x8, r2, r0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r3, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000180)={{0x8, 0x1}, 'port1\x00', 0x4, 0x81004, 0x6, 0xffff, 0x400, 0x78, 0x9}) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000240), 0x20000) 17:09:30 executing program 2: add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 17:09:30 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x0) 17:09:30 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff8, 0x1) 17:09:30 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:30 executing program 2: add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 17:09:30 executing program 1: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x0018'], 0xa, r0) keyctl$unlink(0x9, r1, r0) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)={0x3, 0x0, @d}, 0x18, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:30 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r0, 0x0, r0, 0x0) 17:09:30 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900)=ANY=[@ANYBLOB="000000e67a08f700"], 0x8, r1) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r0, r1, r2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'ip_vti0\x00', &(0x7f00000001c0)={'tunl0\x00', 0x0, 0x7, 0x80, 0xffffffff, 0x1, {{0x5, 0x4, 0x1, 0x4, 0x14, 0x65, 0x0, 0x20, 0x2f, 0x0, @local, @dev={0xac, 0x14, 0x14, 0x1b}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000002c0)={'erspan0\x00', &(0x7f0000000240)={'syztnl0\x00', r3, 0x80, 0x7, 0x4, 0x58, {{0xc, 0x4, 0x0, 0x6, 0x30, 0x65, 0x0, 0x7f, 0x29, 0x0, @loopback, @empty, {[@lsrr={0x83, 0x13, 0xb6, [@remote, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010101]}, @ssrr={0x89, 0x7, 0xf2, [@rand_addr=0x64010101]}]}}}}}) r4 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$reject(0x13, r1, 0x1, 0x7fffffff, r2) keyctl$negate(0xd, r0, 0x80, r4) r5 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r6 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, r5) r7 = add_key$keyring(&(0x7f0000000380), &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$unlink(0x9, r6, r7) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r5) r8 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r8) keyctl$KEYCTL_MOVE(0x1e, r0, r5, r8, 0x1) 17:09:30 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semctl$SEM_STAT_ANY(r0, 0x2, 0x14, &(0x7f0000000040)=""/251) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:30 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r2) keyctl$link(0x8, r0, r1) 17:09:30 executing program 2: add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 17:09:30 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r0, 0x0, r0, 0x0) 17:09:30 executing program 1: write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)={[{0x2b, 'memory'}, {0x7d, 'pids'}, {0x2b, 'cpu'}, {0x0, 'memory'}, {0x2b, 'io'}, {0x2d, 'rdma'}]}, 0x25) keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:30 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f0000000000)={0x4, 0x0, 0x0, {0x8, 0xffff}, 0xbb1, 0x2}) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x3, r0, 0x0, 0xffffffffffffffff, 0x0) 17:09:30 executing program 2: request_key(0x0, &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='syz', 0xffffffffffffffff) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 17:09:30 executing program 4: semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) r0 = semget$private(0x0, 0x0, 0x4) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000080)) fork() r1 = semget(0x3, 0x0, 0x86) semctl$SEM_INFO(r1, 0x2, 0x13, &(0x7f0000000040)=""/7) r2 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETNCNT(r2, 0x4, 0xe, &(0x7f0000000080)=""/43) 17:09:30 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r0, 0x0, r0, 0x0) 17:09:30 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, '\x00', "c94aec5211143587358e475c5fbdc3b7", '\x00', "f667ebd7c8e6d736"}, 0xfffffffffffffe18) keyctl$link(0x8, r0, r1) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x181040, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000100)={{0x9, 0x81}, 'port1\x00', 0x10, 0x400, 0x9d, 0x101, 0x1, 0x8, 0xd4e, 0x0, 0x3, 0x62}) 17:09:30 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:30 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040), 0x2, 0x0) 17:09:30 executing program 2: request_key(0x0, &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='syz', 0xffffffffffffffff) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 17:09:30 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r0, r0, 0x0, 0x0) 17:09:31 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) socket$nl_generic(0x10, 0x3, 0x10) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x3}, &(0x7f0000000240)={0x0, 0x0, @c}, 0x29, r1) r2 = request_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='\x00', 0xfffffffffffffffa) request_key(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='keyring\x00', r2) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$link(0x8, r0, r3) 17:09:31 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SEM_INFO(r0, 0x2, 0x13, &(0x7f0000000040)=""/4096) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:31 executing program 2: request_key(0x0, &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='syz', 0xffffffffffffffff) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 17:09:31 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r0, @ANYBLOB="00022dbd7000fddbdf250a00000008000300", @ANYRES32=r1, @ANYBLOB="a45714087cace979d912a3e4bc51130d0a6fe8b81931a411675954839987079e8c0ac36f8e86d1bc1910885f76571aa13922ff6ea5"], 0x1c}}, 0x40) 17:09:31 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)='{\\+@\x00', 0xfffffffffffffffd) keyctl$negate(0xd, r0, 0x5ff2d2c4, 0xfffffffffffffffd) request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='-\x90,\x00', 0xffffffffffffffff) 17:09:31 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r0, r0, 0x0, 0x0) 17:09:31 executing program 5: add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$link(0x8, r0, r0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r1, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xb8, 0x0, 0x8, 0x70bd26, 0x25dfdbfe, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x7}, {0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8}, {0x6, 0x11, 0x3}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x6}, {0x6, 0x11, 0x1}}]}, 0xb8}, 0x1, 0x0, 0x0, 0x20008880}, 0x4000814) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r2) 17:09:31 executing program 2: request_key(&(0x7f0000000080)='trusted\x00', 0x0, &(0x7f0000000100)='syz', 0xffffffffffffffff) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 17:09:31 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000040)=[{0x4, 0x3, 0x800}, {0x1, 0xc1, 0x800}, {0x0, 0x8, 0x1000}, {0x3, 0xf000, 0x1800}, {0x0, 0xfffc, 0x800}], 0x5) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SEM_STAT_ANY(r1, 0x2, 0x14, &(0x7f0000000080)=""/135) fork() 17:09:31 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r0, r0, 0x0, 0x0) 17:09:31 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x745801, 0x0) fsmount(r2, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) keyctl$link(0x8, r0, r1) 17:09:31 executing program 0: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900)=ANY=[@ANYBLOB="f078000000000000"], 0x8, r1) keyctl$clear(0x7, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r2) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000000)=ANY=[@ANYBLOB="edffff19ffe55d628e20050000"], 0x8, r0) keyctl$KEYCTL_MOVE(0x3, 0x0, r0, 0xfffffffffffffff9, 0x0) 17:09:31 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0xffffffffffffffff, 0xfffffffffffffff9, 0x1) 17:09:31 executing program 2: request_key(&(0x7f0000000080)='trusted\x00', 0x0, &(0x7f0000000100)='syz', 0xffffffffffffffff) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 17:09:31 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000040)={{0x5, 0x40}, 'port1\x00', 0x1d6, 0x410, 0x3, 0xc6af, 0xc52e, 0xf6d, 0x7649, 0x0, 0x7, 0x81}) keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) getsockopt$packet_buf(r0, 0x107, 0x16, &(0x7f0000000100)=""/162, &(0x7f00000001c0)=0xa2) 17:09:31 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f00000001c0)=ANY=[@ANYBLOB="00000009004df519b6d37203000f5335e6"], 0x8, r1) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000040)=ANY=[@ANYBLOB="0000000000800000abe385bc2134a1774caf3bdaee43c10ce648303f4181104ec76c64b8a7f5b6e7c95fd1a4016f480f62d5d44323112a4c34738992cde1d33842a4a8fd303baff0f0f24baf9611f643d4eeb3283dead02942a0a9f2df183192793b44bbc767916892093c22855590e818f6039bc680122b31fe891df1db12039ed112ca60ee23833536c3c0ef8e5ca2d1e97069ad64b30db331480a802dd09a8527f2d88f9d1ebd3dc7e958683de6b0a0cc72f683e21418e91b67ac6c826facbb1d9e48f6e58669d129b7c67627ac9ce0f461b2f6bd3745c674d6f800962b741cc5c1cdbb27cc62bd7b85b1c335f83f655c717fa04fe30e2855c46a968d87814b6443c496ea5603215e444fa35eecf1f3ad092710e835457084d033cd5ce746e937ae6fb2f8a33a67ae5d159d95a37b3f12ce00a1f92183a0b51de7f5e0145bc52f1a9a3868a1e6b06d38b01282000000000000000000"], 0x8, r3) add_key$fscrypt_provisioning(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)={0x0, 0x0, @d}, 0x18, r1) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) keyctl$KEYCTL_MOVE(0xb, r2, r1, r4, 0x0) 17:09:31 executing program 3: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) keyctl$unlink(0x9, r0, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 17:09:31 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{0x0, 0x2}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) r1 = fork() r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r3 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r3, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETPID(r3, 0x3, 0xb, &(0x7f0000000240)=""/26) fsmount(r2, 0x0, 0x0) r4 = fsmount(0xffffffffffffffff, 0x0, 0x4) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r6 = fsmount(r5, 0x0, 0xa) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000640), r4) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r6, &(0x7f00000007c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000780)={&(0x7f0000000680)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00082cbd7000ffdbdf251b000000080001007063690011000200303030303a30303a31302e300000000008000b00030000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b00010400000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b00ffffffff080001007063690011000200303030303a30303a31302e300000000008000b00260000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b0007000000"], 0xfc}, 0x1, 0x0, 0x0, 0x4010}, 0x21082cd285189a34) r8 = fork() waitid(0x2, r8, &(0x7f00000001c0), 0x8, 0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd8, r7, 0x100, 0x70bd25, 0x25dfdbfd, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8}}]}, 0xd8}, 0x1, 0x0, 0x0, 0x4008085}, 0x4040055) 17:09:31 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = request_key(&(0x7f0000000540)='.request_key_auth\x00', &(0x7f0000000580)={'syz', 0x2}, &(0x7f00000005c0)='user\x00', r0) add_key$keyring(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$link(0x8, r0, r1) r3 = add_key$fscrypt_provisioning(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)={0x0, 0x0, @a}, 0x48, 0xfffffffffffffffa) keyctl$negate(0xd, r3, 0x4, r0) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)={0x2, 0x0, @d}, 0x18, r1) r4 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$unlink(0x9, r1, r4) r5 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00@'], 0x8, r5) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)={0x0, 0x0, @b}, 0x48, r5) sched_rr_get_interval(r6, &(0x7f0000000300)) getpid() keyctl$clear(0x7, r5) 17:09:31 executing program 2: request_key(&(0x7f0000000080)='trusted\x00', 0x0, &(0x7f0000000100)='syz', 0xffffffffffffffff) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 17:09:31 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) keyctl$unlink(0x9, r0, r1) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$negate(0xd, r0, 0xa8, r2) 17:09:31 executing program 3: sysfs$1(0x1, &(0x7f0000000080)='&(+,#@)&:\x00') r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r2, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_GET(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x100, 0x70bd27, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0x1c}}]}, 0x4c}}, 0x2404c000) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_SET_PAN_ID(r3, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x50, 0x0, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_PAN_ID={0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x80) keyctl$link(0x8, r0, r1) 17:09:31 executing program 2: request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 17:09:31 executing program 5: add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) keyctl$link(0x8, r1, r0) 17:09:31 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, 0x0, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, 0x0, 0x300, 0x70bd2b, 0x25dfdbff, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x80000}, 0x962) keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) 17:09:31 executing program 2: request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 17:09:31 executing program 3: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, &(0x7f0000000240)={{0x8, 0x6}, 'port1\x00', 0x60, 0x20, 0x1, 0x2, 0x6, 0x5, 0x9, 0x0, 0x6, 0x2}) r1 = fork() waitid(0x2, r1, &(0x7f00000001c0), 0x8, 0x0) wait4(r1, &(0x7f0000000040), 0x40000000, &(0x7f0000000080)) semop(r0, &(0x7f0000000380)=[{0x1, 0x7}, {0x6, 0xff4f, 0x1800}, {0x3, 0x8, 0x800}], 0x3) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r2, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r4, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0x38}}, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r5, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r6, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0x38}}, 0x10) sendmsg$NL802154_CMD_NEW_INTERFACE(r2, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0x66, &(0x7f0000000300)={&(0x7f0000000180)={0x1c, r6, 0x300, 0x70bd25, 0x25dfdbfd, {}, [@NL802154_ATTR_IFTYPE={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x0) 17:09:31 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{0x0, 0x0, 0x800}], 0x1) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$GETZCNT(r1, 0x4, 0xf, &(0x7f0000000100)=""/219) r2 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$IPC_STAT(r2, 0x0, 0x2, &(0x7f0000000040)=""/67) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r3, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r3, 0x408c5333, &(0x7f0000000200)={0x7ff, 0x3, 0x0, 'queue0\x00', 0xf2}) 17:09:31 executing program 0: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x40, 0x0, 0x4, 0x70bd29, 0x25dfdbfb, {}, [@IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa0}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa2}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r0}]}, 0x40}}, 0x44000) r1 = fsmount(0xffffffffffffffff, 0x1, 0x2) r2 = fsmount(0xffffffffffffffff, 0x0, 0x4) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r4 = fsmount(r3, 0x0, 0xa) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000640), r2) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r4, &(0x7f00000007c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000780)={&(0x7f0000000680)={0xfc, r5, 0x800, 0x70bd2c, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x401}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xffffffff}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x26}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4010}, 0x21082cd285189a34) sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0xf8, r5, 0x4, 0x70bd2d, 0x25dfdbfb, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x1}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x2}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x3}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x3}}]}, 0xf8}, 0x1, 0x0, 0x0, 0x4000000}, 0x4084) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, 0x0, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_LEVEL={0x1c, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x5}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0xff}]}, @NL802154_ATTR_SEC_LEVEL={0xc, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x9}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r0}]}, 0x68}, 0x1, 0x0, 0x0, 0x20004010}, 0x11) keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:31 executing program 1: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) keyctl$KEYCTL_MOVE(0xb, r0, 0x0, r1, 0x1) 17:09:31 executing program 2: request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 17:09:31 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r0) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='syz', 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$link(0x8, r0, r1) 17:09:31 executing program 2: request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 17:09:31 executing program 0: r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)={0x2, 0x0, @d}, 0x18, 0xfffffffffffffff8) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000000c0)={0x0, 0x0, @auto=[0x38]}, 0x9, r1) keyctl$KEYCTL_MOVE(0x3, r0, 0x0, r1, 0x0) 17:09:31 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_ADD_DEV(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00052abd7000ffdbdf252a0000000c0005000203aae0e13665aa"], 0x20}, 0x1, 0x0, 0x0, 0x20000054}, 0x2000800) keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)={0x3, 0x0, @d}, 0x18, 0xffffffffffffffff) 17:09:31 executing program 4: semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) r0 = semget$private(0x0, 0x3, 0x0) semop(r0, &(0x7f0000000040)=[{0x1, 0x9}, {0x0, 0x80, 0x800}, {0x3, 0x5}, {0x4, 0xfffb, 0x2000}, {0x4, 0x2, 0x1000}, {0x2, 0xffce, 0x1000}, {0x4, 0xfff, 0x800}, {0x4, 0x100, 0x1000}], 0x8) r1 = semget(0x2, 0x1, 0x1c8) r2 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$IPC_RMID(r2, 0x0, 0x0) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000080)=[0xfd2, 0x9, 0x4, 0x6, 0xb, 0x2d, 0x7fff, 0x40d]) fork() 17:09:31 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:31 executing program 4: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x64200002}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x5c, r0, 0x2, 0x70bd2c, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_PAN_ID={0x6}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0xd46fa1e699e5134f}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x9b784c358f69151c}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0xffff}]}, 0x5c}, 0x1, 0x0, 0x0, 0x140}, 0x800) r1 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:32 executing program 3: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, &(0x7f0000000240)={{0x8, 0x6}, 'port1\x00', 0x60, 0x20, 0x1, 0x2, 0x6, 0x5, 0x9, 0x0, 0x6, 0x2}) r1 = fork() waitid(0x2, r1, &(0x7f00000001c0), 0x8, 0x0) wait4(r1, &(0x7f0000000040), 0x40000000, &(0x7f0000000080)) semop(r0, &(0x7f0000000380)=[{0x1, 0x7}, {0x6, 0xff4f, 0x1800}, {0x3, 0x8, 0x800}], 0x3) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r2, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r4, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0x38}}, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r5, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r6, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0x38}}, 0x10) sendmsg$NL802154_CMD_NEW_INTERFACE(r2, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0x66, &(0x7f0000000300)={&(0x7f0000000180)={0x1c, r6, 0x300, 0x70bd25, 0x25dfdbfd, {}, [@NL802154_ATTR_IFTYPE={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x0) 17:09:32 executing program 2: request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000002c0), 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 17:09:32 executing program 0: alarm(0x4) keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:32 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f0000000080), &(0x7f00000000c0)=0x10) fsmount(r0, 0x1, 0x72) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) r3 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r2) keyctl$link(0x8, r1, r3) 17:09:32 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)={0x1, 0x0, @c}, 0x29, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$reject(0x13, r0, 0x7, 0x20, r1) 17:09:32 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000080)=""/197) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:32 executing program 2: request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000002c0), 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 17:09:32 executing program 0: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r2 = request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='@::\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)=')-\'^}*+$\x00', r2) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900)={0x1}, 0x8, r1) keyctl$KEYCTL_MOVE(0x3, 0x0, r1, 0xfffffffffffffff9, 0x0) 17:09:32 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r2, 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0xa0480, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x10402, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) keyctl$link(0x8, r0, r1) 17:09:32 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$negate(0xd, 0x0, 0x9, r0) 17:09:32 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000080)=[{0x1}], 0x1) r1 = semget$private(0x0, 0x0, 0x41) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000000)) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() r2 = fork() waitid(0x2, r2, &(0x7f00000001c0), 0x8, 0x0) r3 = fork() waitid(0x1, r3, &(0x7f00000001c0), 0x8, 0x0) getpgid(r2) r4 = fork() waitid(0x2, r4, &(0x7f00000001c0), 0x8, 0x0) getpgid(r4) 17:09:32 executing program 5: add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r0) 17:09:33 executing program 3: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, &(0x7f0000000240)={{0x8, 0x6}, 'port1\x00', 0x60, 0x20, 0x1, 0x2, 0x6, 0x5, 0x9, 0x0, 0x6, 0x2}) r1 = fork() waitid(0x2, r1, &(0x7f00000001c0), 0x8, 0x0) wait4(r1, &(0x7f0000000040), 0x40000000, &(0x7f0000000080)) semop(r0, &(0x7f0000000380)=[{0x1, 0x7}, {0x6, 0xff4f, 0x1800}, {0x3, 0x8, 0x800}], 0x3) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r2, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r4, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0x38}}, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r5, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r6, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0x38}}, 0x10) sendmsg$NL802154_CMD_NEW_INTERFACE(r2, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0x66, &(0x7f0000000300)={&(0x7f0000000180)={0x1c, r6, 0x300, 0x70bd25, 0x25dfdbfd, {}, [@NL802154_ATTR_IFTYPE={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x0) 17:09:33 executing program 0: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, r0, 0x0) r1 = semget(0x0, 0x1, 0x201) semctl$GETALL(r1, 0x0, 0xd, &(0x7f0000000000)=""/138) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) keyctl$search(0xa, r0, &(0x7f0000000140)='trusted\x00', &(0x7f0000000180)={'syz', 0x3}, r2) 17:09:33 executing program 2: request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000002c0), 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 17:09:33 executing program 1: setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x4, &(0x7f00000000c0)=[{0x80, 0xfe, 0x1, 0x100}, {0x24, 0x7, 0x4, 0x3}, {0x6, 0x4, 0xd8}, {0x1000, 0x3, 0x4c, 0xfffffffe}]}, 0x10) keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000140)={0x0, 0x0, @auto=[0x16, 0x3d, 0x37]}, 0xb, r0) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14, 0x0) getsockopt$packet_int(r1, 0x107, 0x3, &(0x7f0000000200), &(0x7f0000000240)=0x4) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffffa, 0x0) request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='*\x00', r0) 17:09:33 executing program 5: ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000100)={0x0, @vsock={0x28, 0x0, 0x2711}, @llc={0x1a, 0x338, 0x0, 0xe9, 0x2, 0x6, @local}, @qipcrtr={0x2a, 0x2, 0x2}, 0x6, 0x0, 0x0, 0x0, 0xc98e, 0x0, 0xf004, 0xffffffff, 0xffff}) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) 17:09:33 executing program 0: r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'erspan0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x700, 0x8000, 0x6, 0x80, {{0x13, 0x4, 0x3, 0x5, 0x4c, 0x67, 0x0, 0x80, 0x29, 0x0, @local, @dev={0xac, 0x14, 0x14, 0x19}, {[@ra={0x94, 0x4, 0x1}, @noop, @rr={0x7, 0xf, 0xf7, [@rand_addr=0x64010100, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @timestamp={0x44, 0x18, 0x85, 0x0, 0x1, [0x5, 0x3, 0x212, 0xffff, 0x8000]}, @generic={0x18921fd82d9639c, 0xa, "b3c25a6b9922f8b8"}]}}}}}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000180)={r1, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2a}}, 0x10) keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:33 executing program 2: request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000002c0), 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 17:09:33 executing program 1: r0 = request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='%+-+}}){\x00', 0xfffffffffffffffe) r1 = add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)={0x1, 0x0, @auto=[0x1f, 0x3d, 0x10, 0x3f, 0x29]}, 0xd, r0) keyctl$negate(0xd, r1, 0x4, r0) keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x1) 17:09:33 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) keyctl$KEYCTL_MOVE(0x1e, r1, r0, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r0, 0x0) 17:09:33 executing program 0: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'gre0\x00', &(0x7f0000000000)={'ip_vti0\x00', 0x0, 0x40, 0x20, 0x6, 0x7a49ac41, {{0x32, 0x4, 0x2, 0x7, 0xc8, 0x66, 0xff, 0x2, 0x2f, 0x0, @remote, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@generic={0xcf, 0xd, "e19cdd043aed8600e08f05"}, @cipso={0x86, 0x4a, 0xffffffffffffffff, [{0x7, 0x11, "018a96e70c5427f0a1591156ca1570"}, {0x6, 0xb, "c2e82c018bc6ee4f52"}, {0x2, 0x2}, {0x1, 0x7, "eba9605775"}, {0x5, 0x5, "c0f1df"}, {0x1, 0x10, "7eaff125e8575727d0eb7237c110"}, {0x6, 0xa, "10f4eded3d188353"}]}, @timestamp={0x44, 0x1c, 0x7f, 0x0, 0x1, [0x4, 0x27, 0x1000, 0x6, 0x1, 0x6]}, @rr={0x7, 0x3, 0xa8}, @cipso={0x86, 0x33, 0x1, [{0x6, 0xc, "0894cb83544ab3680fdc"}, {0x6, 0x8, "57a5213617c2"}, {0x0, 0x2}, {0x0, 0x6, "70bfef6b"}, {0x1, 0x11, "bf8ca0b925e5c979b60512db5453a5"}]}, @generic={0x83, 0x9, "c496da4ff1cdff"}]}}}}}) 17:09:33 executing program 4: semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) r0 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/83) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000040)) fork() 17:09:33 executing program 2: request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000002c0), 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) 17:09:34 executing program 3: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, &(0x7f0000000240)={{0x8, 0x6}, 'port1\x00', 0x60, 0x20, 0x1, 0x2, 0x6, 0x5, 0x9, 0x0, 0x6, 0x2}) r1 = fork() waitid(0x2, r1, &(0x7f00000001c0), 0x8, 0x0) wait4(r1, &(0x7f0000000040), 0x40000000, &(0x7f0000000080)) semop(r0, &(0x7f0000000380)=[{0x1, 0x7}, {0x6, 0xff4f, 0x1800}, {0x3, 0x8, 0x800}], 0x3) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r2, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r4, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0x38}}, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r5, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r6, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0x38}}, 0x10) 17:09:34 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) keyctl$search(0xa, r0, &(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x0}, r1) 17:09:34 executing program 0: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm, @sack_perm, @window={0x3, 0x7fff, 0x7}, @window={0x3, 0x401, 0x4}, @window={0x3, 0x4, 0xfffd}], 0x5) keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:34 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900)=ANY=[@ANYBLOB="200000b004000000"], 0x8, r1) r2 = request_key(&(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='&,@[\x00', 0xfffffffffffffffb) keyctl$search(0xa, r1, &(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x3}, r2) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r3) 17:09:34 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{0x0, 0x0, 0x1400}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:34 executing program 2: request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000002c0), 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) 17:09:34 executing program 2: request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000002c0), 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) 17:09:34 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:34 executing program 4: r0 = semget$private(0x0, 0x0, 0x726) semctl$IPC_INFO(r0, 0x2, 0x3, &(0x7f0000000040)=""/185) semop(r0, &(0x7f0000000100)=[{0x1, 0x0, 0x1000}], 0x1) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000000)=""/38) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:34 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000140)={0x7, &(0x7f0000000000)=[{0x0, 0x80, 0xfc, 0x8b}, {0x4, 0xcf, 0x1, 0x7}, {0xff, 0x0, 0x20, 0x4}, {0x6, 0x9, 0x9, 0x7}, {0xa836, 0x71, 0x0, 0x4}, {0x0, 0x90, 0xf8, 0x5}, {0x0, 0x80, 0x1, 0x8}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r1) add_key$fscrypt_provisioning(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)={0x0, 0x0, @auto=[0x25, 0x33, 0x21, 0x3a, 0x2c, 0x2b, 0x21, 0x1c, 0x1e, 0x1a]}, 0x12, r2) keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, r1, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'gretap0\x00', 0xfffffffffffffffc}) 17:09:34 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000ea0400006062636465666768696a6b6c6d6e6f7071727374c7663578343536000000000000"], 0x29, r1) keyctl$link(0x8, r0, r1) 17:09:34 executing program 2: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$negate(0xd, 0x0, 0x9, r0) 17:09:35 executing program 3: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, &(0x7f0000000240)={{0x8, 0x6}, 'port1\x00', 0x60, 0x20, 0x1, 0x2, 0x6, 0x5, 0x9, 0x0, 0x6, 0x2}) r1 = fork() waitid(0x2, r1, &(0x7f00000001c0), 0x8, 0x0) wait4(r1, &(0x7f0000000040), 0x40000000, &(0x7f0000000080)) semop(r0, &(0x7f0000000380)=[{0x1, 0x7}, {0x6, 0xff4f, 0x1800}, {0x3, 0x8, 0x800}], 0x3) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r2, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r4, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0x38}}, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) 17:09:35 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{0x4}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() r1 = semget$private(0x0, 0x487c5454773562f8, 0x8) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000040)=[0x1ff, 0xff, 0x3, 0x5, 0x5, 0x1, 0xd109, 0x4]) 17:09:35 executing program 0: setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)="fe43f76e6187588bccbaf8e2130d4d3756356824909a0d02e3cec31bdf68233b506e7bc481aed9de57b8316891085f5e82ebb76d9486129faec37f7c79e2114be6c5d377eaa9e39796c63df10c64d87b66a1ffc91a98f139e51b41e2a8ea3ad99d8ad7e739cdcf85bcdb7e0422450a2507e6e405918eb2e95901ad0c1fca9200f29385810c683a1e5f07eb25638594949e7dc7a5a88d528557d5fd7f044631ac6ea54f21a91254ff96ba5d2422631f", 0xaf) keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r1 = fsmount(r0, 0x0, 0x0) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000001c0)={0x0, @ethernet={0x306, @multicast}, @can={0x1d, 0x0}, @phonet={0x23, 0xf4, 0x5, 0x81}, 0xfff, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000180)='veth1_to_hsr\x00', 0x81, 0x1ff, 0x9}) sendto$packet(r0, &(0x7f0000000140)="f98908e312727059", 0x8, 0x4004800, &(0x7f0000000240)={0x11, 0x11, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r4, 0x0, 0x0) fsmount(r1, 0x860875e9906f03f5, 0x2) openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x202001, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000100)) 17:09:35 executing program 2: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$negate(0xd, 0x0, 0x9, r0) 17:09:35 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_GET_SEC_KEY(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, 0x0, 0x20, 0x70bd2c, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) keyctl$link(0x8, r0, r1) 17:09:35 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) fsmount(r0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x4e20, @remote}}, 0x0, 0x0, 0xb, 0x0, "1eef029f4e1c711cc13b68339b80a5cc01e06c4929b251ca286d8b6199afe02d89e9a4a43f28576ddc9f89b3aecf112360bc1fdb542af9a3d3724cc2e5bafa797deedfb54bc81751c5a8b2d5ac322a9a"}, 0xd8) r1 = socket(0x4, 0x5, 0x5) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), r0) sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x154, r2, 0x8, 0x70bd29, 0x25dfdbfe, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x6}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x6, 0x4, 0x3}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x6, 0x4, 0x2}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x3}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x6}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x6}}]}, 0x154}}, 0x404c000) 17:09:35 executing program 2: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$negate(0xd, 0x0, 0x9, r0) 17:09:35 executing program 5: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r1, r2, r3, 0x0) keyctl$link(0x8, r0, r1) keyctl$clear(0x7, r2) keyctl$get_persistent(0x16, 0x0, r0) 17:09:35 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) r1 = semget(0x0, 0x1, 0x1a) semctl$SEM_STAT_ANY(r1, 0x3, 0x14, &(0x7f0000000080)=""/83) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000040)=[0x40, 0x81, 0x6]) fork() 17:09:35 executing program 2: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) 17:09:35 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, r0) r2 = fsmount(0xffffffffffffffff, 0x1, 0xc) openat$cgroup_freezer_state(r2, &(0x7f0000000080), 0x2, 0x0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r3) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) keyctl$reject(0x13, r0, 0x0, 0x80, r4) 17:09:35 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) keyctl$reject(0x13, 0x0, 0x450, 0x0, 0xfffffffffffffff9) 17:09:35 executing program 3: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, &(0x7f0000000240)={{0x8, 0x6}, 'port1\x00', 0x60, 0x20, 0x1, 0x2, 0x6, 0x5, 0x9, 0x0, 0x6, 0x2}) r1 = fork() waitid(0x2, r1, &(0x7f00000001c0), 0x8, 0x0) wait4(r1, &(0x7f0000000040), 0x40000000, &(0x7f0000000080)) semop(r0, &(0x7f0000000380)=[{0x1, 0x7}, {0x6, 0xff4f, 0x1800}, {0x3, 0x8, 0x800}], 0x3) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r2, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r4, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0x38}}, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 17:09:35 executing program 4: r0 = semget$private(0x0, 0x4, 0x400) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:35 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x4900, 0x0) request_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='&\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='.%{+\x00', 0xfffffffffffffff9) 17:09:35 executing program 2: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) 17:09:35 executing program 0: msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x9f, 0x0) keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) keyctl$link(0x8, 0x0, 0xfffffffffffffffc) r0 = msgget(0x2, 0x248) msgsnd(r0, &(0x7f0000000000)={0x1, "6a64146ee17ee8fd53e2279fecc096d5fcb8b8f6327900639834ec3f7724e540fedc1f0a259c17e3412630560456f129a7aae8bc31868058433a3f7c828770047cb81b3a09103b33e954fd6d36f39bace15b150917f9648817f4e7dcc30a36a35cde07d67e45c7ac1dab94e3ad622d0a36b7cd1f0e6e16eb09f55dc1c46de71dcccd5ae3b748ef703290492033b7587902041937ab8441242fd91956916e1d287612b3504cd203718f1551696e2a6b728aadd971cb2db09447b28d410deed91c1bbf0692c8c544a8817643fcc67498a62d5a35085d0691074b1ca979"}, 0xe4, 0x800) 17:09:35 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x400, 0x0) 17:09:35 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0x0) getresuid(&(0x7f0000000080)=0x0, &(0x7f00000000c0), &(0x7f0000000100)) keyctl$get_persistent(0x16, r1, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r2) 17:09:35 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)={0x2, 0x0, @a}, 0x48, 0xfffffffffffffffc) 17:09:35 executing program 2: add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) 17:09:36 executing program 1: fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f0000000000)='][-[[##(#.u^@\xddh)-#\xd6\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c) keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) sendmsg$DEVLINK_CMD_TRAP_GET(r0, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f0000000100)={0x260, 0x0, 0x20, 0x4, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0x1c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}]}, 0x260}, 0x1, 0x0, 0x0, 0x81}, 0x8004) fsmount(r0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) 17:09:36 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$GETNCNT(r0, 0x0, 0xe, &(0x7f0000000040)=""/207) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:36 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$negate(0xd, r0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$search(0xa, r1, &(0x7f00000002c0)='.request_key_auth\x00', &(0x7f0000000300)={'syz', 0x3}, r2) r3 = request_key(&(0x7f0000000180)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='syz', r1) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f00000001c0)=ANY=[@ANYBLOB="b7eae1da0001000013a1cc1d"], 0x8, r3) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r2) getresuid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000200)) keyctl$link(0x8, r0, r4) 17:09:36 executing program 3: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, &(0x7f0000000240)={{0x8, 0x6}, 'port1\x00', 0x60, 0x20, 0x1, 0x2, 0x6, 0x5, 0x9, 0x0, 0x6, 0x2}) r1 = fork() waitid(0x2, r1, &(0x7f00000001c0), 0x8, 0x0) wait4(r1, &(0x7f0000000040), 0x40000000, &(0x7f0000000080)) semop(r0, &(0x7f0000000380)=[{0x1, 0x7}, {0x6, 0xff4f, 0x1800}, {0x3, 0x8, 0x800}], 0x3) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r2, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x87eb14953426d8ed}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r4, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x1f, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0x38}}, 0x10) 17:09:36 executing program 2: add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) 17:09:36 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x3, 0x0, r0, r0, 0x1) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) keyctl$KEYCTL_MOVE(0x1e, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 17:09:36 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_persistent(0x16, 0xee01, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:36 executing program 1: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'tunl0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x20, 0x80, 0x8, 0x4, {{0xf, 0x4, 0x3, 0x38, 0x3c, 0x65, 0x0, 0x3f, 0x2f, 0x0, @remote, @rand_addr=0x64010102, {[@ssrr={0x89, 0x23, 0x7e, [@loopback, @multicast1, @loopback, @multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @local, @rand_addr=0x64010101, @broadcast]}, @ra={0x94, 0x4}]}}}}}) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) keyctl$unlink(0x9, r1, 0xffffffffffffffff) r2 = accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x0) recvfrom$packet(r2, &(0x7f0000000300)=""/4096, 0x1000, 0x10000, &(0x7f0000001300)={0x11, 0x4, r0, 0x1, 0xff, 0x6, @multicast}, 0x14) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000200)={'gretap0\x00', r0, 0x40, 0x1, 0x40, 0x80000000, {{0x24, 0x4, 0x1, 0x8, 0x90, 0x66, 0x0, 0x9, 0x4, 0x0, @remote, @local, {[@cipso={0x86, 0x33, 0x3, [{0x7, 0x4, "e01b"}, {0x7, 0x3, "9d"}, {0x2, 0x7, "3f588af515"}, {0x7, 0x4, "1516"}, {0x3, 0x12, "860e5a562f25948c16a0f217f3bdaddd"}, {0x5, 0x9, "e02e459be36be2"}]}, @noop, @rr={0x7, 0x13, 0xef, [@private=0xa010102, @multicast2, @empty, @loopback]}, @timestamp_addr={0x44, 0x34, 0x1e, 0x1, 0xc, [{@empty, 0x1000}, {@remote}, {@broadcast, 0x879}, {@remote, 0x80000000}, {@local, 0x2}, {@multicast2, 0xfffffffc}]}]}}}}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/95, 0x5f, 0x10000, &(0x7f00000001c0)={0x11, 0x15, r0, 0x1, 0x81, 0x6, @random="9508c58048d9"}, 0x14) keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:36 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) r1 = semget(0x1, 0x0, 0x382) semctl$SEM_INFO(r1, 0x2, 0x13, &(0x7f0000000040)=""/4096) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() 17:09:36 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) keyctl$negate(0xd, r0, 0xad, 0xfffffffffffffffc) 17:09:36 executing program 2: add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) 17:09:36 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffa, r1, 0x0) keyctl$reject(0x13, 0x0, 0x8, 0x4547abaa, 0xfffffffffffffffa) 17:09:36 executing program 5: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x9c, r0, 0x400, 0x70bd26, 0x25dfdbff, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}]}, 0x9c}, 0x1, 0x0, 0x0, 0x80}, 0x20000001) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r2) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'wpan4\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_GET_SEC_LEVEL(r3, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x60, 0x0, 0x800, 0x70bd2d, 0x25dfdbfd, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x60}, 0x1, 0x0, 0x0, 0x4011}, 0x800) 17:09:36 executing program 4: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, r0) r2 = fsmount(0xffffffffffffffff, 0x1, 0xc) openat$cgroup_freezer_state(r2, &(0x7f0000000080), 0x2, 0x0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r3) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) keyctl$reject(0x13, r0, 0x0, 0x80, r4) 17:09:36 executing program 2: add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) 17:09:37 executing program 3: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, &(0x7f0000000240)={{0x8, 0x6}, 'port1\x00', 0x60, 0x20, 0x1, 0x2, 0x6, 0x5, 0x9, 0x0, 0x6, 0x2}) r1 = fork() waitid(0x2, r1, &(0x7f00000001c0), 0x8, 0x0) wait4(r1, &(0x7f0000000040), 0x40000000, &(0x7f0000000080)) semop(r0, &(0x7f0000000380)=[{0x1, 0x7}, {0x6, 0xff4f, 0x1800}, {0x3, 0x8, 0x800}], 0x3) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r2, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) 17:09:37 executing program 0: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r1) keyctl$KEYCTL_MOVE(0x3, 0x0, r1, r1, 0x0) keyctl$negate(0xd, 0x0, 0x6, 0x0) 17:09:37 executing program 4: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, r0) r2 = fsmount(0xffffffffffffffff, 0x1, 0xc) openat$cgroup_freezer_state(r2, &(0x7f0000000080), 0x2, 0x0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r3) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) keyctl$reject(0x13, r0, 0x0, 0x80, r4) 17:09:37 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, 0x0, 0x10, 0x70bd2a, 0x25dfdbfc, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_SEC_DEVKEY={0x10, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0xaaaaaaaaaaaa0202}}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}]}, 0x3c}, 0x1, 0x0, 0x0, 0x880}, 0x4000080) 17:09:37 executing program 2: add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) 17:09:37 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:37 executing program 2: add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) 17:09:37 executing program 4: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, r0) r2 = fsmount(0xffffffffffffffff, 0x1, 0xc) openat$cgroup_freezer_state(r2, &(0x7f0000000080), 0x2, 0x0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r3) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) keyctl$reject(0x13, r0, 0x0, 0x80, r4) 17:09:37 executing program 0: msgget(0x1, 0x400) r0 = msgget(0x0, 0x248) msgctl$IPC_RMID(r0, 0x0) msgctl$IPC_RMID(r0, 0x0) keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:37 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) r2 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)={0x1, 0x0, @b}, 0x48, r1) keyctl$link(0x8, r2, 0xfffffffffffffffd) 17:09:37 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) keyctl$search(0xa, 0x0, &(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x1}, r0) 17:09:37 executing program 4: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, r0) r2 = fsmount(0xffffffffffffffff, 0x1, 0xc) openat$cgroup_freezer_state(r2, &(0x7f0000000080), 0x2, 0x0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r3) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) 17:09:38 executing program 3: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, &(0x7f0000000240)={{0x8, 0x6}, 'port1\x00', 0x60, 0x20, 0x1, 0x2, 0x6, 0x5, 0x9, 0x0, 0x6, 0x2}) r1 = fork() waitid(0x2, r1, &(0x7f00000001c0), 0x8, 0x0) wait4(r1, &(0x7f0000000040), 0x40000000, &(0x7f0000000080)) semop(r0, &(0x7f0000000380)=[{0x1, 0x7}, {0x6, 0xff4f, 0x1800}, {0x3, 0x8, 0x800}], 0x3) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r2, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 17:09:38 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:38 executing program 2: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)={0x1, 0x0, @c}, 0x29, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$reject(0x13, r0, 0x7, 0x20, r1) 17:09:38 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:38 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0xfffffffffffffffe, 0xfffffffffffffff9, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900)=ANY=[@ANYBLOB], 0x8, r0) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffd, 0x0, 0x0) 17:09:38 executing program 4: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, r0) r2 = fsmount(0xffffffffffffffff, 0x1, 0xc) openat$cgroup_freezer_state(r2, &(0x7f0000000080), 0x2, 0x0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r3) add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 17:09:38 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000100)=ANY=[@ANYBLOB="68ad803634bdfa180cd99b9120805fbecc9d2e0fb23e6aaa99590bfe4f5d117fb82c3498345bdd86c4"], 0x8, r0) fork() 17:09:38 executing program 4: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, r0) r2 = fsmount(0xffffffffffffffff, 0x1, 0xc) openat$cgroup_freezer_state(r2, &(0x7f0000000080), 0x2, 0x0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r3) 17:09:38 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan3\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x50, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_SHORT_ADDR={0x6, 0xa, 0xffff}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SHORT_ADDR={0x6, 0xa, 0xffff}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}]}, 0x50}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) 17:09:38 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) keyctl$KEYCTL_MOVE(0xb, r0, r1, r2, 0x0) 17:09:38 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) keyctl$link(0x8, r2, r0) keyctl$link(0x8, r0, r1) socket$inet_udp(0x2, 0x2, 0x0) r3 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)={0x4, 0x0, @c}, 0x29, r0) r4 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r4) r5 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) request_key(&(0x7f00000001c0)='ceph\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='ceph\x00', r5) keyctl$search(0xa, r3, &(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x1}, r4) 17:09:38 executing program 4: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, r0) r2 = fsmount(0xffffffffffffffff, 0x1, 0xc) openat$cgroup_freezer_state(r2, &(0x7f0000000080), 0x2, 0x0) keyctl$link(0x8, r1, 0x0) 17:09:39 executing program 3: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, &(0x7f0000000240)={{0x8, 0x6}, 'port1\x00', 0x60, 0x20, 0x1, 0x2, 0x6, 0x5, 0x9, 0x0, 0x6, 0x2}) r1 = fork() waitid(0x2, r1, &(0x7f00000001c0), 0x8, 0x0) wait4(r1, &(0x7f0000000040), 0x40000000, &(0x7f0000000080)) semop(r0, &(0x7f0000000380)=[{0x1, 0x7}, {0x6, 0xff4f, 0x1800}, {0x3, 0x8, 0x800}], 0x3) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r2, 0x0, 0x0) 17:09:39 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x10400, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xc) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, 0x0, 0x100, 0x70bd26, 0x25dfdbfe, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24020044}, 0x8000) r1 = fsmount(0xffffffffffffffff, 0x0, 0x4) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000240), &(0x7f0000000280)=0x10) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x640001, 0x0) r3 = fsmount(r2, 0x0, 0xa) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000640), r1) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r3, &(0x7f00000007c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000780)={&(0x7f0000000680)={0xfc, r4, 0x800, 0x70bd2c, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x401}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xffffffff}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x26}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4010}, 0x21082cd285189a34) sendmsg$DEVLINK_CMD_SB_POOL_GET(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r4, 0x100, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x2800}, 0x4000000) 17:09:39 executing program 5: add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)='-\'}\x8c+{\x94\x00', r0) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) keyctl$link(0x8, r2, r0) 17:09:39 executing program 1: r0 = fsmount(0xffffffffffffffff, 0x1, 0x4) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000140)=@ccm_128={{0x303}, "875dcf0f9685dfa0", "30246dafc088d6811fef07a004be70a0", "d9f71722", "f274521b0da02943"}, 0x28) getsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040), &(0x7f0000000080)=0x4) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x640001, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000180)="32a0cd8293d6071d775e0eb7f48d86eae17503adbfa8e738bcc696c690a9e07a63b5e55350a230a5cb41aac42d0bc4705c", 0x31) r4 = fsmount(r2, 0x1, 0x4c) write$cgroup_subtree(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB='-memZry '], 0x8) fsmount(r3, 0x0, 0x0) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000000)) 17:09:39 executing program 4: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, r0) r2 = fsmount(0xffffffffffffffff, 0x1, 0xc) openat$cgroup_freezer_state(r2, &(0x7f0000000080), 0x2, 0x0) keyctl$link(0x8, r1, 0x0) 17:09:39 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) keyctl$KEYCTL_MOVE(0xb, r0, r1, r2, 0x0) 17:09:39 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) keyctl$KEYCTL_MOVE(0xb, r0, r1, r2, 0x0) 17:09:39 executing program 4: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, r0) r2 = fsmount(0xffffffffffffffff, 0x1, 0xc) openat$cgroup_freezer_state(r2, &(0x7f0000000080), 0x2, 0x0) keyctl$link(0x8, r1, 0x0) 17:09:39 executing program 1: waitid(0x0, 0x0, &(0x7f0000000000), 0x80000000, &(0x7f0000000080)) keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) 17:09:39 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r2) request_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='-#,\x00', r2) keyctl$link(0x8, r0, r1) 17:09:39 executing program 0: keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0xfffffffffffffff9, 0x0) keyctl$clear(0x7, 0xfffffffffffffffe) 17:09:39 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, r1, r2, 0x0) 17:09:40 executing program 3: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, &(0x7f0000000240)={{0x8, 0x6}, 'port1\x00', 0x60, 0x20, 0x1, 0x2, 0x6, 0x5, 0x9, 0x0, 0x6, 0x2}) r1 = fork() waitid(0x2, r1, &(0x7f00000001c0), 0x8, 0x0) wait4(r1, &(0x7f0000000040), 0x40000000, &(0x7f0000000080)) semop(r0, &(0x7f0000000380)=[{0x1, 0x7}, {0x6, 0xff4f, 0x1800}, {0x3, 0x8, 0x800}], 0x3) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 17:09:40 executing program 4: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, r0) fsmount(0xffffffffffffffff, 0x1, 0xc) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r2) 17:09:40 executing program 1: semget(0x2, 0x1, 0x244) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:40 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) r2 = add_key$fscrypt_provisioning(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)={0x2, 0x0, @c}, 0x29, r1) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900)=ANY=[@ANYBLOB="0000000000000100"], 0x8, r3) keyctl$reject(0x13, r2, 0x6590, 0x4, r3) r4 = request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='syz', 0xfffffffffffffff9) r5 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r5) keyctl$KEYCTL_MOVE(0x1e, r4, r0, r5, 0x0) 17:09:40 executing program 0: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='keyring\x00', r0) keyctl$negate(0xd, r1, 0x100000000, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r3) clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x1, 0x7, 0x7, 0x7e1d, 0x1, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) add_key$fscrypt_provisioning(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)={0x2, 0x0, @a}, 0x48, 0xfffffffffffffff9) keyctl$link(0x8, r0, r2) 17:09:40 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0xb, r0, r1, 0x0, 0x0) 17:09:40 executing program 0: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='keyring\x00', r0) keyctl$negate(0xd, r1, 0x100000000, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r3) clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x1, 0x7, 0x7, 0x7e1d, 0x1, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) add_key$fscrypt_provisioning(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)={0x2, 0x0, @a}, 0x48, 0xfffffffffffffff9) keyctl$link(0x8, r0, r2) 17:09:40 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)=',:\x00', 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)={0x0, 0x0, @c}, 0x29, r1) timer_create(0xa81f9159482da4ba, &(0x7f0000000140)={0x0, 0x38, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000180)=0x0) timer_gettime(r2, &(0x7f00000001c0)) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$negate(0xd, r0, 0x1, r3) 17:09:40 executing program 4: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r2) 17:09:40 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, 0x0) clock_gettime(0x3, &(0x7f0000000080)) 17:09:40 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0xb, r0, r1, 0x0, 0x0) 17:09:40 executing program 0: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='keyring\x00', r0) keyctl$negate(0xd, r1, 0x100000000, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r3) clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x1, 0x7, 0x7, 0x7e1d, 0x1, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) add_key$fscrypt_provisioning(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)={0x2, 0x0, @a}, 0x48, 0xfffffffffffffff9) keyctl$link(0x8, r0, r2) 17:09:41 executing program 3: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, &(0x7f0000000240)={{0x8, 0x6}, 'port1\x00', 0x60, 0x20, 0x1, 0x2, 0x6, 0x5, 0x9, 0x0, 0x6, 0x2}) r1 = fork() waitid(0x2, r1, &(0x7f00000001c0), 0x8, 0x0) wait4(r1, &(0x7f0000000040), 0x40000000, &(0x7f0000000080)) semop(r0, &(0x7f0000000380)=[{0x1, 0x7}, {0x6, 0xff4f, 0x1800}, {0x3, 0x8, 0x800}], 0x3) 17:09:41 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)=',:\x00', 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)={0x0, 0x0, @c}, 0x29, r1) timer_create(0xa81f9159482da4ba, &(0x7f0000000140)={0x0, 0x38, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000180)=0x0) timer_gettime(r2, &(0x7f00000001c0)) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$negate(0xd, r0, 0x1, r3) 17:09:41 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0xb, r0, r1, 0x0, 0x0) 17:09:41 executing program 4: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r1) 17:09:41 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000080)='id_legacy\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='syz', 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:41 executing program 0: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='keyring\x00', r0) keyctl$negate(0xd, r1, 0x100000000, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r2) clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x1, 0x7, 0x7, 0x7e1d, 0x1, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) add_key$fscrypt_provisioning(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)={0x2, 0x0, @a}, 0x48, 0xfffffffffffffff9) 17:09:41 executing program 4: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r1) 17:09:41 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)=',:\x00', 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)={0x0, 0x0, @c}, 0x29, r1) timer_create(0xa81f9159482da4ba, &(0x7f0000000140)={0x0, 0x38, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000180)=0x0) timer_gettime(r2, &(0x7f00000001c0)) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$negate(0xd, r0, 0x1, r3) 17:09:41 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, 0x0, r1, 0x0) 17:09:41 executing program 0: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='keyring\x00', r0) keyctl$negate(0xd, r1, 0x100000000, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r2) clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x1, 0x7, 0x7, 0x7e1d, 0x1, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:41 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)='keyring\x00', r1) keyctl$link(0x8, r0, r1) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @auto=[0x32, 0x3c, 0x13]}, 0xb, r1) 17:09:41 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, 0x0, r1, 0x0) 17:09:42 executing program 3: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, &(0x7f0000000240)={{0x8, 0x6}, 'port1\x00', 0x60, 0x20, 0x1, 0x2, 0x6, 0x5, 0x9, 0x0, 0x6, 0x2}) r1 = fork() waitid(0x2, r1, &(0x7f00000001c0), 0x8, 0x0) wait4(r1, &(0x7f0000000040), 0x40000000, &(0x7f0000000080)) 17:09:42 executing program 4: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r1) 17:09:42 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)=',:\x00', 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)={0x0, 0x0, @c}, 0x29, r1) timer_create(0xa81f9159482da4ba, &(0x7f0000000140)={0x0, 0x38, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000180)=0x0) timer_gettime(r2, &(0x7f00000001c0)) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) 17:09:42 executing program 0: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='keyring\x00', r0) keyctl$negate(0xd, r1, 0x100000000, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r1) clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x1, 0x7, 0x7, 0x7e1d, 0x1, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:42 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) r3 = request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='%{\x00', r0) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r3, 0x0) 17:09:42 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r0) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, 0x0, r1, 0x0) [ 1727.004994][T30499] ================================================================== [ 1727.013081][T30499] BUG: KCSAN: data-race in ktime_get_real_seconds / timekeeping_inject_offset [ 1727.021916][T30499] [ 1727.024218][T30499] write to 0xffffffff8417e978 of 8 bytes by task 1666 on cpu 0: [ 1727.031826][T30499] timekeeping_inject_offset+0x44e/0x820 [ 1727.037442][T30499] do_adjtimex+0x581/0x670 [ 1727.041840][T30499] posix_clock_realtime_adj+0x11/0x20 [ 1727.047201][T30499] __x64_sys_clock_adjtime+0x12c/0x1b0 [ 1727.052651][T30499] do_syscall_64+0x3d/0x90 [ 1727.057050][T30499] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1727.062990][T30499] [ 1727.065294][T30499] read to 0xffffffff8417e978 of 8 bytes by task 30499 on cpu 1: [ 1727.072900][T30499] ktime_get_real_seconds+0x11/0x20 [ 1727.078085][T30499] find_inode_bit+0x1f9/0x330 [ 1727.082743][T30499] __ext4_new_inode+0xc7a/0x2f70 [ 1727.087661][T30499] ext4_symlink+0x2c3/0x700 [ 1727.092143][T30499] vfs_symlink+0x23a/0x300 [ 1727.096541][T30499] do_symlinkat+0xeb/0x280 [ 1727.100940][T30499] __x64_sys_symlink+0x32/0x40 [ 1727.105689][T30499] do_syscall_64+0x3d/0x90 [ 1727.110107][T30499] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1727.116256][T30499] [ 1727.118561][T30499] value changed: 0x00000000612284dd -> 0x00000000612284d6 [ 1727.125703][T30499] [ 1727.128022][T30499] Reported by Kernel Concurrency Sanitizer on: [ 1727.134346][T30499] CPU: 1 PID: 30499 Comm: syz-executor.1 Not tainted 5.14.0-rc6-syzkaller #0 [ 1727.143209][T30499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 17:09:42 executing program 0: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='keyring\x00', r0) keyctl$negate(0xd, r1, 0x100000000, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x1, 0x7, 0x7, 0x7e1d, 0x1, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:42 executing program 4: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r2) 17:09:42 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$link(0x8, r0, r2) r3 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900), 0x8, r3) r4 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$negate(0xd, r3, 0x100000001, r4) [ 1727.153245][T30499] ================================================================== 17:09:42 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, r1, r2, 0x0) 17:09:42 executing program 0: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='keyring\x00', r0) keyctl$negate(0xd, r1, 0x100000000, 0xfffffffffffffffc) clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x1, 0x7, 0x7, 0x7e1d, 0x1, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:42 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='keyring\x00', r0) keyctl$negate(0xd, r1, 0x100000000, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r2) clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x1, 0x7, 0x7, 0x7e1d, 0x1, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:43 executing program 3: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, &(0x7f0000000240)={{0x8, 0x6}, 'port1\x00', 0x60, 0x20, 0x1, 0x2, 0x6, 0x5, 0x9, 0x0, 0x6, 0x2}) r1 = fork() wait4(r1, &(0x7f0000000040), 0x40000000, &(0x7f0000000080)) 17:09:43 executing program 4: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:43 executing program 0: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='keyring\x00', r0) clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x1, 0x7, 0x7, 0x7e1d, 0x1, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:43 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, 0x0, r0, r1, 0x0) 17:09:43 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)=',:\x00', 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)={0x0, 0x0, @c}, 0x29, r1) timer_create(0xa81f9159482da4ba, &(0x7f0000000140)={0x0, 0x38, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000180)=0x0) timer_gettime(r2, &(0x7f00000001c0)) 17:09:43 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='keyring\x00', r0) keyctl$negate(0xd, r1, 0x100000000, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r2) clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x1, 0x7, 0x7, 0x7e1d, 0x1, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:43 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='keyring\x00', r0) keyctl$negate(0xd, r1, 0x100000000, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r2) clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x1, 0x7, 0x7, 0x7e1d, 0x1, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:43 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)=',:\x00', 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)={0x0, 0x0, @c}, 0x29, r1) timer_create(0xa81f9159482da4ba, &(0x7f0000000140)={0x0, 0x38, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000180)) 17:09:43 executing program 4: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:43 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, 0x0, r0, r1, 0x0) 17:09:50 executing program 0: add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x1, 0x7, 0x7, 0x7e1d, 0x1, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:43 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='keyring\x00', r0) keyctl$negate(0xd, r1, 0x100000000, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r1) clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x1, 0x7, 0x7, 0x7e1d, 0x1, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:44 executing program 3: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, &(0x7f0000000240)={{0x8, 0x6}, 'port1\x00', 0x60, 0x20, 0x1, 0x2, 0x6, 0x5, 0x9, 0x0, 0x6, 0x2}) wait4(0x0, &(0x7f0000000040), 0x40000000, &(0x7f0000000080)) 17:09:44 executing program 0: clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x1, 0x7, 0x7, 0x7e1d, 0x1, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:44 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) r0 = request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)=',:\x00', 0xfffffffffffffffe) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) timer_create(0xa81f9159482da4ba, &(0x7f0000000140)={0x0, 0x38, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000180)) 17:09:44 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='keyring\x00', r0) keyctl$negate(0xd, r1, 0x100000000, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x1, 0x7, 0x7, 0x7e1d, 0x1, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:44 executing program 4: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:44 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, 0x0, r0, r1, 0x0) 17:09:44 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)=',:\x00', 0xfffffffffffffffe) timer_create(0xa81f9159482da4ba, &(0x7f0000000140)={0x0, 0x38, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000180)) 17:09:44 executing program 2: r0 = add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, r1, r2, 0x0) 17:09:44 executing program 0: clock_adjtime(0x0, 0x0) 17:09:44 executing program 4: r0 = add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r2) 17:09:44 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='keyring\x00', r0) keyctl$negate(0xd, r1, 0x100000000, 0xfffffffffffffffc) clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x1, 0x7, 0x7, 0x7e1d, 0x1, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:44 executing program 1: keyctl$KEYCTL_MOVE(0xb, 0x0, 0x0, 0xfffffffffffffff9, 0x0) timer_create(0xa81f9159482da4ba, &(0x7f0000000140)={0x0, 0x38, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000180)) 17:09:45 executing program 3: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, &(0x7f0000000240)={{0x8, 0x6}, 'port1\x00', 0x60, 0x20, 0x1, 0x2, 0x6, 0x5, 0x9, 0x0, 0x6, 0x2}) wait4(0x0, &(0x7f0000000040), 0x40000000, &(0x7f0000000080)) 17:09:45 executing program 2: r0 = add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, r1, r2, 0x0) 17:09:45 executing program 5: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='keyring\x00', r0) clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x1, 0x7, 0x7, 0x7e1d, 0x1, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:45 executing program 4: r0 = add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r2) 17:09:45 executing program 0: clock_adjtime(0x0, 0x0) 17:09:45 executing program 1: timer_create(0xa81f9159482da4ba, &(0x7f0000000140)={0x0, 0x38, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000180)) 17:09:45 executing program 1: timer_create(0x0, &(0x7f0000000140)={0x0, 0x38, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000180)) 17:09:45 executing program 0: clock_adjtime(0x0, 0x0) 17:09:45 executing program 4: r0 = add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r2) 17:09:45 executing program 5: add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x1, 0x7, 0x7, 0x7e1d, 0x1, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:45 executing program 2: r0 = add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, r1, r2, 0x0) 17:09:45 executing program 0: clock_adjtime(0x0, &(0x7f0000000080)={0x0, 0x1, 0x7, 0x7, 0x7e1d, 0x1, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:45 executing program 3: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, &(0x7f0000000240)={{0x8, 0x6}, 'port1\x00', 0x60, 0x20, 0x1, 0x2, 0x6, 0x5, 0x9, 0x0, 0x6, 0x2}) wait4(0x0, &(0x7f0000000040), 0x40000000, &(0x7f0000000080)) 17:09:45 executing program 1: timer_create(0x0, &(0x7f0000000140)={0x0, 0x38, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000180)) 17:09:45 executing program 4: r0 = add_key$keyring(&(0x7f0000000700), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r2) 17:09:45 executing program 0: clock_adjtime(0x0, &(0x7f0000000080)={0x0, 0x1, 0x7, 0x7, 0x7e1d, 0x1, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:45 executing program 5: clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x1, 0x7, 0x7, 0x7e1d, 0x1, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:45 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, r1, r2, 0x0) 17:09:46 executing program 5: clock_adjtime(0x0, 0x0) 17:09:46 executing program 4: r0 = add_key$keyring(&(0x7f0000000700), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r2) 17:09:46 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, r1, r2, 0x0) 17:09:46 executing program 0: clock_adjtime(0x0, &(0x7f0000000080)={0x0, 0x1, 0x7, 0x7, 0x7e1d, 0x1, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:46 executing program 1: timer_create(0x0, &(0x7f0000000140)={0x0, 0x38, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000180)) 17:09:46 executing program 5: clock_adjtime(0x0, 0x0) 17:09:46 executing program 4: r0 = add_key$keyring(&(0x7f0000000700), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r2) 17:09:46 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, r1, r2, 0x0) 17:09:46 executing program 3: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() r1 = fork() wait4(r1, &(0x7f0000000040), 0x40000000, &(0x7f0000000080)) 17:09:46 executing program 1: timer_create(0xa81f9159482da4ba, 0x0, &(0x7f0000000180)) 17:09:46 executing program 5: clock_adjtime(0x0, 0x0) 17:09:46 executing program 0: clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x0, 0x7, 0x7, 0x7e1d, 0x1, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:46 executing program 4: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r2) 17:09:46 executing program 5: clock_adjtime(0x0, &(0x7f0000000080)={0x0, 0x1, 0x7, 0x7, 0x7e1d, 0x1, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:46 executing program 0: clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x0, 0x0, 0x7, 0x7e1d, 0x1, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:46 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, r1, r2, 0x0) 17:09:46 executing program 1: timer_create(0xa81f9159482da4ba, 0x0, 0x0) 17:09:46 executing program 4: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r2) 17:09:47 executing program 1: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, &(0x7f0000000240)={{0x8, 0x6}, 'port1\x00', 0x60, 0x20, 0x1, 0x2, 0x6, 0x5, 0x9, 0x0, 0x6, 0x2}) wait4(0x0, &(0x7f0000000040), 0x40000000, &(0x7f0000000080)) 17:09:47 executing program 5: clock_adjtime(0x0, &(0x7f0000000080)={0x0, 0x1, 0x7, 0x7, 0x7e1d, 0x1, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:47 executing program 3: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) r1 = fork() wait4(r1, &(0x7f0000000040), 0x40000000, &(0x7f0000000080)) 17:09:47 executing program 4: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r2) 17:09:47 executing program 0: clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x0, 0x0, 0x0, 0x7e1d, 0x1, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:47 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, r1, r2, 0x0) 17:09:47 executing program 5: clock_adjtime(0x0, &(0x7f0000000080)={0x0, 0x1, 0x7, 0x7, 0x7e1d, 0x1, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:47 executing program 5: clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x0, 0x7, 0x7, 0x7e1d, 0x1, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:47 executing program 4: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), 0x0, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r2) 17:09:47 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, r1, r2, 0x0) 17:09:47 executing program 0: clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:47 executing program 5: clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x0, 0x0, 0x7, 0x7e1d, 0x1, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:47 executing program 1: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, &(0x7f0000000240)={{0x8, 0x6}, 'port1\x00', 0x60, 0x20, 0x1, 0x2, 0x6, 0x5, 0x9, 0x0, 0x6, 0x2}) wait4(0x0, &(0x7f0000000040), 0x40000000, &(0x7f0000000080)) 17:09:47 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, r1, r2, 0x0) 17:09:48 executing program 0: clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:48 executing program 3: semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) r0 = fork() wait4(r0, &(0x7f0000000040), 0x40000000, &(0x7f0000000080)) 17:09:48 executing program 4: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), 0x0, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r2) 17:09:48 executing program 5: clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x0, 0x0, 0x0, 0x7e1d, 0x1, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:48 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, r1, r2, 0x0) 17:09:48 executing program 5: clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:48 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, r1, r2, 0x0) 17:09:48 executing program 0: clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:48 executing program 4: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), 0x0, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r2) 17:09:48 executing program 1: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, &(0x7f0000000240)={{0x8, 0x6}, 'port1\x00', 0x60, 0x20, 0x1, 0x2, 0x6, 0x5, 0x9, 0x0, 0x6, 0x2}) wait4(0x0, &(0x7f0000000040), 0x40000000, &(0x7f0000000080)) 17:09:48 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, r1, r2, 0x0) 17:09:48 executing program 0: clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:48 executing program 5: clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:49 executing program 5: clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:49 executing program 4: add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:49 executing program 3: semget$private(0x0, 0x4, 0x0) r0 = fork() wait4(r0, &(0x7f0000000040), 0x40000000, &(0x7f0000000080)) 17:09:49 executing program 0: clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:49 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000700), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, r1, r2, 0x0) 17:09:49 executing program 5: clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x468f, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:49 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000700), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, r1, r2, 0x0) 17:09:49 executing program 4: add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:49 executing program 1: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) fork() wait4(0x0, &(0x7f0000000040), 0x40000000, &(0x7f0000000080)) 17:09:49 executing program 0: clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:49 executing program 4: add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 17:09:49 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000700), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, r1, r2, 0x0) 17:09:49 executing program 0: clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:49 executing program 5: clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:50 executing program 3: r0 = fork() wait4(r0, &(0x7f0000000040), 0x40000000, &(0x7f0000000080)) 17:09:50 executing program 2: add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, 0x0, r0, r1, 0x0) 17:09:50 executing program 4: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r2) 17:09:50 executing program 5: clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:50 executing program 0: clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:50 executing program 4: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r2) 17:09:50 executing program 1: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) wait4(0x0, &(0x7f0000000040), 0x40000000, &(0x7f0000000080)) 17:09:50 executing program 5: clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:50 executing program 0: clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:50 executing program 2: add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, 0x0, r0, r1, 0x0) 17:09:50 executing program 4: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r2) 17:09:50 executing program 2: add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, 0x0, r0, r1, 0x0) 17:09:51 executing program 3: fork() wait4(0x0, &(0x7f0000000040), 0x40000000, &(0x7f0000000080)) 17:09:51 executing program 0: clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:51 executing program 4: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r2) 17:09:51 executing program 1: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) wait4(0x0, &(0x7f0000000040), 0x40000000, &(0x7f0000000080)) 17:09:51 executing program 5: clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa3c, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:51 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, 0x0, r1, 0x0) 17:09:51 executing program 4: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r2) 17:09:51 executing program 0: clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:51 executing program 1: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001080)) wait4(0x0, &(0x7f0000000040), 0x40000000, &(0x7f0000000080)) 17:09:51 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, 0x0, 0x0, 0x0) 17:09:51 executing program 5: clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:51 executing program 0: clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:52 executing program 3: fork() wait4(0x0, &(0x7f0000000040), 0x40000000, &(0x7f0000000080)) 17:09:52 executing program 1: semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) fork() wait4(0x0, &(0x7f0000000040), 0x40000000, &(0x7f0000000080)) 17:09:52 executing program 4: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r2) 17:09:52 executing program 2: r0 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r2) 17:09:52 executing program 5: clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x845, 0xffffffffffffff1f, 0xc284, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8}) 17:09:52 executing program 0: clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8f, 0x8, 0xffffffffffffff00, 0x3, 0xffffffffffffffc1, 0x5, 0x8})