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"}) accept4$unix(0xffffffffffffffff, &(0x7f0000001200)=@abs, &(0x7f00000000c0)=0x6e, 0x800) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) fchmod(r2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000001500)={0x0, ""/256, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000180)={"61359e13b8c4a6b9a4a3d07561e0fd80", r3, 0x0, {0x470, 0x9}, {0x3, 0x1}, 0x0, [0x7, 0x80, 0x5, 0x5, 0x9, 0xbd, 0x4, 0x4, 0x2, 0x0, 0x0, 0x0, 0x800, 0x6b5]}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000200)={{}, r3, 0xc, @unused=[0x20, 0x7fffffff, 0x0, 0x400], @name="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"}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000240)={"e54f3a64b378cef7b9a38110e03e3188", r1, r3, {0x4, 0xa400}, {0x401, 0x7ff}, 0x5bed, [0x7, 0xb1f, 0x2999cca4, 0x2, 0x3, 0x2, 0x0, 0x3, 0x7, 0x1, 0x3, 0x5d9, 0x5, 0x80000000, 0x3ff, 0x1]}) r4 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r4, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) r6 = dup(r5) dup3(r6, r4, 0x0) 12:25:29 executing program 2: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r2, 0x0) keyctl$chown(0x4, r0, r2, 0xffffffffffffffff) request_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f00000000c0)='asymmetric\x00', r0) 12:25:29 executing program 0: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) r1 = add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000180)="f45f81a543b0f25a715145f22462ee86a464a3991d74083d5dbdb3cbf231ef2f09f93fa401c3f981482113b99d5adca7c61c34f92f444afeef377b249ba1ed642d2fd904ea6bf2b2b72609f44debbadf693a26285b9c7eca4549f039991e2ae043e519c39b15ffc328bc225d43f6d34e1fbc860993b1a2745101283255819f5e5ba63bf7788ea15e", 0x88, r0) add_key$user(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000240)="59de8840c2f5b30fed2b42fbff5e7468f2ea8a137a22e3b77631e383caf4fbf84a648c80b8", 0x25, 0xfffffffffffffffa) keyctl$reject(0x13, r1, 0x2, 0x8, r0) 12:25:29 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x118) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x11, r0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x400000, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r1, &(0x7f0000000040)='./file0\x00', 0x14141, 0x40) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x29ab43db5b8099d4, 0x0, &(0x7f0000000600), 0x0, 0x0) 12:25:30 executing program 2: r0 = getpgrp(0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) tkill(r1, 0x2a) ptrace(0x4207, r0) request_key(&(0x7f0000000040)='logon\x00', &(0x7f0000001ffb)={'syz', 0x3}, 0x0, 0x0) 12:25:30 executing program 0: request_key(&(0x7f0000000040)='pkcs7_test\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) 12:25:30 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0xfeffffffffffff, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:30 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000180)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount_setattr(0xffffffffffffff9c, &(0x7f00000000c0)='\x00', 0x1100, &(0x7f0000000140)={0xa, 0x87e743af2490b140, 0x180000}, 0x20) r2 = dup(r1) dup3(r2, r0, 0x0) 12:25:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x118) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x11, r0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x400000, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r1, &(0x7f0000000040)='./file0\x00', 0x14141, 0x40) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x29ab43db5b8099d4, 0x0, &(0x7f0000000600), 0x0, 0x0) 12:25:30 executing program 2: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000080)={'syz', 0x0}, r0) 12:25:30 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000180)="6f5c26bdb64928b0433edb80d05ef24dd8ce249170519cc3eec0901dfecfcc710dc07639fccb74e44e33799ee3b3febd6b35a49c84a4ee0d867c8c1a6dcbd4fbd614092cf5ff7daa6412e94d8749cf", 0x4f, 0x5e, 0x0, 0x2, r2}]) 12:25:30 executing program 0: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) keyctl$read(0xb, r0, &(0x7f0000000080)=""/138, 0x8a) 12:25:30 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) mount(&(0x7f00000000c0)=@sr0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='binfmt_misc\x00', 0x40020, &(0x7f00000001c0)='\xc3#^{]\x00') dup3(r2, r0, 0x0) 12:25:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="200000004000000003000000300000000f0000000000000002000000020000000080000800800000571e77da20000000dcf4655fdcf4655f0100ffff53ef000000000000000000", 0x47, 0x400}, {&(0x7f0000010400)="02000000030000003f", 0x9, 0x1001}], 0x0, &(0x7f0000000040)) flock(r0, 0x1) 12:25:30 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x100000000000000, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) set_mempolicy(0x1, &(0x7f0000000000)=0x5, 0x33d) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, 0x0, 0x0) 12:25:30 executing program 0: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000001380), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000001440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000001400)={&(0x7f0000001600)=ANY=[@ANYBLOB="600000006d960981591f9692a966f56cca0d7b0b8e107a312706eaa63e1bb08c46530b2ea6b823e95b73610984ea1b720bcdaa6c54d9e6ca089dc15b6d93e689c0584e1ab0ea95435116da865782c5ad8694fc71e10bd68aee11e07cc67a8a8bfbae8e4f0b02b01d2a61d0d9a11b", @ANYRES16=r0, @ANYBLOB], 0x60}}, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in6=@mcast1}}, &(0x7f0000000180)=0x17) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x44, r0, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x3ff}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3f}]}, 0x44}, 0x1, 0x0, 0x0, 0x40841}, 0x10) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) 12:25:30 executing program 2: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, 0x0, 0x0) r1 = request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)='*\x00', r0) keyctl$search(0xa, r1, &(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, r0) request_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='*\x00', 0xfffffffffffffff8) 12:25:30 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000001500)=ANY=[]) r1 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x4, 0x4, &(0x7f0000000380)=[{&(0x7f0000000240)="0db1fe04ee8b6775a1f0427510cc3be1f922308d6d44aa59f40f38eb5937cd691b33f7b30bbf9b5b1a94411b33e3ffb87d7a704b400ac849939023eeab6016b9a63806faae95dedd4c6fa116b22e88e84405ca5bbef68ca642c985dbb96be603d87cc142d5d4519f1985b5302bc5657292eecedf3667d78fac2d5ac40198191a6bb22df52910afcd95352d32f87886ac69cb119c3de8c55370fcda16d25bd9b8ae94a6b07682aa4164ec65c6cee6aec189", 0xb1, 0x5}, {&(0x7f0000000440)="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", 0x1000, 0x3f}, {&(0x7f0000000180)="a02f6553780f5b108f929b4dc05843e9007b387a78387f0f10ebb609763b410ed7d3ace93201d805e53b72df8003f97970363b1c678eb0298d63bd2eecf57f71385f939d14dfdccd5e", 0x49, 0x3ff}, {&(0x7f0000000300)="184d1140d59275797051fa9f75578f287f60e3ceb856b5faa0e1d102f46bf947463e93094a0e5fa03586367fc43af92e51cc0dfe7fe78b58147869964a2909909768ef01aafd54ff5b57b5d548f6f0fbf0c0dbbf23b9274b5e422decbdf20c09888ac4338ef0", 0x66, 0x6}], 0x100000, &(0x7f0000001440)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c73686f72746e616d653d6d697865642c726f6469722c73686f72746e616d653d6d697865642c756e695f786c6174653d302c646f6e745f61707072616973652c646f6e745f6d6561737572652c66736d616769633d3078303030303030303030303030303030302c7375626a5f757365723d76010000002c657569643d", @ANYRESDEC, @ANYBLOB=',smackfsfloor=vfat\x00,\x00']) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x108) open$dir(&(0x7f00000015c0)='./file0\x00', 0x0, 0x252) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = dup(r2) dup3(r3, r0, 0x0) 12:25:30 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x200000000000000, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) [ 701.716512][ T1138] loop5: detected capacity change from 0 to 512 [ 701.744602][ T1138] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 12:25:30 executing program 2: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, 0x0, 0x0) request_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz', 0x3}, &(0x7f0000000380)='(@/]\x00', 0xfffffffffffffff9) keyctl$reject(0x13, r0, 0x4, 0x1a0a, r0) r1 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)="956f45b3597c313e0d4f3010dfb8eeb227409dfc070c56274317ea0176e2cd8b9a84413975e1cc67a926c0b5d92debb3a5047acb92691662fdddb6115415fe1c9f29aee08967171795e25850793e7861ce900521d5267112747ea8fde6081b41402503c4448cf397e6fff50826b9868e7540a7670f9d2a4e9bcea8d77f285a059d7aa2f10cb1c275010d7a5926e83f798fc387d8e14c834ff5a73afb499e12e443a18c05c94177457cf0f76595acc4ec6b1d9c", 0xb3, r0) r2 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @auto=[0x61, 0x34, 0x63, 0x31, 0x31, 0x36, 0x64, 0x64, 0x65, 0x37, 0x38, 0x34, 0x62, 0x64, 0x64, 0x36]}, &(0x7f0000000280)={0x0, "3212edec533dceef1ba058fd874eda9a5b836a6167c2c41aaf14c50139a6136fccf2a990f620523545c313c3bf85ad7d6f38ae56db999ff7eaf964f1e2669135", 0x11}, 0x48, r0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$revoke(0x3, r1) add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0, r2) 12:25:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x23, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000290000000f000000000000000200000002000000008000000080000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32383337383038363200"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e883faa764e6453ab2efc3f3d55b247d010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500080000000000000000000000040000006e00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000029000f0003000400"/32, 0x20, 0x1000}, {&(0x7f0000010500)="ff3f0c00fc010000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c653300000011000000940f090166696c652e636f6c64000000", 0x1080, 0x2000}, {&(0x7f0000011600)="0b0000000c0001022e00000002000000f40f02022e2e00"/32, 0x20, 0x4000}, {&(0x7f0000011700)="00000000001000"/32, 0x20, 0x5000}, {&(0x7f0000011800)="00000000001000"/32, 0x20, 0x6000}, {&(0x7f0000011900)="00000000001000"/32, 0x20, 0x7000}, {&(0x7f0000011a00)="504d4d00504d4dffe0f4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7032390075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/128, 0x80, 0x8000}, {&(0x7f0000011b00)="111fc0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x9000}, {&(0x7f0000011c00)="0200"/32, 0x20, 0x9400}, {&(0x7f0000011d00)="0300"/32, 0x20, 0x9800}, {&(0x7f0000011e00)="0400"/32, 0x20, 0x9c00}, {&(0x7f0000011f00)="0500"/32, 0x20, 0xa000}, {&(0x7f0000012000)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000d000"/96, 0x60, 0xa400}, {&(0x7f0000012100)="2719c0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0xb000}, {&(0x7f0000012200)="0200"/32, 0x20, 0xb400}, {&(0x7f0000012300)="0300"/32, 0x20, 0xb800}, {&(0x7f0000012400)="0400"/32, 0x20, 0xbc00}, {&(0x7f0000012500)="0500"/32, 0x20, 0xc000}, {&(0x7f0000012600)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000d000"/96, 0x60, 0xc400}, {&(0x7f0000012700)="0c0000000c0001022e000000020000000c0002022e2e00000d0000001000050166696c65300000000e000000d80f050766696c653100"/64, 0x40, 0xd000}, {&(0x7f0000012800)="ffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff000002ea0100000001000000270f240c000000000000000000000000000000000601f80f0000000006000000779b539778617474723100000601f00f00000000060000007498539778617474723200"/4192, 0x1060, 0x12000}, {&(0x7f0000013900)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xattr2\x00\x00xattr1\x00\x00', 0x20, 0x13fe0}, {&(0x7f0000013a00)="0000000000000000dff4655fdff4655fdff4655f00"/32, 0x20, 0x22000}, {&(0x7f0000013b00)="ed41000000100000dff4655fe0f4655fe0f4655f00000000000004000800000000000800050000000af301000400000000000000000000000100000003000000", 0x40, 0x22080}, {&(0x7f0000013c00)="8081000000180000dff4655fdff4655fdff4655f00000000000001001000000010000800000000000af301000400000000000000000000000200000009000000", 0x40, 0x22100}, {&(0x7f0000013d00)="8081000000180000dff4655fdff4655fdff4655f00000000000001001000000010000800000000000af30100040000000000000000000000020000000b000000", 0x40, 0x22180}, {&(0x7f0000013e00)="c041000000400000dff4655fdff4655fdff4655f00000000000002002000000000000800000000000af301000400000000000000000000000400000004000000", 0x40, 0x22500}, {&(0x7f0000013f00)="ed41000000100000e0f4655fe0f4655fe0f4655f00000000000002000800000000000800030000000af30100040000000000000000000000010000000d0000000000000000000000000000000000000000000000000000000000000000000000000000003934797f000000000000000000000000000000000000000000000000ed8100001a040000e0f4655fe0f4655fe0f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000023000000000000000000000000000000000000000000000000000000000000000000000000000000c24b17ab000000000000000000000000000000000000000000000000ffa1000026000000e0f4655fe0f4655fe0f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3238333738303836322f66696c65302f66696c653000000000000000000000000000000000000000000000da215ae9000000000000000000000000000000000000000000000000ed8100000a000000e0f4655fe0f4655fe0f4655f00000000000001001000000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000375fe294130000000000000000000000000000000000000000000000ed81000028230000e0f4655fe0f4655fe0f4655f00000000000002001800000000000800010000000af301000400000000000000000000000300000025000000020000000100000027000000020000000180000027000000000000000000000000000000baf0fe92000000000000000000000000000000000000000000000000ed81000064000000e0f4655fe0f4655fe0f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000028000000000000000000000000000000000000000000000000000000000000000000000000000000585592da00"/768, 0x300, 0x22580}, {&(0x7f0000014200)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x23000}, {&(0x7f0000014700)='syzkallers\x00'/32, 0x20, 0x24000}, {&(0x7f0000014800)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x28000}], 0x0, &(0x7f0000014900)) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r1, 0x0) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)=@v3={0x3000000, [{0xb82, 0x2}, {0x1000, 0x3}], r1}, 0x18, 0x3) 12:25:30 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000180)="6f5c26bdb64928b0433edb80d05ef24dd8ce249170519cc3eec0901dfecfcc710dc07639fccb74e44e33799ee3b3febd6b35a49c84a4ee0d867c8c1a6dcbd4fbd614092cf5ff7daa6412e94d8749cf", 0x4f, 0x5e, 0x0, 0x2, r2}]) [ 701.876265][ T1177] loop5: detected capacity change from 0 to 640 12:25:30 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) renameat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) open(&(0x7f0000000180)='./file0\x00', 0x54681, 0x4) r2 = dup(r1) dup3(r2, r0, 0x0) 12:25:30 executing program 2: r0 = request_key(&(0x7f0000000040)='blacklist\x00', &(0x7f0000001ffb)={'syz', 0x3}, 0x0, 0xffffffffffffffff) r1 = request_key(&(0x7f00000002c0)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)='blacklist\x00', r0) request_key(&(0x7f0000000200)='ceph\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)='syz', r1) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000004c0)='.dead\x00', r1) r2 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f00000009c0)={'syz', 0x0}, 0x0, 0x0) keyctl$invalidate(0x15, r2) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='syz', r2) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, r0) add_key(&(0x7f0000000000)='.dead\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)="a9463e68dd883838aafd50b2a565625fe12ff0814d2ebd65bff78bff9a0d6434b30dd17a0f560d7a123b0cc708a24ce0695613e347cf77cf88f07ae6740a14aefa2360f9ef59c64da45f5e19940b16377e3aa1a8bfe0ef395cbabd1580205dc5950c61b53d99258d7158d80e03933ff7ca745a505c03808718d5aa79ce6783d062f4d065666b215feef3d7a1", 0x8c, r3) 12:25:30 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x300000000000000, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:30 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000480)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) r0 = add_key(&(0x7f00000000c0)='rxrpc\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000240)="0d38cb976143ef96d1bb3e1f24eaa5565742272f44ae23ffa09dd1152da49650b0fa", 0x22, 0xfffffffffffffff8) add_key$user(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000180)="f8460930752100071f66d07b18588636bd1f5a859d4b1bb6e73170c9dbcdb35e9ddce44bcc2db98deeb6132e6596ef0afc0000000089a28d9cae4af9b9d901018955e675222252bceba01666707ec4501cb6b06cc50cfc2f7194d5123fe62f92fb1823ccfea8eb1cc2889a8d707f82a0a62de8d2c94d0983f5dd7b51ef7db0f31ae1cb5776dd94c14e9a80f00d604b5ef42f361cce0bfe931ef9395d445002", 0x9f, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000300), &(0x7f0000000340)={'fscrypt:', @desc2}, &(0x7f0000000380)={0x0, "92e9aa2e7313a518d6649cd7b9958922635aab8e9070238f9aedc72434721d8003ea4a972c965302b960edbd584ed1d3571bc8d711a8155d5fe6d7f4d632ce9f", 0x4}, 0x48, 0xfffffffffffffffe) r2 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f00000009c0)={'syz', 0x0}, 0x0, 0x0) keyctl$invalidate(0x15, r2) add_key$keyring(&(0x7f0000000400), &(0x7f0000000440)={'syz', 0x0}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r1) [ 701.922206][ T1177] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 701.948100][ T1177] ext4 filesystem being mounted at /root/syzkaller-testdir462878392/syzkaller.rJn6AT/2335/file0 supports timestamps until 2038 (0x7fffffff) 12:25:30 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x5, &(0x7f0000000700)='./file0\x00', r1, &(0x7f0000000880)="ae724c2d0de258bd7d335d685705e4749adaac233608f63438fc47b4fe88a611207fb8431358567f1399136f5a8540ced5") umount2(&(0x7f0000000040)='./file0\x00', 0x2) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = dup(r2) r4 = dup3(r3, r0, 0x0) syz_mount_image$nfs(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x1000, 0x5, &(0x7f0000000600)=[{&(0x7f0000000280)="0c88e46c321a9f663825d556f42c2b6cb3b6ee610df2f22feedb462173e067cdcf4eadb9a8a27e9775da16a3e557c095b87da249e945bd460230052550019631f80660ef2c9ad41067acc247095ad009fa386790552064b970a527f00934de685980eaa6679e629bd2de118e293c2fc7b0bc4d69f472a7ab1c7ea4723d720f87dd46418acb99e1bc4d73b0626108ee779d7f7d8d990f33795f191e9ee2d7423fbe03431a3cb98e071bac56580709966becc4805012b6459d4e6e8c841788b7d6cb71e364382e9b39a2684b5a901e2fa8e3a92cd8c25e4529ff9c4cd6eff023eb876e9bf7d68dc90adcbc9d6203eece68", 0xf0, 0x80000001}, {&(0x7f0000000380)="eb7f3581d1630c894be602c8b9497731409a8ecf5f491539e768da7bdbe39bfbe94c94221de5e52927fc15e5c3dddd8c0a3335b18f7da620910c7c509d1975784b0df2a9bc", 0x45, 0x4}, {&(0x7f0000000440)="adf517767ee0b414603150b7da4876fadc583c8e5689a2613539f482e2d60988e598e8706a99a774074bd7611888ab53fb1ed2b92e7d2abbb5aa9e0a59700bf0bbb09db8137cd9fb6feb2e5c735e64f545b6647503e4a2436a58298b2e79453b7d36e1b0533293a28c0d", 0x6a, 0x1}, {&(0x7f00000004c0)="ce7a0c9f4d08c39a2c629435013f80e13aa9012e7662b4a8bf8daba1aab628fad449a902016185339e2ffbb36c5df0ca1fb06c752176e4dee3151740eb65649b7386f3107a3430c6ffcd22fa975f3b64849bca87c28dfbb851054425da746f10e29e2a4a81ce083a8ba2381154e41f4bdef0809015accf687e1db0f688f844deb50ad6bffb370e73acf4eb598f3d2a67958ae5c9587bea1620e927f133c3f6786725e3df5a220117503ed89c467a909943906164ad7ece8ca2ecab7144e3fc7a1587c3b68b0d87dbd41a250fd2314ed29393add0d163827b4b621baca25950ae02b2cebd38ccdb91a1e335", 0xeb, 0x8}, {&(0x7f00000005c0)="11384beefd13735262f3bfcf65a036a787d8443cc881f4668aedbf733c", 0x1d, 0x2}], 0x1080060, &(0x7f0000000680)={[{}, {'[u%Zi'}, {'vfat\x00'}, {'vfat\x00'}], [{@smackfsdef={'smackfsdef', 0x3d, '%(]#{'}}, {@fsmagic={'fsmagic', 0x3d, 0x6}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'vfat\x00'}}]}) r5 = accept(r4, &(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f00000000c0)=0x80) r6 = dup(r0) fcntl$setstatus(r6, 0x4, 0x800) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4, 0x11, r5, 0xd0e2b000) 12:25:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x23, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000290000000f000000000000000200000002000000008000000080000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32383337383038363200"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e883faa764e6453ab2efc3f3d55b247d010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500080000000000000000000000040000006e00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000029000f0003000400"/32, 0x20, 0x1000}, {&(0x7f0000010500)="ff3f0c00fc010000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c653300000011000000940f090166696c652e636f6c64000000", 0x1080, 0x2000}, {&(0x7f0000011600)="0b0000000c0001022e00000002000000f40f02022e2e00"/32, 0x20, 0x4000}, {&(0x7f0000011700)="00000000001000"/32, 0x20, 0x5000}, {&(0x7f0000011800)="00000000001000"/32, 0x20, 0x6000}, {&(0x7f0000011900)="00000000001000"/32, 0x20, 0x7000}, {&(0x7f0000011a00)="504d4d00504d4dffe0f4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7032390075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/128, 0x80, 0x8000}, {&(0x7f0000011b00)="111fc0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x9000}, {&(0x7f0000011c00)="0200"/32, 0x20, 0x9400}, {&(0x7f0000011d00)="0300"/32, 0x20, 0x9800}, {&(0x7f0000011e00)="0400"/32, 0x20, 0x9c00}, {&(0x7f0000011f00)="0500"/32, 0x20, 0xa000}, {&(0x7f0000012000)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000d000"/96, 0x60, 0xa400}, {&(0x7f0000012100)="2719c0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0xb000}, {&(0x7f0000012200)="0200"/32, 0x20, 0xb400}, {&(0x7f0000012300)="0300"/32, 0x20, 0xb800}, {&(0x7f0000012400)="0400"/32, 0x20, 0xbc00}, {&(0x7f0000012500)="0500"/32, 0x20, 0xc000}, {&(0x7f0000012600)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000d000"/96, 0x60, 0xc400}, {&(0x7f0000012700)="0c0000000c0001022e000000020000000c0002022e2e00000d0000001000050166696c65300000000e000000d80f050766696c653100"/64, 0x40, 0xd000}, {&(0x7f0000012800)="ffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff000002ea0100000001000000270f240c000000000000000000000000000000000601f80f0000000006000000779b539778617474723100000601f00f00000000060000007498539778617474723200"/4192, 0x1060, 0x12000}, {&(0x7f0000013900)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xattr2\x00\x00xattr1\x00\x00', 0x20, 0x13fe0}, {&(0x7f0000013a00)="0000000000000000dff4655fdff4655fdff4655f00"/32, 0x20, 0x22000}, {&(0x7f0000013b00)="ed41000000100000dff4655fe0f4655fe0f4655f00000000000004000800000000000800050000000af301000400000000000000000000000100000003000000", 0x40, 0x22080}, {&(0x7f0000013c00)="8081000000180000dff4655fdff4655fdff4655f00000000000001001000000010000800000000000af301000400000000000000000000000200000009000000", 0x40, 0x22100}, {&(0x7f0000013d00)="8081000000180000dff4655fdff4655fdff4655f00000000000001001000000010000800000000000af30100040000000000000000000000020000000b000000", 0x40, 0x22180}, {&(0x7f0000013e00)="c041000000400000dff4655fdff4655fdff4655f00000000000002002000000000000800000000000af301000400000000000000000000000400000004000000", 0x40, 0x22500}, {&(0x7f0000013f00)="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"/768, 0x300, 0x22580}, {&(0x7f0000014200)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x23000}, {&(0x7f0000014700)='syzkallers\x00'/32, 0x20, 0x24000}, {&(0x7f0000014800)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x28000}], 0x0, &(0x7f0000014900)) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r1, 0x0) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)=@v3={0x3000000, [{0xb82, 0x2}, {0x1000, 0x3}], r1}, 0x18, 0x3) 12:25:30 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b6673148e617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000300)=ANY=[]) mkdirat(r0, &(0x7f00000002c0)='./file0\x00', 0x160) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x7) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) r3 = dup3(r2, r0, 0x0) r4 = openat2(r3, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={0x86000, 0x0, 0x10}, 0x18) r5 = syz_open_dev$vcsu(&(0x7f00000001c0), 0xcc, 0x400) renameat2(r5, &(0x7f0000000240)='./file0\x00', r4, &(0x7f0000000280)='./file0\x00', 0x3) mount(&(0x7f0000000300)=@md0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='ncpfs\x00', 0x14c8, &(0x7f00000003c0)='vfat\x00') openat(r4, &(0x7f0000000180)='./file0\x00', 0x709341, 0x102) 12:25:30 executing program 0: r0 = request_key(&(0x7f0000000040)='blacklist\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000080)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\v\\\x89rVix~\xc7\x17\xc3j\xf5\xfcsm\xdf\xa4w', 0x0) keyctl$search(0xa, r0, &(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0xfffffffffffffffe) 12:25:30 executing program 2: request_key(&(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0x6, r0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$invalidate(0x15, r0) 12:25:30 executing program 0: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) r1 = add_key(&(0x7f0000000100)='trusted\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)="ca21f64a4d162074b41dbabb970f62053171ee687f34aa8b6136329ad4e44c34f8c334a46e9d31012ee74bffc6d48501dee79757159503f798ce46c2f17b87833b46e435aa25fffca7b838e9513a7afff0b3c4bb9deaa64c8a0581a3bcf055a8a4d3425f7dd934e26fec9d0012b29292070d3a0261fb921329eca2fec6b8d0eb9038f44f90d76908689f6a9530d40af21b592f1e557b53f5cf1b2ff30be0f5a25ab910c04fc61aef5c54e8f037614e126a46bf59079f200d812bf07a1c0d4795285effa5a40da99f31c6b7479a9c67f496928888487def9c3b631b0523ccc2bbc78949763e12cacba1a865fef9ce834095414b194448cdf56c701b9f", 0xfc, r0) request_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='\xf3#:}\\\x00', r1) 12:25:30 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) dup3(r2, r0, 0x0) r3 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000140)='./file0/file0\x00', 0x307445da, 0x1, &(0x7f0000000180)=[{&(0x7f0000000240)="715b2ec4a3274a73be50ea102480647090fabc4114ff292af6241cb94b8ccc1738e73885c2bb0d7999355e9a8dc4cd5df7951f7e4748a7bf8894f318a752aaa3348e83b3711527e9972ebcc499114dec6b409ef0c8155863be2ffd25e1df6e67b39172012221c5a2a1d0459e89c7250cc3e819f6113d9fa1a89c9c3562fc616d1308ae21baca8e5922246e55e5e69088f939ad487c38c9849268fb8412f2833795f8ba", 0xa3, 0x2}], 0x1001000, &(0x7f00000001c0)={[{@nodots}, {@fat=@nfs}, {@fat=@tz_utc}], [{@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '*'}}]}) fspick(r3, &(0x7f0000000300)='./file0\x00', 0x1) [ 702.102157][ T1221] loop5: detected capacity change from 0 to 640 12:25:30 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000180)="6f5c26bdb64928b0433edb80d05ef24dd8ce249170519cc3eec0901dfecfcc710dc07639fccb74e44e33799ee3b3febd6b35a49c84a4ee0d867c8c1a6dcbd4fbd614092cf5ff7daa6412e94d8749cf", 0x4f, 0x5e, 0x0, 0x2, r2}]) 12:25:30 executing program 2: request_key(&(0x7f0000000040)='cifs.spnego\x00', &(0x7f0000001ffb)={'syz', 0x3}, 0x0, 0x0) 12:25:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000001, 0x10010, r0, 0xa5c15000) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebt>\xda\xd7c\xaeI\xfd~\xc7\x17', 0x0) 12:25:30 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x400000000000000, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:30 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r1) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0), 0x200040, 0x0) dup3(r2, r0, 0x0) 12:25:30 executing program 0: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000180)={'fscrypt:', @desc1}, &(0x7f00000001c0)={0x0, "c207705161c52a33e26fc421ee3c9b5ff4e42a540d49e7c5ced531aaf71482d5162f336bad7b36049186d70700700be004a7f86c5370adaf12be91997a3eaec6", 0x21}, 0x48, r0) request_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)='*&[\x00', r0) request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', r1) 12:25:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x23, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000290000000f000000000000000200000002000000008000000080000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32383337383038363200"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e883faa764e6453ab2efc3f3d55b247d010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500080000000000000000000000040000006e00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000029000f0003000400"/32, 0x20, 0x1000}, {&(0x7f0000010500)="ff3f0c00fc010000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c653300000011000000940f090166696c652e636f6c64000000", 0x1080, 0x2000}, {&(0x7f0000011600)="0b0000000c0001022e00000002000000f40f02022e2e00"/32, 0x20, 0x4000}, {&(0x7f0000011700)="00000000001000"/32, 0x20, 0x5000}, {&(0x7f0000011800)="00000000001000"/32, 0x20, 0x6000}, {&(0x7f0000011900)="00000000001000"/32, 0x20, 0x7000}, {&(0x7f0000011a00)="504d4d00504d4dffe0f4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7032390075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/128, 0x80, 0x8000}, {&(0x7f0000011b00)="111fc0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x9000}, {&(0x7f0000011c00)="0200"/32, 0x20, 0x9400}, {&(0x7f0000011d00)="0300"/32, 0x20, 0x9800}, {&(0x7f0000011e00)="0400"/32, 0x20, 0x9c00}, {&(0x7f0000011f00)="0500"/32, 0x20, 0xa000}, {&(0x7f0000012000)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000d000"/96, 0x60, 0xa400}, {&(0x7f0000012100)="2719c0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0xb000}, {&(0x7f0000012200)="0200"/32, 0x20, 0xb400}, {&(0x7f0000012300)="0300"/32, 0x20, 0xb800}, {&(0x7f0000012400)="0400"/32, 0x20, 0xbc00}, {&(0x7f0000012500)="0500"/32, 0x20, 0xc000}, {&(0x7f0000012600)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000d000"/96, 0x60, 0xc400}, {&(0x7f0000012700)="0c0000000c0001022e000000020000000c0002022e2e00000d0000001000050166696c65300000000e000000d80f050766696c653100"/64, 0x40, 0xd000}, {&(0x7f0000012800)="ffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff000002ea0100000001000000270f240c000000000000000000000000000000000601f80f0000000006000000779b539778617474723100000601f00f00000000060000007498539778617474723200"/4192, 0x1060, 0x12000}, {&(0x7f0000013900)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xattr2\x00\x00xattr1\x00\x00', 0x20, 0x13fe0}, {&(0x7f0000013a00)="0000000000000000dff4655fdff4655fdff4655f00"/32, 0x20, 0x22000}, {&(0x7f0000013b00)="ed41000000100000dff4655fe0f4655fe0f4655f00000000000004000800000000000800050000000af301000400000000000000000000000100000003000000", 0x40, 0x22080}, {&(0x7f0000013c00)="8081000000180000dff4655fdff4655fdff4655f00000000000001001000000010000800000000000af301000400000000000000000000000200000009000000", 0x40, 0x22100}, {&(0x7f0000013d00)="8081000000180000dff4655fdff4655fdff4655f00000000000001001000000010000800000000000af30100040000000000000000000000020000000b000000", 0x40, 0x22180}, {&(0x7f0000013e00)="c041000000400000dff4655fdff4655fdff4655f00000000000002002000000000000800000000000af301000400000000000000000000000400000004000000", 0x40, 0x22500}, {&(0x7f0000013f00)="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"/768, 0x300, 0x22580}, {&(0x7f0000014200)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x23000}, {&(0x7f0000014700)='syzkallers\x00'/32, 0x20, 0x24000}, {&(0x7f0000014800)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x28000}], 0x0, &(0x7f0000014900)) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r1, 0x0) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)=@v3={0x3000000, [{0xb82, 0x2}, {0x1000, 0x3}], r1}, 0x18, 0x3) 12:25:30 executing program 2: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, 0x0, 0x0) request_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='syz', r0) [ 702.144342][ T1221] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 702.171684][ T1221] ext4 filesystem being mounted at /root/syzkaller-testdir462878392/syzkaller.rJn6AT/2336/file0 supports timestamps until 2038 (0x7fffffff) 12:25:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x42) r1 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x8, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17, 0x879}, {0x0, 0x0, 0x5fc}], 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX, @ANYRESOCT=r0, @ANYRESOCT=r0]) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = dup(r2) r4 = dup3(r3, r1, 0x0) ioctl$KDSKBMODE(r4, 0x4b45, &(0x7f0000000140)=0x2) 12:25:30 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x10200, 0x0) renameat2(r1, &(0x7f0000000140)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00', 0x1) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = dup(r3) open(&(0x7f00000000c0)='./file0\x00', 0x401, 0x140) dup3(r4, r0, 0x0) 12:25:30 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x3, 0x20000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000001b00)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97\x04\x03\xdc\r\xd3\x85)\x18+j\xa6&\x8a\x85\xda\xbc\xfc\xcdx\xa8\x96\x83\x99\x15-_\xdf(\xbb\xb4VJh\xdfl94\x8c\x872\x8a.\v\x8d^\x10\x1bfJgD\x9d\xe0T\xa4\xc4\n\x8c_\f\x96\x19\xff\x14\x15\xddI\xa1!\xe7cf\xd95\xe9s\x1e\x8d\xb7~E\x94\xbf\xb3\xae\xdf\x14\xa3ofG\xf6\xe4\xcb\t\x8f\xea\x97\x03\xbbg\"\x83\xbb7L\xdfzD\xa7\xb7k\xaeW\xe3\x1ewpN\xeb-4\x91kr\xbc\xfep\xfbmQ(2\t\x90\xb9\x93\xcb\xd1\x13,0 \xc8D\xe7\xf26Q\xd3\xa8\xa3\x86\xf4\xa5') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000b40)='lo\x00\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x500000000000000, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) [ 702.260619][ T1250] loop5: detected capacity change from 0 to 640 12:25:30 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000180)="6f5c26bdb64928b0433edb80d05ef24dd8ce249170519cc3eec0901dfecfcc710dc07639fccb74e44e33799ee3b3febd6b35a49c84a4ee0d867c8c1a6dcbd4fbd614092cf5ff7daa6412e94d8749cf", 0x4f, 0x5e, 0x0, 0x2, r2}]) 12:25:30 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fa1f147c7378f364602812c66538d750d6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa08eb298802d8f6c177d77439352507f7018b31fdc6db429857e794878a99387b088b19a2380b3ada751e68147db6dcdf4dc57753e81d2280a967bd6850a6e3f8fe11965f40ce332902d5f5a1fa1be9d8ffd5a6c0f8f408ceb77fadc5d7939932ddcbe7316df2b2905bf3f5f8d655e5cd418c7d84ed98aa3a05bec093e307b2d3bdea18093e66ab152db8d83d23366ee6824d69ec8c64f4501da2b6ad7a512abe98d2a5eb03a31e75e88de15eb2322da239cb592e", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x3) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f00000009c0)={'syz', 0x0}, 0x0, 0x0) keyctl$invalidate(0x15, r1) request_key(&(0x7f0000000040)='.dead\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000340)='\x99\xfarViv~\xc7\x97\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\xf3!\x85P\"\x9a\b\xc0\x01\xca\xb3T~\x04\xb4fJ\x188\x96\xa9\xb5R\xab\xaap\\\xdc\x8c\xdf\x90\xb0\xaf\xa6\x8e@\x8e\\\x93\f\xe7\ni\x98\x19(\x14\xbc\x98\xfe\x0e\xd2U\xe4\x02;\xf3\x9e\x00\x00\x0eG\xb8:Fv\xfd*\xccGd\x80ss\xc4\xd0:|F\xce\xf5L\x9a(\xa6\xba\xcd\x90\xf8\x80Q\xba\xef\x92\xa7\xd2u[\xec\xdc\x85\'\xf2\xcd1\xd6I\x10\ne\x82\x9e\xa48\xed<\x18@\x93\xc0x\xfb(9\xb3\xbc\x00\x00\x001\x96I\x1e\x01oU\xa5\xafw\xb2\xe7(\x00\xb8v\x14MR\xbe;R\xadUv\xba0\xd2\x1a\x1fW\xb3', r1) 12:25:30 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x11) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) dup3(r2, r0, 0x0) 12:25:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000126000/0x2000)=nil, 0x2000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)="cc", 0x1}], 0x3, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x120, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x25) 12:25:30 executing program 5: fstatfs(0xffffffffffffffff, &(0x7f0000000100)=""/119) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) clone3(&(0x7f0000000000)={0x118020100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x200000, 0x20) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0xc42, 0x0) [ 702.314767][ T1250] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 702.330925][ T1250] ext4 filesystem being mounted at /root/syzkaller-testdir462878392/syzkaller.rJn6AT/2337/file0 supports timestamps until 2038 (0x7fffffff) 12:25:30 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x700000000000000, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000126000/0x2000)=nil, 0x2000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)="cc", 0x1}], 0x3, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x120, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x25) 12:25:30 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r2, &(0x7f00000004c0)={&(0x7f0000000040)={0x2, 0x4e22, @local}, 0x10, 0x0, 0x0, &(0x7f0000000400)=[@ip_ttl={{0x12, 0x11, 0x67}}], 0x28}, 0x0) recvmmsg(r0, &(0x7f0000004580)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) shutdown(r1, 0x2) 12:25:30 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000240)=""/63, 0x3f}, {&(0x7f0000000280)=""/106, 0x6a}], 0x2, 0x100, 0x1f) sendmsg$NFNL_MSG_ACCT_DEL(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x48, 0x3, 0x7, 0xe6771786168d9b7a, 0x0, 0x0, {0x7, 0x0, 0x7}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x3}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0xfffffffffffffffa}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x3}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x48}}, 0x40) r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r0) 12:25:30 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) r3 = dup3(r2, r0, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f00007f9000/0x4000)=nil, 0x4000, 0x4, 0x20010, r3, 0x14558000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r4, 0x5404, &(0x7f00000000c0)={0x1b64, 0x9, 0x4, 0x4, 0x9, "19d26646b2cb440bf1c67492ed1cb0773831f2"}) r5 = fspick(r3, &(0x7f0000000140)='./file0\x00', 0x0) fchdir(r5) 12:25:30 executing program 0: sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[@ANYBLOB="280000000b0601020000000000000000030000020900020073797a32000000000500010007000000729cfe264cdc2e1a66723eecca4eb8cf611566d2c28c008fc534fe4d76aacbf33779c17a79b278cdfec84661f50ebb7dc9ef0ad1c795aba0ed90f061d75b57d28421e888064492ba20e76411a3ed4ba17200ece66203033d218ea64e733557068eec13b2f5da570b6592a9dd75ae744deb8b0ecd6c29ea80f92fd8"], 0x28}, 0x1, 0x0, 0x0, 0x24000004}, 0x24000010) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x48, 0x4, 0x8, 0x801, 0x0, 0x0, {0xc, 0x0, 0xa}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}, @CTA_TIMEOUT_NAME={0x0, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) add_key(&(0x7f00000000c0)='blacklist\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000280)="c9fb4c435f7452868a6ed3ed1b5b289c6935c83ddc7bfe50c376cd447e537b38c48f47c2acc812ceca9f998e6d262fac9dc74d8bc96b8259e23978b17a97a1bbe0de68be6f547ef2013edb179d3d96ea4c4be6760b9143074be4aad55ae36f144645d8deb7c69d94274f1e729cc054351033a0fd6d55ace1776be1f7538a4d0da6833860927757ad4e6bd2a1394630bbf21cadac49cf9f1f8d6819e7a9c0f5e9db879f07f3d281d497c26375036a730301e8e5492b670ad535cb204cd0616be5d73f69b1c9b882eb5a0f6ce6d59feb6c9b0aa897bb89284a5719b409b3cf17e908db37571d30e9653dd1500bd51edced829e69", 0xf3, r0) add_key$user(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000180)="d02ba9c3d406bd5ec7ca7bb100cb92ad814c91157ff3cd5a4af4def57447832610db93b9aba404aa4004ea972145ce045941ccb21fa5fc75bc04a66f84692b4b78228292c7a1a1bc6eaedec1d198506fe2cd2f60b5f7ee30661f1a9b07dd21c2e0e1c11ba8576abd3b0fdd33329900ede3c9fb6fbd2ae47ced2828cc05527590f09c6e35f2c6a798998b72aeb66a49078d9129fb70d5ad23618dbfaf209e4299a7b7014fe44b85bc178ba27e82f871e04fb07d5991dc5fad30bb4d267c006acae22261e614a73418c6ecb42c3e6d064595ead73b012d191ed9ba23af348f83fb686f7afbe0c0facebf4fc4", 0xeb, r0) 12:25:30 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r1, &(0x7f0000000300)='./file1\x00', 0x12000, 0x10) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) r3 = accept4$inet(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000180)=0x10, 0x800) ioctl$BTRFS_IOC_SNAP_CREATE(r3, 0x50009401, &(0x7f0000000440)={{r2}, "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"}) open(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x34) setxattr$trusted_overlay_upper(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), &(0x7f0000000280)={0x0, 0xfb, 0x68, 0x4, 0x3f, "e616609e8daceba1ae2a261103abea98", "9e5eb168433df3420a213be48f35378eef0e84d993d597de758050c0642217265864fb2c245b679663b8b015a74b46e726416a849e0cf69ef083498d757280a96060729ef177504a78fd915aee1fa9fd2fd5a4"}, 0x68, 0x2) dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) fchmod(r4, 0x0) dup3(r4, r0, 0x0) 12:25:31 executing program 0: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='syz', r0) 12:25:31 executing program 2: sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="5700b08cd08bdea67567c89ff911b55c9d0030b752f70fb260479dd6046546b36bc54dade08dafc5cbdceb7b0000000000a4b021730dfb73a19b87a939d149d4e8f0cc6c5415a47ba8449fe30f79b40c3235a3d77e823a001748147e282c74ff8d8dd46d46795a44947ee3a1040edda88aff22807250cb0c53364713bb04b45d19b1fd5b3de69541609aa36624e85dfa42b402961fa186083a4dd3765a1f0dcf4c4835c52f3d06e2aace8537f6d7f104a1cc4ef21ad57b8ddc63d16349db3c7ea580c4485fe649bd56984d9576a789a708d6980c7148f098c39fe4725d622b0c77eae1bd2d22602b9fab2c", @ANYRES16=0x0, @ANYBLOB], 0xc8}, 0x1, 0x0, 0x0, 0x4000000}, 0x50) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000d07000/0x1000)=nil) shmctl$IPC_SET(r0, 0x1, 0x0) shmctl$SHM_LOCK(r0, 0xb) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x41, 0x8001, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7fffffff, 0x0, 0x0, 0x80000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x20, &(0x7f00003d9000/0x1000)=nil) shmat(r0, &(0x7f0000d07000/0x1000)=nil, 0x6000) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000380)=""/188) r1 = shmat(0x0, &(0x7f0000ffa000/0x4000)=nil, 0x5000) shmdt(r1) shmdt(r1) shmctl$IPC_RMID(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x3, 0x0) shmctl$IPC_RMID(r0, 0x0) sendmsg(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) r3 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) r4 = shmat(r3, &(0x7f0000ffa000/0x3000)=nil, 0x0) shmdt(r4) shmdt(r4) 12:25:31 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000180)="6f5c26bdb64928b0433edb80d05ef24dd8ce249170519cc3eec0901dfecfcc710dc07639fccb74e44e33799ee3b3febd6b35a49c84a4ee0d867c8c1a6dcbd4fbd614092cf5ff7daa6412e94d8749cf", 0x4f, 0x5e, 0x0, 0x2, r2}]) 12:25:31 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r3, 0x0, 0xee00) fchmod(r3, 0x0) poll(&(0x7f00000000c0)=[{r3, 0x6024}], 0x1, 0x9fcf) dup3(r2, r0, 0x0) 12:25:31 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) dup(0xffffffffffffffff) dup2(r0, r1) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="bb1249987b63b860800008"], 0x15) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000440)='./file0\x00', 0x158) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f0000000080)=@req={0x7, 0xfffffffc, 0x2, 0xfffffffc}, 0x10) 12:25:31 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x800000000000000, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:31 executing program 0: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) r1 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f00000009c0)={'syz', 0x0}, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r3 = request_key(&(0x7f0000000200)='big_key\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)='blacklist\x00', r0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$invalidate(0x15, r2) keyctl$invalidate(0x15, r1) r5 = add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc3}, &(0x7f0000000340)={0x0, "c3a1339ae4fb0cc70460eccb4166acf30728ec656df88991d6b1d6048b2504c5733a48377a4f8d3e33e4bdbfea951a3ffc703f33a9033c2d2d79ac4c47d8ee17", 0x2e}, 0x48, 0xfffffffffffffff8) keyctl$link(0x8, r4, r5) keyctl$search(0xa, 0x0, &(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, r1) 12:25:31 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file1\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount(&(0x7f0000000180)=@nullb, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000240)='romfs\x00', 0x80, &(0x7f0000000280)='sec}rkty:evm\x00') setxattr$security_evm(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f0000000440)=@v2={0x5, 0x1, 0x6, 0x8, 0x1000, "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"}, 0x1009, 0x3) r2 = dup(r1) dup3(r2, r0, 0x0) 12:25:31 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0xeffdffffffffffff, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:31 executing program 0: r0 = request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='logon\x00', 0xfffffffffffffffb) r1 = request_key(&(0x7f0000000040)='logon\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', r0) request_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='syz', r1) 12:25:31 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x35, 0x600}], 0x0, &(0x7f00000000c0)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180), 0x2, 0x5) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r1) [ 702.631634][ T1332] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 702.639990][ T1332] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 702.655776][ T1332] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 702.664071][ T1332] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 12:25:31 executing program 2: sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="5700b08cd08bdea67567c89ff911b55c9d0030b752f70fb260479dd6046546b36bc54dade08dafc5cbdceb7b0000000000a4b021730dfb73a19b87a939d149d4e8f0cc6c5415a47ba8449fe30f79b40c3235a3d77e823a001748147e282c74ff8d8dd46d46795a44947ee3a1040edda88aff22807250cb0c53364713bb04b45d19b1fd5b3de69541609aa36624e85dfa42b402961fa186083a4dd3765a1f0dcf4c4835c52f3d06e2aace8537f6d7f104a1cc4ef21ad57b8ddc63d16349db3c7ea580c4485fe649bd56984d9576a789a708d6980c7148f098c39fe4725d622b0c77eae1bd2d22602b9fab2c", @ANYRES16=0x0, @ANYBLOB], 0xc8}, 0x1, 0x0, 0x0, 0x4000000}, 0x50) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000d07000/0x1000)=nil) shmctl$IPC_SET(r0, 0x1, 0x0) shmctl$SHM_LOCK(r0, 0xb) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x41, 0x8001, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7fffffff, 0x0, 0x0, 0x80000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x20, &(0x7f00003d9000/0x1000)=nil) shmat(r0, &(0x7f0000d07000/0x1000)=nil, 0x6000) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000380)=""/188) r1 = shmat(0x0, &(0x7f0000ffa000/0x4000)=nil, 0x5000) shmdt(r1) shmdt(r1) shmctl$IPC_RMID(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x3, 0x0) shmctl$IPC_RMID(r0, 0x0) sendmsg(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) r3 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) r4 = shmat(r3, &(0x7f0000ffa000/0x3000)=nil, 0x0) shmdt(r4) shmdt(r4) 12:25:31 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000180)="6f5c26bdb64928b0433edb80d05ef24dd8ce249170519cc3eec0901dfecfcc710dc07639fccb74e44e33799ee3b3febd6b35a49c84a4ee0d867c8c1a6dcbd4fbd614092cf5ff7daa6412e94d8749cf", 0x4f, 0x5e, 0x0, 0x2, r2}]) 12:25:31 executing program 0: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='{\xc5/.)@\x00', r0) 12:25:31 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000180)="6f5c26bdb64928b0433edb80d05ef24dd8ce249170519cc3eec0901dfecfcc710dc07639fccb74e44e33799ee3b3febd6b35a49c84a4ee0d867c8c1a6dcbd4fbd614092cf5ff7daa6412e94d8749cf", 0x4f, 0x5e, 0x0, 0x2, r2}]) 12:25:31 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) dup3(r2, r0, 0x0) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x100, 0x110) [ 702.803919][ T1357] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 702.812319][ T1357] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 702.980220][ T1324] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 702.988243][ T1324] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 702.999333][ T1324] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 703.007323][ T1324] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 [ 703.067856][ T1324] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 703.075864][ T1324] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 703.087649][ T1324] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 703.095669][ T1324] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:25:31 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) dup(0xffffffffffffffff) dup2(r0, r1) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="bb1249987b63b860800008"], 0x15) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000440)='./file0\x00', 0x158) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f0000000080)=@req={0x7, 0xfffffffc, 0x2, 0xfffffffc}, 0x10) 12:25:31 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x20000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) mmap$perf(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x30, r0, 0x4) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 12:25:31 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0xfcfdffffffffffff, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:31 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) fchmod(r2, 0x0) pwritev(r2, &(0x7f0000000800)=[{&(0x7f0000000140)="791bdbfb3d6598beebae2e6697349af7ac36752fc8e209d07ea01e1188a0e189436592888b38e5d22457ca5372785307de379cdc82815dabd842c6bb7aaf311c9e59410179d0a12d00b65d2d70e193cdb038328b1bb74b63c7b1e6c9", 0x5c}, {&(0x7f0000000240)="1277099dc472b9e704df91ccfdf108825bb1b6d0bdc8c043a435c8b756bebf81dc3d4b21c49ae27645b6edb7b8c87a427a76230811c7faa5a8cf5006b8aeb3c30e1093b7ca1f5918202fa9278528ef7ee555afd080cfafdc7df1f1464c776af6345c87cdc57fb8c136c065bad757cf2aef3c1ae636a767c28ebeea9272ad0417942785c6def615ad3b38cd7512ae586302e1dfb9345c2e042af3cef1629a2df76393ef3260d07aa2b8a88c8c3b0bb80ca28dd2fa50200178733be7554f706d86cf", 0xc1}, {&(0x7f0000000340)="238557f431f87101b0e8ffd10463aee46a7ed6a25d09adf592736bdd9c0a479ad4873053eb179199f751dd03fd403e4268d69839cd602606a087729aeafa016a5715b04070ac8f78bbeb12f01a22c32f", 0x50}, {&(0x7f0000000440)="31ec97b239bde84789a1b6b30806675a0b7c731f1002ebd885738b26d8544f60502733190d235cac3e9a8a514461b052af6308e00d97127d991de57aad338453a1d43eb4e4a761a5e7961d5871687831bb8a2f403cf54205af213c00c328c582e23ef2f892d65b86ba96ece0f6f984c57bc14a39f9bbb7", 0x77}, {&(0x7f00000004c0)="9fbeb9c06130107082a471562cb1f8210ee3704e7729cd09b1b278d379bb735425ad1f901921434410a95af6e6db64e795dd67694f240b5337bf31c1c57f37c005d11c84b5206e2d2c731f81ae441c229f9f277549064723deec0a5b9d4f860feb8fb06088272f4ee39f840866d83a7d181b3a80ce6f57247b8e8c9ed5216a46206f3033391f80be10cba0005ccc9b337fb44bbbcac34a55436205ac363b4e67d953", 0xa2}, {&(0x7f0000000580)="c406e3bf3ada8bb11df524cccc275224f18d50dd90467d04ef7aeed2bcdc6019fcb57615efaa44afd4901027833f20ec6c5881660bb2d6b0e301994dee153928bbd6f153e697fab5c3e2ec6d5dc45e0a3bc7992ca9b05b509d0131b9f4f1bdf3296e4b1150f2a86e7b4403365789d91a7a514019aa299946aa974ed0df633ffd53a6befbf8fff03d", 0x88}, {&(0x7f0000000640)="dbf2739f49db5704aaca81b2c510caa1017c140fd012b2ca3dc932dec6dc145f46cbaf1399635ba6fba286ced91147fe0159d383a44e313af2cf4fa58994b31afe1df080da2bdfd7da70db90c0727ac74f136b5b8146e2920cd1ddfd0c5bf1d3dc7192b58b2d507830117b88002dd0fee2641fc9916c21540338f5791713d758af732717bcdcaf1d7558312b69b51b35620f35fdea5dbfee77e430cdf09fda74ef3d13f210596c61068daa95579feeb2d456161d981e58f033a0c99a1d3984b74d56f57c9434384a1063e983d33a376e", 0xd0}, {&(0x7f0000000740)="14bf5a63fbb23acd0d078e388b83fe56a20fa38c762b1ee8042507992a7de48a0d2dbc4e90f5fe528b3f2d41b5a64247db71b9ded6ff37ed41f6ec912cd09f1a38212c1a49fc3ca1dc3980a7b782f87598d54cd3fc033784ea15b97fb31e008c1043a9d4de4a6df8b27fd23355e172a84bac7257e3ed6aa3c860fce9d8c81dae09a21e70ef813567c16b255a10a5b77dbb7f8d9a19513e93a27d431cf7a4f8f548d5f95b7dec509329cd1c50709e0ada69", 0xb1}], 0x8, 0x3ff, 0x8) r3 = dup(r1) dup3(r3, r0, 0x0) 12:25:31 executing program 0: r0 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f00000009c0)={'syz', 0x0}, 0x0, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "452d5ba0795e55f6af743a62010871efb9e697af2b455d618160b74321a48aa9ed4570393fd8f656d4722e1bdf7dc2ccf87b2595c45b28c695b0c02df33732cd", 0x3a}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='\x99\xfaF\xebc\x03\\\x89vVix~\xc7\x17\x00', r1) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f0000000000)={'syz', 0x2}, &(0x7f0000000140)='\x99\xfaF\xebc\x03\\\x89vV\x8a1\x15$s;l\a\xe0\x8f\xdb\xf0\xa8\xa1', r0) 12:25:31 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000180)="6f5c26bdb64928b0433edb80d05ef24dd8ce249170519cc3eec0901dfecfcc710dc07639fccb74e44e33799ee3b3febd6b35a49c84a4ee0d867c8c1a6dcbd4fbd614092cf5ff7daa6412e94d8749cf", 0x4f, 0x5e, 0x0, 0x2, r2}]) 12:25:31 executing program 0: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='syz', r0) 12:25:31 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}, {&(0x7f0000000240)="048206ef5ae5fbe420714d1190177d2ca68e0661f2d36e662011e1e1e2749b52394cffd66ca15d0adde17d419b18f884ebef9ba0c95f033b3998d6064dab408bf9b8d2fd817d0b475f5e6f9ec419a166d56397d8b518c0aebc05777a853db59ba7d5026e40c78ea3bc7c709748aa32bc9632a204d8d9ff8995fd2574", 0x7c, 0xfffffffffffffffb}], 0x800440, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x460000, 0x20) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) getdents64(0xffffffffffffff9c, &(0x7f0000000140)=""/151, 0x97) r2 = dup(r1) dup3(r2, r0, 0x0) 12:25:31 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x5, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)=')#$^{\\\x00') 12:25:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, 0x0, r1) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="02000000010006000000000002000300", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="040006000000000008000200", @ANYRES32=r1, @ANYBLOB="10000200000000002000020000000000"], 0x3c, 0x2) request_key(&(0x7f0000000040)='rxrpc\x00', &(0x7f0000000000)={'syz', 0x3}, &(0x7f0000000080)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) fchmod(r2, 0x0) dup(r2) 12:25:31 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0xfefdffffffffffff, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:31 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@mcast1, @private2, @dev={0xfe, 0x80, '\x00', 0xd}, 0x0, 0x5, 0x5, 0x500, 0x9, 0x10}) sendto$inet6(r0, &(0x7f0000000040)="900000001c001f4d154a817393278bff0a80a5780200000003000a0014000100ac1414bb0542d6401051a2d708f37ac8da1a297e0099c5ac0000c5b068d0bf46d323456536016466fc621c9ce921202ab78dcaaf6c3efed495a46215be0000760700c0c80cefd285810258ba86c9d2896c6d3bca2d0000000b0015009e49a6560641263da4de1df32c1739d7fbee9aa2", 0x90, 0x0, 0x0, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000280)={'syztnl2\x00', &(0x7f0000000200)={'ip6_vti0\x00', 0x0, 0x29, 0x0, 0x9, 0x6, 0x0, @loopback, @loopback, 0x7, 0x7800, 0x9, 0x4}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@private0, @empty, @ipv4={'\x00', '\xff\xff', @loopback}, 0x7, 0xff, 0x0, 0x0, 0x3f, 0x1c0001, r2}) fcntl$setpipe(r1, 0x407, 0x3) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000180)={@ipv4={'\x00', '\xff\xff', @empty}, @empty, @private2, 0x252c64dc, 0x6, 0x2, 0x100, 0x8000, 0x1000000}) [ 703.437341][ T1419] netlink: 96 bytes leftover after parsing attributes in process `syz-executor.2'. [ 703.455220][ T1424] netlink: 96 bytes leftover after parsing attributes in process `syz-executor.2'. [ 703.666530][ T1394] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 703.675110][ T1394] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 703.686448][ T1394] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 703.694510][ T1394] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 [ 703.755073][ T1394] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 703.763151][ T1394] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 703.774349][ T1394] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 703.782600][ T1394] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 [ 703.922107][ T1410] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 703.930293][ T1410] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 703.941526][ T1410] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 703.949530][ T1410] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:25:32 executing program 0: stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) sendmsg$AUDIT_MAKE_EQUIV(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x3f7, 0x10, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040010}, 0x10) 12:25:32 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) dup3(r2, r0, 0x0) 12:25:32 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000180)="6f5c26bdb64928b0433edb80d05ef24dd8ce249170519cc3eec0901dfecfcc710dc07639fccb74e44e33799ee3b3febd6b35a49c84a4ee0d867c8c1a6dcbd4fbd614092cf5ff7daa6412e94d8749cf", 0x4f, 0x5e, 0x0, 0x2, r2}]) 12:25:32 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0xfffdffffffffffff, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r2) r3 = socket(0x10, 0x2, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r6 = getpid() sendmsg$netlink(r3, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {r6, 0x0, r5}}}], 0x20}, 0x0) r7 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r8, r8, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) setregid(r8, r9) 12:25:32 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x1f, 0x2, 0xff, 0x0, 0x8, 0x4}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000049, &(0x7f0000000040)=0x3, 0x4) sendmsg$inet6(r0, &(0x7f0000000300)={&(0x7f0000000080)={0xa, 0x4e22, 0x1000000080000, @dev}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)=[@pktinfo={{0x24, 0x29, 0xb, {@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xa}}}}}], 0x28}, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000786000/0x3000)=nil, 0x3000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r3, &(0x7f0000000140)={0xa, 0x4e23, 0x5, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xa556}, 0x1c) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22, 0x5, @private2={0xfc, 0x2, '\x00', 0x3}, 0x7}, 0x1c) [ 703.988935][ T1410] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 703.996989][ T1410] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 704.008041][ T1410] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 704.016005][ T1410] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:25:32 executing program 0: prctl$PR_CAP_AMBIENT(0x2f, 0x3, 0x1c) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000000000)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) 12:25:32 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0xc) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) dup3(r2, r0, 0x0) 12:25:32 executing program 0: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000400), &(0x7f0000000440)={'fscrypt:', @desc3}, &(0x7f0000000480)={0x0, "e0ec94cc5a02a1afa8c2f23b0077b535c94e0fd058c8a5e3a5d685ee2c565a3f2128a30c1d39376df9e5b4f155a5ab29ecc8d0f287f536e91cab8be03c834cb8", 0x29}, 0x48, r0) add_key$keyring(&(0x7f0000000500), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, r1) add_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)="c8d5405d57091c02a8ca70d9c12b7fb24684de4b695a810c274f5e6a8cca8a0115afff557bd54cc9751bd9866143e84c3d3fdddf633a4774a4b3f5a6f57df9a281b16a3f378cac7d3b58ca9d1df5fd916ca59c411127b9e1906134ffd087ce065678c5e3f34f81d1b5fa1b00240cb48152bd8c494ef3b60003ada80620e98182b4b255529a74a439d36290bde40a7c9ad210482d93a29c0c516a59b9116845142a84e007b89fc378f647621fb4af182b3d1eb4b990d84a66442dfae8f99eab3147903d519e683981725586b078a66417c2d7375c930d155c5168433197163b8c415a7672ce03e7efaa74505a3f1bc592b04f0e1e2a", 0xf5, r1) r2 = add_key(&(0x7f0000000100)='rxrpc\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="35eba98e1758bb11c254a9b7e21b33e3938776646fbf0ee5926091cd8300a46196334ca2d48efff6a5ccf583d76c1c462ec342897e8c5741afd09968adddf7e1a91843b39b9fd233f9275524c49c5df7adab833ce6ee2c563f639fece4158e7746fd61630703702fbd4d71db8b70c70163162320d137c61e227c4bd3b758b9491c5e7c8f1f920f6e5d636d4b278e5d995a682f84b1cef8563f6972b7d95a92d9d6ecaa6822696f2158346d4d0e", 0xad, r0) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='&+&}\x00', r2) 12:25:32 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x80000000, 0x8) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000040)={0x0, {}, 0x0, {}, 0x2, 0x6, 0x13, 0x9, "34448fec757d3b8c601ee77999e3b2786fd80a3203db9bf480dc5319a93843e66498fc459f6a2cf23756f59e329dc5cf3a9f804268530db5b2af002dce0fa903", "34d71edb2078260cd863c68c7997a1c95408052950132d9fffb85789b1c6600e", [0x41e, 0x5]}) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) r1 = syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000640)=[{&(0x7f00000001c0)="17ee6cac94d9f5cff2ee57cd21530e79edbdc93f74c514feb47c16f75c8f702fdfc18f2c60f4d8bf97767bb51bd09a6a274c536069035dc324c44a", 0x3b, 0x3}, {&(0x7f0000000200)="e3a7201cf24736f24e5697045361f5704bedfd16809e3ce0f80880f29746e1033cb4f8ef84c23a44e2cbcceadef26d1f1cf42777572d87e4335344f3ea8fdda7fab781000ffd4d75bbec8bbd25b8f8c83e07e34f3177f0b406b051b63b4091d84a2db8e7dd992fe0c1e1e25abed06da936997cc7d8c751a3b06beea30247872607645ad4166db081109ed68a0beed20e47a238780592b84803acd1fc1ac15ebf9d9f188551b301ef38d8a1fc92f740354251581d8d8706c9fb3e6397447e53b2f4ce888c99dbda51a561631cb8f26c77", 0xd0, 0x101}, {&(0x7f0000000300)="12347e7f0c00cee02af47ce705ed7b13b74737214845a5", 0x17, 0x400000004}, {&(0x7f0000000340)="5272dfc04234e3325a6f311ac394a8d6b8162a1ef740a5a943bdb6ec22578f807169925244dda16b8007e3278b9fa58b317bc87b69936eba72b0505bec01eae6a1acba320b4bdb9984b50f4e330fe01b8ad9550a7af030fc792104ecd4a2fb363e38c1968b89346de497d3713961986aa443c6de8c356f74ae5a7f92a5a54b0786c28f1e48a9396e76a530c19a779fb423e79234fda343f1baf3fde74965c21646631520d5e9e297b95559ab6281479335941607fe29c99150db4752348cfe", 0xbf, 0x7ff}, {&(0x7f0000000400)="0bcc8db4d5d8a4", 0x7, 0x5}, {&(0x7f0000000440)="d0ee00b3a6b43d1731dafbbd8247747ca86b12a113589ff7a1c3fade8eb16165ef02c877c979e785dab1b0e07fd5c8fcef90e8cc707609eff31ffb9d3045065ba542a11e11c9fdda2aab87f42d188aa3d47f9f12afa544f078e38feb564f1c835167807fbb603d83fb35fc615b8a0b96f362933148c7d7a11dba800cd307856cb5def648dad4995567f644ae9625ed21104ceec057f73a2b3aff8aa02d32e179874aed82d3b46a41e18a01ea25ca1a412d5ff97195c374707136e6782fae3a3cd0b0c6a32c14f5edbb929eb3c5392fb5", 0xd0, 0x2f}, {&(0x7f0000000540)="7f3cfe5bde5eddcd32c831450db213d3fdce7625ee512be1b06fe90a2813156f5866ac09bc70420616dfd31d316540c7474406c492ba8e2aa5056e6328c4dceebbe5ea90918e16b52171a45a5b5c4cc99dddbc3d4e4f017d74547c78b9b1bf27d744a820b5171a550c1d6fd2397247538b6379f0e33ad4e331db7df8636f5e3e46647960a497a6a248f4f8f850bd5624f7629beb24304678cd4e856c3673f5ca335644a70000b229fdd204120bc12f616f2c5fcd163c699e0f4d28639d68422b1f0d6ecd8d6693cb530aa5ad7a4ecaacab681cf3720f83e50751d1aa5f530fcd1306ca668f5e88fb9f1049cd81c45f56", 0xf0}], 0x80000, &(0x7f0000000700)={[{@minixdf}, {@noacl}, {@sb={'sb', 0x3d, 0x1}}, {@data_journal}, {@nobh}, {@auto_da_alloc}], [{@smackfsdef}]}) syncfs(r1) r2 = syz_open_dev$evdev(&(0x7f0000000780), 0x3, 0x202200) r3 = syz_io_uring_complete(0x0) r4 = dup3(r2, r3, 0x80000) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x482404eacae849d9, r1, 0x83a80000) r5 = pidfd_getfd(r4, r4, 0x0) openat(r5, &(0x7f00000007c0)='./file0\x00', 0x90a00, 0x160) r6 = openat2(0xffffffffffffff9c, &(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0xc}, 0x18) name_to_handle_at(r6, &(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=@OVL_FILEID_V1={0x66, 0xf8, {'\x00', {0x0, 0xfb, 0x63, 0x4, 0x80, "4ea67b13d61970fdf04311c9437b1cfa", "5c0c5da5d371e1ab402d5ff1607892edb2143b8758313a136a66b94af16ac7ad3b96be6c10f661ea65860d31e7e24f44c9756154712551eb8fd15811a423e219d720b6a830a7aff4cc9e3faa8bb5"}}}, &(0x7f0000000940), 0x1000) fcntl$notify(0xffffffffffffffff, 0x402, 0x33) accept4(r4, &(0x7f0000000980)=@l2tp={0x2, 0x0, @private}, &(0x7f0000000a00)=0x80, 0x80000) r7 = getuid() syz_mount_image$ext4(&(0x7f0000000a40)='ext4\x00', &(0x7f0000000a80)='./file0\x00', 0xff, 0x3, &(0x7f0000001c80)=[{&(0x7f0000000ac0)="da75f8e37e072e337ad9694348a3769fbcd803d0b0a0ae7556e2156859c901b75ac4e1c2b508ceb07d13530b447d0133f6dc89e9d85ece1a8c62e7a9deb0c85248abf612695c1e2494774febd761835a4563ade411fbf7db133f9c4e07949ebdbdd1b013e325ea23338b318a52fc61809c7ced644e3fb2d6fc40e0a8551387bd26c361bfb6d9512c74e01efed48307625f0907488fbe10d682e39c566e", 0x9d, 0x3}, {&(0x7f0000000b80)="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", 0x1000, 0x4}, {&(0x7f0000001b80)="76833596d2fa4bcefdfbd50564f2e60a88959f677597fa5853cc71c540c15b6ebdfe6669bf93d1937fca5ad83d7629dac685696ca09255936029d25181988f7fca7f80fdcc482d1c6e8be0646d1f536a9d2be5c012c0ede5f78d8d10efbfb8813c1a25e53e62a2c4fb551f59eda71b7729e1b5f78e5f55c1e5d08e09fc19ced63497af717aff65557556657b86b889d1f5a8474f1d46ac90c202c5f26f75724c81279462aa2df0f4a0bc4d416b3c9c5e4dc564d721cf8dc7ca45f4f63fc5d45132ab5f86415b689aa48e", 0xca, 0x100000000}], 0x4a400, &(0x7f0000001d00)={[{@orlov}, {@data_err_ignore}], [{@seclabel}, {@fowner_gt={'fowner>', r7}}, {@subj_user={'subj_user', 0x3d, 'noacl'}}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x64, 0x66, 0x38, 0x35, 0x36, 0x35, 0x33], 0x2d, [0x30, 0x35, 0x39, 0x34], 0x2d, [0x33, 0x33, 0x2, 0x30], 0x2d, [0x62, 0x34, 0x63, 0x38], 0x2d, [0x63, 0x30, 0x61, 0x62, 0x31, 0x35, 0x62, 0x63]}}}, {@uid_eq}, {@fsname={'fsname', 0x3d, '*}%'}}, {@fsname={'fsname', 0x3d, '[$'}}]}) mount$9p_fd(0x0, &(0x7f0000001dc0)='./file0/file0\x00', &(0x7f0000001e00), 0x1000020, &(0x7f0000001e80)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@uname={'uname', 0x3d, '*}%'}}, {@mmap}, {@version_u}, {@uname={'uname', 0x3d, 'auto_da_alloc'}}, {@access_uid={'access', 0x3d, r7}}, {@loose}, {@access_user}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x100}}]}}) 12:25:32 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000003240), 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000180)={0x81, 0x2, 0x0, 0x7c8}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000000000)={0xe, 0x81, 0x7ff, 0x3, 0xfffffffd, 0x40}) ioctl$BTRFS_IOC_SNAP_DESTROY(0xffffffffffffffff, 0x5000940f, &(0x7f00000002c0)={{r0}, "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"}) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x112ffea7c636d9aa, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x101080, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000012c0)={0x1, 0x401, 0x1, 'queue0\x00', 0x4}) 12:25:32 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffb, 0xa, &(0x7f0000000780)=[{&(0x7f0000000180)="7f6b8246bcf8114b4ed4", 0xa, 0xad22}, {&(0x7f0000000240)="d5fc7a6109488fa82f8e3432f1b6d286e9a34e023678d448b36413aec450d132f59e59f1b98d50b6175851bbffc11371378233c53b2324bcc6a971d7f66d485a516ec80a26202f116aba37c768ec17c4da9d95d27570556542f23cf3f714e4983910a5d092bb96a61906dd3b47eb453baabc7fd7e47881", 0x77, 0x3d8d}, {&(0x7f00000002c0)="0c4ebac30336fa05fafe85399a95b50762d924dfecdbff456c9fcbc8467d20235f7e29308ac82d50cdca7c9e64e673de24ff431f575bdf21ae79ed495403529c9aa12e5c0f676e3212fe45c0624e644f388010eac418259e406e69fcc371bd3af00fe400ed7258141a1055813f8fe182cc4c0e443a6b59f5466490113ac378789ee56826cd9ffc7fd17ed8d2ba61bfabf6d6def59822d1fcab84a390c0adefba7cde02778669da7c033671acb0a5e3348a84847688b14e1bfb84ef505fa275a4c4b600b727", 0xc5, 0x4}, {&(0x7f0000000440)="8dbaa762ffe08753c6bd18ccad0b36ce0c28a6bb7f0a6ec8a9a164195fdd5002f2c6167aacbdc817a68542bad03c3f8225de11b0092b176f713993b721febe0d95bd72b48926f0209867ced3bb13be33f6a00d2f8ca08fc087c2dd6d86342d6f84c2eeb86b0ab0e6c6bd6a3229a6ca0634620be7c7e94536ccef4d5a5b60da9abd0a6c13df32867c52ef5ad38cceb450673cf5efe3226e985eca5783b461729f4175175d8e2161bfec48539165e8d521bcfc87c67bef67c84722982b2b0ec01dca011146aaf7bd4aaaeaf97b1174e09a26c6ef6bdd962dfd68b7", 0xda, 0x8}, {&(0x7f00000001c0)='N+', 0x2, 0x1ff}, {&(0x7f00000003c0)="f9", 0x1, 0x100}, {&(0x7f0000000540)="890e12d2589a6706360d57b4c0f298450c112935249732193f5163b722c4082816fbf64c4cff9fc10954f6ccf4beb68242105c0677c7242e2234e765706c654a18cebddd9376cffe52f35d614576454e3c2c38e2048f176c0768e62c3bbeb0461f310322059b23ffd5f8d13da2010110e425cab519617e481208bed39389fec5468de0c3476d709210", 0x89, 0x4}, {&(0x7f0000000600)="c7f7878fcd0d2196399dd3cf796299f589b34cf455d211084fe61c4458c908015a735e10c3228029b81c629977dbb851ec881a99205be18639082fdbabc5be0ebf24274446a5195815201c9dace7d853cdb1181c0c79563543e98b1628ebed80f115", 0x62, 0xafd9}, {&(0x7f0000000680)="b6a08f4e435f4fa2114f3d97e26613200c6092c4f4680819bd2a7841", 0x1c, 0x3}, {&(0x7f00000006c0)="12ac0ea807a26f04d4a0110fadf9a3fec139ccf2f8d1a32f82b644b048d3c02d09abead909ae39d0dfc7181beff5f1dcd2c91cd9d917651f5df5690125fb76fc75e3efeee65b61f2fac110492b1b46030ddd49d0d011d2f20bfe9e8dbdad6fcaba868ae314f7b2803ad91f397f5051166ccbcf9a9384adf3b8ee538f29b6d61bd4008a3fb0cccb2e2bf60f8859a052ba8df18120b0689144ffeff34bd0f858c9881c51cc96f850efae7b0a1a05818c9e18a9f24cc2c726e8ba9b1317a2950b", 0xbf, 0x5}], 0x205010, &(0x7f0000000880)={[{'vfat\x00'}], [{@subj_type={'subj_type', 0x3d, 'vfat\x00'}}, {@obj_user={'obj_user', 0x3d, 'vfat\x00'}}]}) mkdirat(r1, &(0x7f00000008c0)='./file0\x00', 0x81) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = dup(r2) dup3(r3, r0, 0x0) 12:25:32 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$NL80211_CMD_FLUSH_PMKSA(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x0, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x5, 0x42}}}}, ["", "", "", "", ""]}, 0x28}}, 0x4008010) socket$inet_tcp(0x2, 0x1, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) 12:25:32 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x101}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) write$binfmt_script(r0, &(0x7f0000001700)={'#! ', './file0', [{0x20, '&.-%!\'$\x1b{\\{#!{:'}], 0xa, "52cc001141588dda04afc35f554ecd48d112a0276996bf6f3de4052905a884445d9fe79b2b28fc822b12f17e00e5ef8d1496d3b11bed9ead48a78a6fe0d009b74a078218f8bb8abb03bd5a76510d86f8dee90824f60ed64a1225955cf8e9be3ad8b016bc5004d43990a09b7e61b7af0f9eb786d1ccaf70871c237f5c1db50f4b3c1e70ea11a04a9047961595816423605e72caa7f2444d7d907e7ec29cb1a1db4ea4756f6020dd28f2b451b30fa5b35039ec4c854ea96ff360d3414e2ceff019df4daa595fdf19322bfe4cabdc81e48be57febe1c750a8bfd10bf628e6060d79ab1aaa489e28b1538f9e0cf05f98"}, 0x109) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000000), 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000180)}, {&(0x7f00000001c0)=""/38, 0x26}, {&(0x7f00000002c0)=""/185, 0xb9}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000000200)=""/116, 0x74}, {&(0x7f0000001380)=""/225, 0xe1}, {&(0x7f0000001480)=""/101, 0x65}, {&(0x7f0000001500)=""/107, 0x6b}, {&(0x7f0000001580)=""/166, 0xa6}], 0x9, 0x0, 0x45) fchmod(r2, 0x0) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000080), &(0x7f0000000100), 0xfffffffffffffdc6, 0x2) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}) 12:25:32 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000180)="6f5c26bdb64928b0433edb80d05ef24dd8ce249170519cc3eec0901dfecfcc710dc07639fccb74e44e33799ee3b3febd6b35a49c84a4ee0d867c8c1a6dcbd4fbd614092cf5ff7daa6412e94d8749cf", 0x4f, 0x5e, 0x0, 0x2, r2}]) 12:25:32 executing program 2: syz_read_part_table(0xfffffffffffffffd, 0x4, &(0x7f0000000180)=[{&(0x7f0000000000)="c82ac57e85825adfccd48f66f8eaf7cf381b56", 0x13, 0x7ff}, {&(0x7f0000000200)="aa5f5f8709bd8b6ae95f5f8d7dc5dcd194b61463a4119b822651c34ed56593bff55a62a44b09bac445fd5c2d119825ee84cbfa77a104e33ef7bc6f92aa798033dc2c4cbe62828066f0e71b8629c7c824262c154a73bf38c170c9cf4663e52dd49642c7deb28c0e83bbed0bf023f2ebea81b21df8a89c7ca404", 0x79, 0x10000}, {&(0x7f00000000c0)="25e14d1f8818f87dc46ff3db8a17be22f011785cd999f76c03d3f58ffe74bbfd0e6fc7c3fbc00fff3552ed78c54e7a", 0x2f, 0xffffffffe93c806a}, {&(0x7f0000000100)="4c13448102975e56370000592b8434676758e98999e1347a2655f4d8219ea878964c5d743bb0cbde87af08ec62c3f330f300c50e52c8a645748a4c3cb0eaf5835bcffe5e94ffdccc7ac5af1dbd0c01", 0x4f, 0xf23}]) 12:25:32 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0xfffffffffffffdef, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:32 executing program 1: io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) r1 = syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0xbd, 0x5, &(0x7f0000001640)=[{&(0x7f0000000280)="116382ffe7154f98056e0513480ce38ecec838d39612224b4609e771ec911387bcd367673dd02d964dd2093dee52d26b2d154162f86c4e9da30447d22bf96d3aba335a362a99bb9fd64ef8d2ed633e3f8fc13db850eaef079217d3f709f2b161beba", 0x62, 0x9d}, {&(0x7f0000000440)="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", 0x1000, 0x652}, {&(0x7f0000000300)="12866a0349b229916d8dcdffc8228f2c50f05151cf7497a2115613f51ee9c639afe374a392e7f3c5c417ff4afa492088b5f0ccbf2d", 0x35, 0x7}, {&(0x7f0000000340)="44db3dcd992de5d3e8b5ac3d53273d542f9b18f77d920d3247eda37764898cf31bed620d2520934892c99d8d96eade4df7585b7b384510fffc1fe431cc6f40c4867415c2946ef10e6ebeb7b3c7814ab10b918a94d4d6c67c864786fe7ec61216004f1429967f9bbf9654afe0ee358a6e2df3837f0e91e8432ea7ecbc14a4d7cd1c305080606239569197886046a218324f62852bc88eb71e336bae7bc3e9bbb1179e2939e5a785a88e30952c7adf69b3cd382d80b42d13bd33946fed", 0xbc, 0x65ba}, {&(0x7f0000001440)="4a893884104c5698de3101df85879261a8906570aee93ed813d5491bd40229bd2bd15b3cc2464cc66a164c8d66d90550e9f439cf792cef779d8b8e39b1e9af1a76c344cae4fc2ade76bef47f6cdeb558f12406e8886d7c33ac1f5f8e1fa7c39973f120eb1dbce2f5f655bb6be6bd86dfea52eafa38314187ac2f7d67f43d895586836b93a4d415bd8d5a2e3d9ace5c427d54476ddca22558baf0b169e7bea04ed7ae0c0aea903ac92c43d3c9287a2ef0e03b74caa512", 0xb6, 0xff}], 0x2000402, &(0x7f0000001500)={[{@fat=@time_offset={'time_offset', 0x3d, 0x17a}}], [{@fowner_lt}]}) mknodat(r1, &(0x7f00000015c0)='./file0\x00', 0x1, 0x8a99) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = dup(r2) r4 = open(&(0x7f00000000c0)='./file0\x00', 0xf5967032d55f591c, 0x0) openat(r4, &(0x7f00000016c0)='./file0\x00', 0x7bb339a186eb734a, 0x82) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000001600)=ANY=[@ANYBLOB='\a\x00'/26]) epoll_create(0x8000) r5 = dup2(r3, r3) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r5, &(0x7f0000001580)) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mknodat(r6, &(0x7f0000001540)='./file0/file0\x00', 0x8000, 0x2) ioctl$EVIOCSABS20(r7, 0x401845e0, &(0x7f0000000180)={0x3f, 0x12, 0xffff0001, 0x5, 0x9, 0xcf6ad65}) dup3(r2, r0, 0x0) 12:25:32 executing program 0: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) r1 = add_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000200)="d0ed165621e3bc84440e657ed6627850d817c173", 0x14, r0) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)=']\x00', r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$search(0x6, r2, 0x0, 0x0, 0xfffffffffffffffc) keyctl$reject(0x13, r1, 0x6, 0x8, r2) keyctl$reject(0x13, r0, 0xc5d0000, 0x1, r0) 12:25:32 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000400)="cddc0dbd0463e715ca5df8b20ab8f1b07ca6d1de627b5eb36e8b13ec7a5eab2ea79df78d1b003d8821bcfbbfaa944fac4ab4f84332fe05f2fb7acb10ca7da7ffd4d75fc0c5d6de8e967f505938d6f1a76470536b8a74b52102b9ebd72d79adcde56e372a5d8265b1a7fc819b1a40ec6497a1d43f3cccd338faa2e64ecebca9fcfcbbc9d62661ee356495579a988e02b45c9e7f563b382ab040ccec6f725c8db342daaed436d30cd82ef9979df328bad3456bc30c5bc5c7cec450d496cc448c9c4a700d", 0xc3, 0x50, &(0x7f00000000c0)={0x2, 0x4e22, @loopback}, 0x10) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x25, 0x0, 0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(0xffffffffffffffff, 0xf501, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x1b5, 0x0, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000080)={@local, @multicast1}, 0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000010400)="ffff0f00fcff0f00000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x372}, {&(0x7f0000011700)="0000000000000000000000000000000000000000000000000c0000de05", 0x1d, 0x4fe0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000580)={[{@resgid}, {@norecovery}, {@nojournal_checksum}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x2000000}}, {@jqfmt_vfsv0}, {@bh}, {@noquota}]}) r2 = perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x1, 0x3, 0x80, 0x3f, 0x0, 0x4, 0x20e00, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x200000, 0x2, @perf_bp={&(0x7f00000001c0), 0x1}, 0xe02, 0x7ff, 0x2, 0x0, 0x312d, 0x6, 0x1, 0x0, 0x4, 0x0, 0x100000000}, 0x0, 0xd, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x3, 0x0, 0xb9, 0x0, 0x0, 0x3, 0x2f020, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3f, 0x0, @perf_bp={&(0x7f0000000180), 0xc}, 0xa2, 0x9, 0x55000000, 0x1, 0x5, 0x1, 0x3, 0x0, 0x1ff, 0x0, 0x9}, 0x0, 0xc, r2, 0x9) r3 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90, 0x3, 0xfffffffd, 0xb, 0x0, 0x0, 0xfffe}, 0x0, 0xfffffffdffffffff, r4, 0x8) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') 12:25:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17, 0x6}, {0x0, 0x0, 0x600}], 0x29a4cc, &(0x7f00000000c0)=ANY=[]) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x20) r2 = syz_mount_image$nfs4(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x80, 0x6, &(0x7f0000000740)=[{&(0x7f0000000240)="bc80ab83a3424e89ddf30495a72df62886f3da933b9e3d2be0fb72bc4a75aab7d1dcc721e01da8d974146e816e6a80af08cece4584ac6f8ec32ca69d0561acd329db2b76d83365ab0e10cca1e03fd1234f827ba395cb281d0fdfd029795146cb4f248013d79c2671c21a362691b583", 0x6f, 0x14d4}, {&(0x7f00000002c0)="73a3bef53a14e8dd1658a1d9c54d705d9867925b9722e2c3ebc81fae0168c23c0d6ce5602ae1659b332730d3f194e701c0fa452579f56ce244879c608caade6988e975fc9c91d91e5edc736724276a3bb3888f8fb2c2c661addee8f9222feecfb1899022bcb3b6d07f7f", 0x6a, 0x20}, {&(0x7f0000000840)="022dbc67f5223364", 0x8, 0x6}, {&(0x7f0000000440)="619b3208a060ce91ef335a33257b91a0f2c07628662026b943d50dae97dc292c9d4fb94a80a9b9e37901685d0b17d7d40ea86c4fcd0aa0d81559adc4cdc01fd627c89c968e762ae57b63ea4d688df4ec9a05c1208c9891c8ccb9e8122590be5826d5cee51558960372cbb1c3d84a679bc1ac06e82a224a54c639b714bc92caf3b5265873709a803550f41c22d1c753343d1a7df1df4757efc8e6b3a8b6c0be5ef934842c79b2daba7242c2ccb3e6f401553e7e4adf52e9b244eb06e84bbc90bfff4d3bd0662ec66047af4917b70cb6e13ab0c942b1f294eab845dfe163cca9c658cc6603530c9ab7980adb2474188f63", 0xf0, 0x80000001}, {&(0x7f0000000540)="49ba71113746ae05eff9ecc72aa8e9930adf7141a8e26324fde629c9c192ba4014fcbe8ea188443cbe579c649e48855f1ad1988b1bb5466faedbc6eeb57dd22bdebb078425a73b292860912d85dff51d0d5e3261197407319670e2acc0551703ec1eeca0c0e14f9392747da0371c350a1b42c606292666851cfd54d9efecd2a1aff691bf4b06b2106c63d8c5f2432b716f122b292b13385e35d561413edf05e1c082e04e78645895eaeda7cc0abe2f222d92c2b983619f9dcb58d4aff5566f859b60d1ab830f6d529b0acd6e6065c14e6b5cc80381e32275835f0b9033e3966157e756812aaf74d774c5b120c84a", 0xee}, {&(0x7f0000000640)="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", 0xfb, 0x9}], 0x27440, &(0x7f0000000380)=ANY=[@ANYBLOB="472c3a2c6f626a5f757365723d76d8f7a0fcee6c0985666174002c646566636f6e746578743d73797361646d5f752c636f6e746578743d726f6f742c636f6e746578743d756e636f6e66696e65645f752c6d61736b3d4d4159"]) renameat2(r1, &(0x7f0000000140)='./file0\x00', r2, &(0x7f0000000800)='./file0\x00', 0xa) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = dup(r3) dup3(r4, r1, 0x0) 12:25:32 executing program 0: prctl$PR_SET_FPEMU(0xa, 0x1) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1401000015135adba0947debaec94c4f5c57ef709cd5bc752fdfc8ca28e9c92df88737df5ac321d0274557efa89febb54d263677bd4ad25c807b21867d4251897bca28cf54ae071363cefa6fd6c50c4e58d5ca1c658d84b987f91f0534b7", @ANYRES16=0x0, @ANYBLOB="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"], 0x114}, 0x1, 0x0, 0x0, 0x4}, 0x4040000) r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', r0) 12:25:32 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) chdir(&(0x7f00000000c0)='./file0\x00') dup3(r2, r0, 0x0) 12:25:32 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0xfffffffffffffdfc, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:32 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x3, 0xfffe, 0x1000}, {0x4, 0x8, 0x800}, {0x4, 0xfffd, 0x1800}, {0x2, 0x3, 0x1000}, {0x4, 0x1}, {0x3, 0xa0, 0x1000}, {0xa4fec3c215f2589e, 0x7fff}], 0x7) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) 12:25:33 executing program 5: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x4080815, &(0x7f00000000c0)={0x2, 0x8080, @dev={0xac, 0x14, 0x14, 0x3f}}, 0x10) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, &(0x7f0000000640)={{}, 0x0, 0x10, @inherit={0x70, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}, @name="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"}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f00000021c0)={"e054efd1f0f8de003764f68543dff4fb", 0x0, 0x0, {0x6, 0x100}, {0x1, 0x9}, 0x10001, [0xffff, 0xffffffffffffffef, 0x5, 0x6, 0x4, 0x8, 0x1, 0x401, 0xe88, 0x2, 0x7, 0xef, 0x4b, 0x8, 0x137, 0x9]}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f00000003c0)={{}, 0x0, 0x4, @unused=[0x4, 0x4, 0x2, 0x5], @subvolid=0x9}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f00000006c0)={{}, 0x0, 0x2c, @unused=[0x6, 0x1, 0x8, 0x3ff], @subvolid=0x7fff}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000040)={"4c9c55b146b1301a959608021c91075c", 0x0, 0x0, {0x7, 0x20}, {0x7dc5, 0x7}, 0x10001, [0x3ff, 0x7c, 0x0, 0x1, 0x9, 0x5b, 0x200, 0x9, 0x3, 0x80000001, 0x0, 0x6, 0x6, 0x5, 0xcfa, 0x1]}) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r2, 0x84009422, &(0x7f00000012c0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_REMOVE(r4, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000001700)=ANY=[@ANYRESHEX, @ANYRES16=r5, @ANYRESDEC=r1, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000001900)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYRESDEC=r3], 0x1d4}, 0x1, 0x0, 0x0, 0x24048000}, 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000001c0)={r3, 0x1, 0x20}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000200)={{}, 0x0, 0xe, @unused=[0x0, 0xfffffffffffeffff, 0xffffffffffff8af2, 0x4], @devid=r3}) close(r0) 12:25:33 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, 0x0, 0x0, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000180)="6f5c26bdb64928b0433edb80d05ef24dd8ce249170519cc3eec0901dfecfcc710dc07639fccb74e44e33799ee3b3febd6b35a49c84a4ee0d867c8c1a6dcbd4fbd614092cf5ff7daa6412e94d8749cf", 0x4f, 0x5e, 0x0, 0x2, r2}]) 12:25:33 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) r3 = dup2(r0, r1) ioctl$KDSKBMODE(r3, 0x4b45, &(0x7f00000000c0)=0x2) r4 = dup3(r2, r0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r5 = geteuid() r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x17) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000080)) r7 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r8, 0x0) ioctl$NS_GET_OWNER_UID(r4, 0xb704, &(0x7f0000002780)=0x0) stat(&(0x7f00000027c0)='./file0\x00', &(0x7f0000002800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r4, &(0x7f0000004dc0)=[{&(0x7f0000000140)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000001c0)="2f380f86154af40e5ec831822ef4d77cfc33afb7a7da40af3adfcd719df6", 0x1e}], 0x1, &(0x7f0000000440)=[@rights={{0x10}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r1, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [r4, r3, r0, 0xffffffffffffffff]}}], 0xd0, 0x20004800}, {&(0x7f0000000540)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001880)=[{&(0x7f00000005c0)="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", 0x1000}, {&(0x7f00000015c0)="0fc41a816f924cede73ff0d83533c8b3473ab6f86bff9fe248cf21da1f4ade1de785b488dcd95f3e382be24af3abed333bdeac81aaf89036695210ad804cd0c0be95483608fb304331d034e8ed129508fc73c1ba96b55dfa3871601b2e2a50b8742331b157b9f78ffa3873086bc28d75d9dc3a5d17a508d6d176e008fb2a3aa4f3338cad70fa3144af72cb358cf02abda4248bc901b2c07d6f1cf420e32613f5ed8791d8fc1dc7fc01c7f47031c18b0e515cdf201dcb99a1834f54dcaeead7d41d4f40aa23ee342ad9aabac910917f76067ce2246eaa7f08c4bdb88712dca2935536eb84db2488d122eba9fe8f47e574c1f02267c657", 0xf6}, {&(0x7f00000016c0)="bb7d0f6a4376968edc50d6d4fc6659781970716a006542536da28a40443208d903912d6f3772ad1dccda61aff1d93d74722bfaacd9c9fa1c0bad35eba1d5d99bac4c135a366080ce40bbcbc6d3ef", 0x4e}, {0xfffffffffffffffc}, {&(0x7f00000003c0)}, {&(0x7f0000001740)="768d39693f4d89d857d1744a30c0e33a93c7a1a6b18bec4e0edb47e1fdc7fd7dc22203930e261db03876be0f5b985a8d35f20bcbb4039c58dafe170f2842fb26e2e4bcb2a6f1063ca12e48ecf42c4013c3c14ae600b11006435288a5c278eebf7342e59d411f22b4439cd9c19c4f630f6ebc1c8f2c23c0c93d0c145811212f21060c921451502a69dd7bf821147ddba1ed850aa8782cf7089dc2661338ee7b12317b673f", 0xa4}, {&(0x7f0000001800)="9f54dd9ec09189686abf7a5ef6955ae7b7d8b6af7702d72925da14daa1c0f75a56b6a3f20c666d74feedcbb2b543981e5010c09c3c016ecf24dc66078b58b7d64190887d8de5", 0x46}], 0x7, &(0x7f0000001900)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r5, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r6, r8, 0xee00}}}], 0x60, 0x4}, {&(0x7f0000001980)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000002000)=[{&(0x7f0000001a00)="e135cda39249948163f887ea4fa18fa35ccbad02c03841459d19a85f23b59f2596cc8d18ab849354a89c938856177dfbcc4c9ca07a4aa783c01872778698098d70333c3873995df88590e286a7858f4feaf0979b1faf0f9a9c0a75f932385f10c5d23d4174f92f3aa5abaeb97b67ddadfdd46c65d58ed32ec0db05083282c1cf95a7acd0c82d7831cc192320125b03e74f30600ad822bef341c1cbfbcc54426e64d9e0a90697bfd7ffab3f98e44862a5db294b86d4591a91983b3be1061da5", 0xbf}, {&(0x7f0000001ac0)="4e8e5071c9c70e353f83fdc267aa4bba88f831344833f927850c50907f6e7b67e31ddd73cb52fb24344f227a17e5f4b5cf60acbf7c8bf3f38fcb9565961fbce52f19ceb3d9aa396d6c842375e2d2d71f6981c382f1c1eb102dbebe2fab2361d597db3e9ebbdc12091f5d9f904c4c0f45a585098e6442c2b5abb36f909ed331d1fc9ef2c074df318680e4bb86ff391aa64bf9768fa14979132f2f06048f3e582b76756e15892008eee8683624b2a63a7f7dcd9af1", 0xb4}, {&(0x7f0000001b80)="cef33a4c12489598dbe712e461d4109bf2cd698fa916f33ffcc3befe9d917befcbd3ecc608e53f54901c917c737380708f99abc2ac79e71411dc87ccf5b690e6af47a40c6889bdd4b871943d6b2f0940925ed0d67624ffb18ce0ed0e7c117c2b1786d185856640761e690afd65c1318d4af6255be95b851357fbe17f0082bb6355315ded486fb6", 0x87}, {&(0x7f0000001c40)="8c5ce1deb664a34e4534ffa60f2ea5a84a5ea455e45e42bd45cae84b6a5c3fc81904e6388e3c438760ec555e6cf46e0555073a7adbc89cc866335dedbfdc5368898f37e963f079d4e4826869c8aed375036f3e0408bfdcaa1d8d7145e16ee849de420b11044101fd7ed195a8eb09052d37aeaf5a273ab14e0c1ed64a4873c79728512e45b2e81b564952ca0e14e2357c625d8be5", 0x94}, {&(0x7f0000001d00)="6a5301983686277c3436575b96", 0xd}, {&(0x7f0000001d40)="517a725658cf2fec2c3b418c0d108be588cbe321bd3eb951525180fc2f5b3c9568c30be9158692401d4722109aefe4469b91529746baa65d5ca81a87aede954e37992d896db670d629422cbc5902f25846c27a9d57c05ff30001793ed88266a3ee15a550ed4adf4a5869e5777276f1a0855563d9278cc37c34f9bc286c64199dc5ba0832939625e437fa4e4d1a32b6c24fd7f16bc4d9d4d88be2c8d28d76fffdebebe04a42e175acb314490cc3dd578045694a198826addeec43b749e93e752c60ce9270441d01d86a0d6034ccfc156fbfbc", 0xd2}, {&(0x7f0000001e40)="0ac0a0e06cd6698c6d30590eed9c6b225a8e184da1b7b670086793cec5d9f09d3fe6ded36e22d26b171ba8f225d901d1512d7275aac6f9a4102a3c01587f0294b1fba6619a51caac16ff744ebff096c7f7be371fed428a48b7292fd0b5d5547fae617a5302a8f72036e2b1af2b3a688b86b6691b5a46ac029da9683bfea112c8c1478d68a5b6a03dc9918c03086ff3846bd13c7bcdf62fcfbf32ae47fb7e2e0dc10351de95d51480b3084f705bcc87d9d818a3694376cda4", 0xb8}, {&(0x7f0000001f00)="6f4b406f7209b58fef355f0f7ea77cace8aac04df1d730cfba0ae34b8df1cc315ad933500141b3093810f527c22880a5c57969f029b6cc56284be80d2d478032712bb6dedaa05ccaf16ff498c2093f9ccfac110ce8ad78c5f6e7a75145550af8c0424a8a2bffadf6a2ddd9a01a60813c78512e43b84c125be243ac27da2af3c5c67f961fe3403a7751b7b6d7fee61128bad2ee27ed9eb628dd0f4aabf2e7c74d", 0xa0}, {&(0x7f0000001fc0)}], 0x9, 0x0, 0x0, 0x50}, {&(0x7f00000020c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002680)=[{&(0x7f0000002140)="8d8c49444c05b1c370efb202eaa073b5dcc30f70fbe3ad55fae2f8ad73c9a931c3b0c8af1a58e72a2c323ebd248dfcca268b0b549a7153e594b5a002219801a5700465f9a3e1c3f312417f36744c83ca24ac39e5b4399cd5ae25e3e0ded11bf1b8127100c26f6248170d50ca31d03349bbcdf494ba470029209be08b0b731e87689db4c906fa2852917cec32004f", 0x8e}, {&(0x7f0000002200)="7147e546ed7a5d4a75008594c440bc0eca79cc8f73c117d5e6bd8604a7beba34c74552f5e4a18d8d6ca0ab610aebe99d7e71e0c6a6c26ab669652aff9f998c96665057549359efdb3ce418a484b1ec83d41355d1", 0x54}, {&(0x7f0000002280)="a632ae3e9794b479d6192241d63b1dd8b8956c540cf816268c91a4c3a14552121d244f3fb84bff83f9a4a8f23671deb395c21c257895676c5aeded4b715362afeaabdd9e0f0d1a73dedaaf3dfdd948", 0x4f}, {&(0x7f0000002300)="f075dc12d08612ddb53a245047a86442161a552441f8c6a6e716a9ce1b2b7e99f7e952cf", 0x24}, {&(0x7f0000002340)="c255a220b2dbaf9e6f6c70488487bb2e81a4fd04cbdf55cc83df8d45fec763187affa2dbb6c52f37e19f3169a04832081ba5033961c6b02b6995909b44c5b218ebeee754912ee9cf542b8f74c923503bb64726b43a340e09ac178c400f8b0948259376adcf17f18ece1faae4710012acc6ff17a63f0fb2946c36bc534a88a6b9dde683c97f4a38ca7c99af0a14784aae8c14b0257df5753854aa74347e3b05be2c231b011986a803b74263f6e9d1b741ec12e13cf27396ca6937ab21fbf8275e24986db9b608fd96d6fc937630", 0xcd}, {&(0x7f0000002440)="41fe160644418a9d8862067c1e58c666c5a1fdbe6b6f835c2de346d54d2e58c342b035b346cf2b12c527f4f606b2cf8510ea331b5a928c1b319be28ac58470f3dc325185ce08d691961de039f1b64b6cf731be56ecf50b870b40031a42c8eeef23ce9a142f9b59e4d7e3", 0x6a}, {&(0x7f00000024c0)="46b8376d1449e4fc55d9f2aba00add1f0ee95e52d1a221f167dc0fb2340a6090badc62acb60a9516824c1b5a77485d745846d73cb94ebdadf9378d6f592a1d02f968af608f0511ce92a12f809e360b37bedd1801c32d7143dd95adca012d734ad087152858a424e795cb", 0x6a}, {&(0x7f0000002540)="ae1cf33970cd037f19ffa2a71314a462a46ee1d26f35b2cdd987fe5d29ff3093374bbb878e8daf7bec0112a6e43a7befa118281ccf147d97cffa6f93e8bc4bc7f99a30982edf88067838db442718c981ef3eeb74bae96806517a0659ec506204df40f58aab732d0321a5fa0e284e37571478f231df5de028a4a4e87ef2816f352cee546594251c342f989e6ae72f78811d16ebc9dbcba45ef3ea5bd8ff9cfbf139e40b630d5e1e83bd180028d472e995f2d9704fdbacb4f4f255fca0054c7b237c8fe74ce85e07aabad5756c4fcffae7bd4625d770c0d7df950583", 0xdb}, {&(0x7f0000002640)="2ca1c3ca653501835564c967d87fbe0ac4113a7ad1ead6c906", 0x19}], 0x9, &(0x7f0000002880)=[@cred={{0x1c, 0x1, 0x2, {0x0, r9, r10}}}], 0x20, 0x4000010}, {&(0x7f00000028c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000004d00)=[{&(0x7f0000002940)="446c4c4a7160d42af9b59172cb5b292ebc4df0e5cc3d67c0fc78d636565b03a40891be8347de5b2c77d910a3b5a7fc4a4244", 0x32}, {&(0x7f0000002980)="55880e26db381de9cf0c9bbcd8aef8a4fe4bcbce44c4319b205bf72ee8e5721c7ae375b1", 0x24}, {&(0x7f00000029c0)="cb5ac71af29a0822c61413bf566a44448c1e7bda1139ba87eac4", 0x1a}, {&(0x7f0000002a00)="4096dae81d49529f18ab8c43060ecc1fb85de042b8de057ac15dd2329b695c5d6e4533b8df8fc500a6ca80f45a10fe02ff0f13c6948f72f3c5a0ddc007fdec6b2d111d6c6e989f49c6bcb27169abceee5989ba49299aa80909257c3c601ee3ba06b174fdb8f366e42362a411f8efbbdf8f16edd5bd4fb038dae14e21a53b5d6b490fd7a3dfc53adb42ab38e072356cf81e40b1794230a1a38849e1f83c61019e44861987f3b4cd52a4e2bb41c11816dcefb146035ada1ca4ab38d298eb41009a58ac7fd96875d5d141a1189c54e9bf59e263c7aa984bf89dce7e923220eeece4f660934619b72bf1", 0xe8}, {&(0x7f0000002b00)="2f6841dd10e1e375fa54613f52cede2f3b8f9603fd42deff2ef524cd551792a6d74cc9a32fdeca424e16206bf89a26d3da7b5d234411e93d3d23e182a962404f54a2d0964ab1d3da58d514be5e9f11b2b06cdb2d14edc8eade6bf2825d4e9d9f79bcf936d177911e7c8bf256b849ef91245bff9da85fa86467fd1e8dfe06aa2bc8b8839b72a25299d20462ae3c5990b1740ce0ac02046787adac9ce5b5bbb612674d47fe28d07e115bf8438fa1b4c16a43a5846fe7c909177a802b486042b5f7cad195d8f836df9156e442c0adab", 0xce}, {&(0x7f0000002c00)="b44333d483ed33dc65d40704bb3f6eb3cb3a8816094b2bb50e32e8ef68f293aed241d0412e43a5341fca8f65e919f0f2064be8", 0x33}, {&(0x7f0000002c40)="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", 0x1000}, {&(0x7f0000003c40)="a2608207ce1389f07ba1bba327170d0ad643acb08454eac815c1b694492ff6a5d5d6b1014cfd305b70387b8a48743668e1bb8ab93bbde919d1c1779f625919bc4c49f5b5ec511f0ec36a3efa74889f7c08b6529a4822053800dc0010b9346b52b9092484011d44bd3cb7c150a81f18a6130c8aa517bcba3ca2ba969cb29ff0c6fd23091d7e62a883149f34eb50db4a7bc6eaa8578474a6a53f40006420367cdc", 0xa0}, {&(0x7f0000003d00)="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", 0x1000}], 0x9, 0x0, 0x0, 0x20004840}], 0x5, 0x800) 12:25:33 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="636865636b3d7374726963742c696f636861727365743d637034333782877f6b406940c6260c7246b64cfec9f67f1f8f0a747f2407d06705ddf2276ffbc6fe7db252cde27c790dc8aae55431"]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$nfs4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xd6, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="2b627943180e9d8b37cca8a1f3e7e22f316927fac0ed0776be948923bf38aefb35abe35690de80636b94dfd05b594339f6f42d764823ee6d84bc7c9f481465fccb872942c66cc8feb9727a15cdeed1f6da756f27bef00d53f8e7b880e30e919efaf2c32e08ebb3e23e4f84018bb0435badb749d728703f138aa2a8dfff37634981feb017b454b5f62bb913c06a7b36ae478f4253afa9a17c40ff92f39ed1ed3a1c9c9d69f9333f805853554b3ecdc8e3deffd22154e951c1a6e659d34072043829b10aaac771d17b35c7d15ff37e261614e2cea861e1f70f914d57609bca1e758acd003630b2de345d40c32ce4acac6c489e4e6fc7dde93270", 0xf9, 0x4}, {&(0x7f00000003c0)="27fed720ff22063d86ab03918260130206937ac761e766817cfbb7f86b9b63c1083560b99f1e16342d4e6d80597d62cbe7c8518a0813f1fb3d3e5a6c1fd661672d49750872c1326cbb56d314ba3198bf272623cd74262d238af97594ef953342900e52924e92624be77d461d493893ef062333f79cea6d0bcda0644f4727488ecfc62fd6de95815832bece17727fb03b3155588d77279333a92f660296526e8edb336e447e19acfd404e363b396af649ce8cb0fae8c00ed8cd13203abeec10255ebbbd89e3a596780e019837445057e8369a72cd0744b6a88c522e7ddc32945a65503dd913149d728f51d781ce325c2a5af9", 0xf2, 0x8}], 0x1100000, &(0x7f00000004c0)={[{'].'}, {'vfat\x00'}, {'vfat\x00'}, {'%{/+'}, {'{\xfe'}, {'vfat\x00'}], [{@obj_role}, {@smackfsdef={'smackfsdef', 0x3d, '\xe1'}}, {@smackfstransmute}, {@smackfshat={'smackfshat', 0x3d, 'vfat\x00'}}]}) mmap(&(0x7f00000c0000/0x2000)=nil, 0x2000, 0x4, 0x12, r1, 0xbc1ac000) 12:25:33 executing program 0: openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x181300, 0x5) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) 12:25:33 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0xfffffffffffffdfe, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:33 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x7}, 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$BTRFS_IOC_SYNC(r4, 0x9408, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000523000/0x4000)=nil, 0x4000, 0x4, 0x10, r0, 0x6909c000) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$inet_icmp_raw(0x2, 0x3, 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r5, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) splice(r0, 0x0, r5, 0x0, 0x2fffe, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x210) 12:25:33 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17, 0xfffffffffffffffe}, {0x0, 0x0, 0x600}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRES32]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) dup3(r2, r0, 0x0) 12:25:33 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xde9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x3, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x4008054, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_int(r2, 0x1, 0x3, &(0x7f0000000300)=0xda6, 0xffffffffffffffdc) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r0) ioctl$F2FS_IOC_GARBAGE_COLLECT(r1, 0x4004f506, &(0x7f00000002c0)=0x1) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x0) writev(r1, &(0x7f0000000780)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9", 0x89}, {&(0x7f00000001c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf3400193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f472a", 0x8c}, {&(0x7f0000001340)="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", 0x1b9}], 0x3) sendto$inet(r1, &(0x7f00000012c0)="1a268a927f1f6588b967480241ba78600453f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) bind(r1, 0x0, 0x0) socketpair(0x1a, 0x0, 0x0, &(0x7f0000000640)) setresuid(0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), 0x0, 0xc6, 0x0, 0x0, 0x4020, 0x0) 12:25:33 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) open(&(0x7f00000000c0)='./file0\x00', 0x100000, 0x4) dup3(r2, r0, 0x0) [ 704.719736][ T25] kauditd_printk_skb: 57 callbacks suppressed [ 704.719747][ T25] audit: type=1400 audit(1619439933.161:2319): avc: denied { execute } for pid=1538 comm="syz-executor.5" path="pipe:[137684]" dev="pipefs" ino=137684 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=fifo_file permissive=1 12:25:33 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x111) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x14) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = dup(r2) dup3(r3, r0, 0x0) 12:25:33 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0xfffffffffffffdff, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:33 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0x6, r0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$set_timeout(0xf, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) 12:25:33 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, 0x0, 0x0, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000180)="6f5c26bdb64928b0433edb80d05ef24dd8ce249170519cc3eec0901dfecfcc710dc07639fccb74e44e33799ee3b3febd6b35a49c84a4ee0d867c8c1a6dcbd4fbd614092cf5ff7daa6412e94d8749cf", 0x4f, 0x5e, 0x0, 0x2, r2}]) 12:25:33 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) mount(&(0x7f00000000c0)=@sr0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='anon_inodefs\x00', 0x48000, &(0x7f00000001c0)='vfat\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) r3 = dup3(r2, r0, 0x0) dup3(r1, r3, 0x0) 12:25:33 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0xfffffffffffffe00, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:33 executing program 0: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) r1 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f00000009c0)={'syz', 0x0}, 0x0, 0x0) keyctl$invalidate(0x15, r1) keyctl$KEYCTL_MOVE(0x1e, r1, r0, r0, 0x1) 12:25:33 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0)="20925d9e35a3546fbfbe24b43cda69", 0xf, 0x3}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) chdir(&(0x7f00000000c0)='./file0\x00') umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) dup3(r2, r0, 0x0) 12:25:34 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) open(&(0x7f00000000c0)='./file0\x00', 0x181040, 0x18) dup3(r2, r0, 0x0) 12:25:34 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) request_key(&(0x7f0000000200)='blacklist\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000000)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\xe8[\x89rVix~\xc7\x17', 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0x6, r0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) 12:25:34 executing program 2: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x5) set_mempolicy(0x1, &(0x7f0000000080)=0xfff, 0x400000000000) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sysvipc/msg\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000380)=[{&(0x7f0000000140)="fd0c0e6207ee83ae6b59c6aa0c2c067d027738fa831e3f30f7cbb2d52c9612282b869cb78e6a05edb9", 0x29}, {&(0x7f0000000180)="b1f6de89966d7eca12b2e5d7216e695ce931747919c82e6573ac56cfa63c95787382ded5a3959736b5797ec84070bb3a3d6411512f02bc6fba0eba683b67167303222eb52ae7b4f83a1d78f694bb19cc3e0833c508aace8c5379a132b7ce607e9c36efb355095acd72ab996d9eb38ac646f007bb4b4c728db0d510972abde9c15992a2f9d4f30a08267488f5d51f8d6c4e70a00db1d4", 0x96}, {&(0x7f0000000240)="924afd7487bffc5c29711f6f038812e4110004388bf828426522bf01d2b5a9c0caf9a019c0c18baaac13dbea312e036aaa877352064c93da43c3d292931a88b50d8c1f1b3502d7b53df90bd4051ca584bd52a44ccfdc6709df21d83cf39012bcc7693a48604b89ec6fe9753ea5f51c07211ed2d4b40f09227d4fccb3cfee5291403d182bb65de75856d5dc452e5e7c84442e32df6b3ef72b48d2d53f6e5079871ae80bf53bedf1a43efd67b85f2a6663cb17c640b62643c7f58b7e806190d1b6b12609c51eab650379c2bf944f2840afb92a27e2556398", 0xd7}, {&(0x7f0000000340)}], 0x4) set_mempolicy(0x0, &(0x7f0000000040)=0x4, 0x71004993) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) fchmod(r2, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3f, 0x7) sendfile(r0, r2, &(0x7f0000000100)=0xd0, 0x1) 12:25:34 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) mount(&(0x7f00000000c0)=@sg0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='f2fs\x00', 0x4a803, &(0x7f00000001c0)='.\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) dup3(r2, r0, 0x0) 12:25:34 executing program 0: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) ptrace$setregs(0xd, r1, 0x53, &(0x7f0000000080)="f622fd8b6a3e2d961deaa4b24e1474efce66cff4ffb0d3b9160b3006075b143efcdf5e0f523fdfcf7fa5fd7d0d98603d091596c5adea36eee18d4393cbc341a1f53ec676811cbd5d3cfb16a6a975a7db0cbf63e018cae66b1530e332b42b022a4e851c9bf96ea3205ee164cc4b9dc04858f2c0e7b66c95207732b43f1d18133f902de13eef72109c7c71a2e24e58229020ac365b62fe91a19e2edb53cb719f01960a72174e000000") syz_open_procfs(r0, &(0x7f0000000000)='net/psched\x00') 12:25:34 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, 0x0, 0x0, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000180)="6f5c26bdb64928b0433edb80d05ef24dd8ce249170519cc3eec0901dfecfcc710dc07639fccb74e44e33799ee3b3febd6b35a49c84a4ee0d867c8c1a6dcbd4fbd614092cf5ff7daa6412e94d8749cf", 0x4f, 0x5e, 0x0, 0x2, r2}]) 12:25:34 executing program 5: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x80002, 0x0) tkill(0x0, 0x34) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, 0x0, r6) clone3(&(0x7f0000002180)={0x90000, &(0x7f0000002000), &(0x7f0000002040)=0x0, &(0x7f0000002080), {0x21}, &(0x7f00000020c0)=""/9, 0x9, &(0x7f0000002100), &(0x7f0000002140)=[0x0], 0x1, {r1}}, 0x58) r8 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r9, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000002200)='./file0\x00', &(0x7f0000002240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) r11 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, 0x0, r12) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000080)="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", 0xfe}, {&(0x7f0000000180)="95925220d5bee98c5d46e1cd8def8f6feee0a0acc794d342b35f8d07bc52239a87b3dbdb9d2258ef41718f260f8ebfbc3f0ed2ac9ac1036535057b4d613b578bdb10f29fff41f4bb72487ce4730c", 0x4e}], 0x2, &(0x7f0000001780)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, r3, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r0, r1, r2, r3, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xf0, 0x8000}, {&(0x7f0000001880)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000001d00), 0x0, &(0x7f00000022c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [r1, 0xffffffffffffffff, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @rights={{0x14, 0x1, 0x1, [r4]}}, @cred={{0x1c, 0x1, 0x2, {r7, r9, r10}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r5, r12}}}], 0xe0, 0x4000800}], 0x2, 0x20008048) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfcfa) write(r1, &(0x7f0000000300)="36785c3d25e370f9f67f046082481a0a3ace725d6d75dc15d4bd67248d93fe50c4e5f77203b99c8768b0b961ef68f7bac6cfc6b9a3abe7c0d866f192a41b25facadaf708caaa4211b696bccf56f94ba4c6214020f7c554d67e94d4877f0aca7ceb4c5a095dfe27a73076ff8f18c5aacefdeb31154b40d50c3f523c318bd76f0a03f77cfd5b53e8aa5b2112f895f20fd36c30b5d3b84ec6c329b5af17970379fa94376f363de64a33891538ad120876b470258bbde88e82118d8cdc308c5aaf589eb8d539b91e4451b2d5785e2301ca43dd96720b74cc3d8c5acb23bac8cbecbf0f37526d68a4a21998ce59d1695cbef22c9192e02dd19f6b5037070a8c9e6740976add1f3fc68917ae3c7dc8d3e1d240e6d0660b14de198c24f4be901322eedfd100378173605bd2116308b4d4b89d79efcb479619a847c42e0722443b3b2458d4e3a9579cad1cf87737c5ea6b0e42443fee884f8b1f1482aabd190d86ca6ff72bc41dff2ef2498fb60788cabfc0654c2996454e901b50f97ddad54dd240d2c773d07c2bce68ec46c042103ddd5a715ce66d2e373e0333fa033e8a8d3f001d537f135b7831571fe35b063bff0863412151792da8e5a281887d0cd04c31f9862800806a0d30c8cceadb9d97b5c994042e3c5f21546f39e5da96ed54583ae376303ddf8490096f5277683cc9cb1dcff998acf786da2b81b1fee922cb43e88d24819040ecde63dabff94405a30be26abb79ea44622186813238113d75bff517cae759d15e3dbc0fded351707e7b89dc8d4b501ff1f8306eecad73db56d1d65af5a06ab2ecd732c54f41ca7a3e4eebefb0dd3c20b0ca548cb6fe065caeba91075279bd9b2cad33fb190b02ae1d9c56a1d4a9c59d218a750b071e4d1d2c165dbd112a32200848072da2b9a9373bc4b6c9fb989739891fd7b528c4adb1d4b45803543c36de76f8e28015ea90c00ee1878ba5e374c033533d862d9d772f8dbb09d3e02c6dac838aa60d4ab1fe7c9be811dbc784143195b54e06d40c3d17cf238d389e0726b95d7ca858e341fca9e5e94b49b7e360f3b23ddecf327c2c175360ce97c98dd01c2ec4c175b43b1321cfdd4c5e4295a61bfdd46de5eb4c852035306691c35a32c07e1b40cad2e50e8a9c99c1bf5ba87ecbdcd20af99b389e742b4746769c9d82a38d5a9cd287857bcdacbf2e954d2131fd931aa8d1309f79d184caed532f47481a40f090dda4653a8325819c6348394a23a7418c4c883dffc03f30be4480a6aafc1e95ebd0de188156d100cefb3601f579b721f04ef2d0c0cb7c7700da21cf7c409126cdf3aea0fc729c40c29b48932bbe2e0218f603c0a7aacd94abf683d0a792bf62458615e3a400f94c7c6f1f09c3b2fa14a5f706c88cd3ca6e29e3a23b54905d641d3a4d954f4d54ad7dff95857555f09b80db52e780863724ea689d36f6bc6be494fdb28e8268175cc410b81b07fdc4136742fd3248e46e00d7d386421611292d9d39d0c7ea1cd6ffc46ac0ffba5314ee5426a468d262e3d77c37f09887025ce6415d710375674049173f0f4894097eb8dc4ed171a74610944d5316dd611edbf6f467ca75a41ddd6735a9cd1a8caa3cc671c316b5a3af421a98674ba10aa86163506a1fdaae7e3bc80d4b8fd1c59cf44e04d87e52f4d827a75bc39ba1b3e251eae73f90bc4afe1a6866b0b75ef02d0ae6b284f2b4fdaa2d2e471514052e576c61fe3101056ec546243680a0486dc91d356d4ca56201d016570a8d99512accfb014147b0af00c7988038257c3974deb0341a46fffa472401adb0d13bcb64eb4dd31c95c6e3a78e68beb08f4b12f62a0fa86ac19a2abe0f24212fa43d25c78a876b21b1f4fcaee3cd80db9f579b73acc6773471460ddeb94063386372e7b917cfbd463867a012b74c2e20341b508b3a3f3ab674d99e1bc8c80ee0e1cddf64c2cd3f2e9189e49377245df38fe9bdf95ef249dce0b35095da4d43f9f803ffda0bc67c9044a82440404904daf30fc96de77b6c5deca3be4ed9c5823fa9e8127453f690218b5df91fa097563da8e4cd9e47fcf9bb18df098ecfc808bc96f80078311e9bc456e92c38222bc992904e5f29d598f8ae866f01c6adf60468b6264a458b5e08054b6526b8d2d1e453418e8fcbe2edeb4f3418707b7d3e985a5af4f87a06047d28c8e6fb6de364c448f964668a92ed66c920556e8d752314b53360f2a4b68c552f7fa53f2ab85ca1904ead00d8c19f2c62277a80cf7852f7637edaab2bd110e3b28107955b3366bd62cde9e73caab34f989920e72749db3796bd6a120df71ed33869035c0633248c1f98fdd4dc29d634812cc3d1c90177fb307ad1ffce238c8f82ada79d6d6bd912adb9f8be52eff91ba235ac7a872317c63bcb8c96ccc9cdbdc9cef018258e23ddc14ef27c1bf20bd3def2fd05403035e4a9538645eb7a3ef160868d84266b37feb189b085aab4f78f5fda0c8cdc7b3cc431dd3158088a39e962ce601e7f0276034ff887ece639da63e1849e59ffe07a2ca8eee242711cccd52bdff0636f96e5a44912b8e52685ecb7021a7de3a59a12acd95dff93bef6f4eb98ca26c433d4995994567bcdbcc1ecf9a2d4e2a60f4010662e2aa0d8ccd3c2e07412d77a4868f88b1ce0b84f8adc062a29b17c4eba5de0178e9e994dd38a7dd0e55f7dc77690088cc7e2d0613c1d9f8895d393c16c2b5453305cbec45f6394f7e6762871b59682539b871545ab949ac001c9ba8657adcf12761fa1b1d621ac3f540ad6bf31d45237fa571b17d10c048332a36c0be0ed9d03be8f2d573fe932396468d7907c658d2873931080a4dec31ad114d6235e74ae30f6b5898b90713188d407ff4dcd257f17b840a79f4083f696d5058caff84484b5ad380afc3fddcafcee3f7ebdfa9637b7d58cbc81896e1688ee0ae97f33389fa23b421231164421b00eeb47b605d164a43c28bc286857eea27207cbec7229d8020fbba0c0591bcaf24508fb9b79e02563a7bdba6bbbbabe12158d8352f8860053e511d933558e592ef310ade9321e212810f30523dfc1f046f03bcd0b3d99a4bdbf27d47417c872cf083b12be79c8cce5a2de5d9686fe90f61f61f6f8e9088de5d175334017bc784d42085f16b9be6a32df5f07dd5b897145d974f2fe080d0be8f5646a290ff0e03dec35ff733f057abd9bbb630980161eb465273aa092f461bda24592dfa3306e46c779b2448e38865ceaef74db7b898cd3be81818670e4ebbbe244d774680d41c064c61eb23e1b214604a0b526ef4ab0a9eeec44beed307be00b5bd2a8fcc75f760e7b8e0feb6a36512cecc8bde60ed4808b1b782331429595816d81c4b2a2405171d3264befe92d28fa97a787fa337eab76e362fa7cf30dcd518a002b888790e9f206f1f2e9de2b4a669ef6ffb842465b4970f4528444cafb851086c319d3ad8811160001dfd7f339143bf4903504c215a4ebe122fe892efb1042b62a6949df0509f6dc3e60e293aac68ac5bd1d1de7a2febe57197399d5f9d078addb68d95a57a4563c688e119ad3cac6c5a646af79761080f66b9e9358aa1a5980c36d150e042a8d98ef371447fc45b88b3e743ef1701082ff09f15e4afc7c8ba04afd27c9e1dd9440b35ac31ce513fe5ca8806d917363d1d1fea0dc1ee0d531f7f50f21841412c57cc0247b58ef741bdb7686c0e2308be59eed83999a2c07b577582f1796a8888a684549b15a4dd5290dc148a9381657fe831e8f739fdb600594e665c5306deaf4a15c91b3abe25a0e0c8a9a9e107ef4db85242a8880668c79cf0d43d9f354479027fa23e8e806244138ef1b08762090dd03722bb7d903f4b4fc4eabfff6081d9f875a0324edd5b8caae71e5285cf4938c48d4c5613678bb9fbd1b4c764cdab3aba8893795c1e6ecd69c8d9d581f4b927261790233cf59fa9f3add6eb97e81b1233e70336a79fa8877f006c2fe0b2e66218682f8c4fa197279f8a2fbec8b33786f99b8c75c902a5c8369fcd46e6da255cf9349c166ab124a7d276b9861aa7ea8634411031a99ba9b393b780b2dd6e93b4c660fb58538fb3406fb7fa7f507aaaa3d2a2d250af6851b7b90f2e2bceb54290a10d92a346c3d91ad9d76ce89699ddc75b0c13ab1baa37b152b8431156e1e592eb38f8d0c94b63e2db60851f9151ffa82eb708f60d9ac525536b61c175a7e6fc0b4583db97e6a74a506ea915b5ae7f3b628f25b58e0d49a9c3cf7822aab6ceb7f9a034e10f23f60b9f636f975124efa847f32b2f0ab9c16b29f765d92d2954ba7fe2ccd029147f6739ab5614be1316192734151f56de395ef3070e131ce226d92463dfa6266893c3fa25a50a1041524425fe6658b6fc0a3373615bfe28f89f2d0890d519d5561a20a5fd1d52ec611f99238215a5b3976d80f236e1a11d7bafe9ecee3a45cc5b3131cfca98d1a320077d43c9d23fc827eb3bf456fbd9865172da9471b8b70077210bcc58e1aac9dc9e969bd6b9c461a7f3bed551ee360fccc6eae74519e58928fd5730a3aa5b52a81e4d6efd70ae5fb08d21aa43dc9342aa005986f6f0a2a8de062caad66cdb2bfe208d806fd099706549381664e94ca72b1e577d5b866fa3440d92f83a1bcb29795608ddc2bb7f9f34c4d6c4390d50af4072980a8a9ba33573815e6bfe25050e71a2572a12215b608b5882e63b5bed76b710e65059ef82af86198923ddc6fd739ebc2f4ed4961e7381e54ebb18783ac9697a26d1625479b042a606052838c0cbd42359b59c1a2138342373e97fd29f57958845b0c3b5529b5341612ed9227999388de3c0f024e1e564e2b0323bea799489821fd5734621e15f4f7ac62405b49ccde87c6620f781b9a63f67ab999fc874ff2997cb27ed1485864fc6359ee7f8ddea42fb3bf786c37122ec810ec16687c9e66cd4ae5a45c43e1300fcd994b32d0ded4de2fc6957901afa95bf2bd9022b907e8ec18b1303276d5980131f735d8fd674e2796380f69209eb05605b3b4b72bd0f0c4131c69384baf317904749589eb29ee8914f1380a93dfaa8d4c9cdbfaaace56dadacbdfdb94207d5a8f19f51018bf5f27365761f7d9fe93fed48abf061a44256a5df83b5a532698d84a22abfd95fa911b219fc915f3381bdc00d6b0165fa108ea34c826c3335a7ab6d1f4f8480a26dbebf79c5d31c20d4b234782cfc3f5bb001b247a0965b4a8938dcd5e7360abaf6cda81e4bcc0d1dfb82b2ec22223ebd3bfae11d3b3accd7d3d6d554b8fc7c3994885d19e0dd90bbf307420d273ff5648dd43fe9764d532eb264ac5b979319a7c163b09e709a1dec195f0553c57e497e70c7e254b52058073c0652080d73cbf82f152aa844e764cf61186564fdb95d4cad6fd9ce8d668fcaf732361405969e1acb5c6b3ea264f3354814c1d413dc9b38c2e87f984fc62987441743bb26a8eb98cd62fe0d7d576e2e8b3fec1deaec083caa5d6fdeebd5c2c19d8c2817646729db0a4b24788af354ea074041bdbf7b5f29c2411c4cb59fc6d2c4d019ce32600fd7ac77b8c57dddccbe9e3a91a86b3cfb47c3540f19695872a24a5dd6123f2a7fde17ef5096ddbf19dd3fc7e3f55e11ff64251daf1a62c58c4fb3f197eb14f2ee02d085b07d276c73010b47c05537584411b1da3910df3378f3fd54362b3f90d93df26195301e6822b80172a6d84611379339d14923e4a27b6d2b942529598a0b1756fd2e034c36ea0e4693a1fba7d5e8bb21b6e05285596cfb1f374df45ce697479fa8abc14540e7a2a78841077a8d5084879ffab5847693064634ee56973", 0x1000) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 12:25:34 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:34 executing program 2: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f0000000080)=ANY=[], 0xffffffe3) io_setup(0x81, &(0x7f0000000040)=0x0) fcntl$setstatus(r0, 0x4, 0x6800) io_setup(0x7, &(0x7f0000000000)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./bus/../file0\x00', 0x3ff, 0x2, &(0x7f0000000440)=[{&(0x7f0000000280)="b42879594d73493198f2d77fd18ed86ebe242f93d39fa7dd9d6769220bbeeae1d2c946d052ba7e612e7fd3e85491666a08f39a8ba6164b2432c6d44c7768d397c64bdfd6a7101a87b76629ee5516b8d069b9d032fe4cd73aa57e22ebff2ba2849c8848772f7b949678f3dc88c3b49ced0589d06478ced71b83a9510647829049f63b32ebc5cda33c067d70ce4fcaf6c772e7ac0d25ebb78f2cd96c5296f3c3e72da3021a5656e271b0abbe4595bcf346c33d36a490bb422afa4cea52adcaf31ff8e47d2bcc8351d2d26db7ba69735db9d11036503ad89504fdca65915da87c4d3c1458b38d73dce6158cc63380f1e178d0ee4ae93981", 0xf6, 0x9}, {&(0x7f0000000380)="d6df01436bcec3813a220397ff17667903394aef55423a1bd81ef64573dc09aed5f883f6317636df6679eaa06ffafd3c9473f86df2e57bd22a6fbc5a3954d905f91523bdac3f69680d202a450a03c8dd8a259a0100933f2230fd89712ca5cfe4721ed9ef3c8d8542076f558a7231f1d952bce2c2b5b3fed516d3ea6c54390be63f39e11c38693ca370fa20ed58e8c056c009ab3101306dd9b772e13a", 0x9c, 0x8}], 0x2a000e8, &(0x7f0000000480)={[{@shortname_lower}, {@utf8}, {@utf8}], [{@dont_measure}, {@dont_hash}, {@dont_hash}]}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r5, 0x0, 0xee00) fchmod(r5, 0x0) r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r2, 0x3, &(0x7f00000015c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x7, 0x1, r3, &(0x7f0000000100)="9350163b725ad1909e529f", 0xb, 0x7e, 0x0, 0x1, r0}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0xfffd, r4, &(0x7f00000004c0)="d86bfc352d7d42671174ee1191a3787d139e0012f622", 0x16, 0x20, 0x0, 0x0, r0}, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x3, 0xfff, r5, &(0x7f0000000580)="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", 0x1000, 0x9, 0x0, 0x3, r6}]) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) creat(&(0x7f0000000140)='./bus\x00', 0x0) 12:25:34 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) dup3(r2, r0, 0x0) 12:25:34 executing program 0: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='\x00', r0) 12:25:34 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) inotify_add_watch(r3, &(0x7f00000000c0)='./file0\x00', 0x280) dup3(r2, r0, 0x0) 12:25:34 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:34 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0x6, r0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$invalidate(0x15, r0) 12:25:34 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req={0x2, 0x400, 0x80000000, 0xc07}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0xc63b9e35) r2 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x208a00, 0xe2, 0x9}, 0x18) sendto$inet(r2, &(0x7f0000000180)="616646ee57edf2db75641e994537e37c8850d576a65ba69a4161ffd05442e50b3afdeecffaf0b4bd0fe130e76e2633a040f7f56347430daed60497f99860e1db199a7c29034a24a7de5b482e982209c91953268649cab43398ee82501bfff1c70badb6ea05af674221e92ffbce58115c9401782674912549769ea1265fe3996e50483d7e7f91bc50e9ea47f6c3372f50a5142e2612e66ad3ce6cbdecf04f0e6c1f92c6cdfebb5f11f52fea97b364a2a3251d90ac66b8d00bfc3ccd4d51db3ed7f7b5f066283a1a879437b1ddf7f4e5ebf5a0de83bd8898ae516ac49f35bac5ebcf", 0xe1, 0x4000011, &(0x7f0000000280)={0x2, 0x4e24, @multicast2}, 0x10) 12:25:34 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000180)="6f5c26bdb64928b0433edb80d05ef24dd8ce249170519cc3eec0901dfecfcc710dc07639fccb74e44e33799ee3b3febd6b35a49c84a4ee0d867c8c1a6dcbd4fbd614092cf5ff7daa6412e94d8749cf", 0x4f, 0x5e, 0x0, 0x2, r2}]) 12:25:34 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) sendto$unix(0xffffffffffffffff, &(0x7f0000000140)="0aa03103daafae7a0eaabb447a4211d9fe6734676a4c88e352c816dfdb0f722bf6fb4fa2c50b061b106e5f9081713348290f3391744f05fea4502982494391d1bb819d590272a3bdbb9a98c67bd3d922212a0903bccfd45b6ef7505f3fc5a0485927f00bd14c738dcc0ac4800d667be85188eb17c36b791539be95b4fb167bdc5488bce1afe12dd7d558708809847d30c7af88fbd6d7d18d90efff07cf5075ec5eb8737c5214a4b6", 0xa8, 0x4004040, &(0x7f0000000240)=@abs={0x1, 0x0, 0x4e23}, 0x6e) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) dup3(r2, r0, 0x0) 12:25:34 executing program 0: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f0000000000)={{0x0, 0x3938700}, {r0, r1+10000000}}, &(0x7f0000000100)) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) 12:25:34 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) capget(&(0x7f0000000640)={0x20080522}, &(0x7f0000000680)) mkdirat(r0, &(0x7f0000003a80)='./file0\x00', 0x4c) preadv(r0, &(0x7f00000039c0)=[{&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/4096, 0x1000}, {&(0x7f00000025c0)=""/111, 0x6f}, {&(0x7f0000002640)=""/79, 0x4f}, {&(0x7f00000026c0)=""/4096, 0x1000}, {&(0x7f00000036c0)=""/214, 0xd6}, {&(0x7f00000037c0)=""/20, 0x14}, {&(0x7f0000003800)=""/147, 0x93}, {&(0x7f00000038c0)=""/237, 0xed}], 0x9, 0x9, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) r3 = syz_mount_image$nfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x100000001, 0x3, &(0x7f0000000440)=[{&(0x7f0000000180)="66965d50193036f92df335fac9e6c2a1b818dfca0bdfd501d70e3b63155c9803adeb96fdb2ec8ad1ad89d14643325e3e2e8dec093735db2f3ebb56d0d5ab5438a67c490ea07542f9afb8ccb02b44446708b612f2c8ed6670", 0x58, 0x8}, {&(0x7f0000000240)="f260997e8c1a2d38a4bac9a638fb7175accc59276994d20a692a116ebc2a3ee3129a0451ead33b327a19d77e829e939b04c5811411268b2a09211b6d71aa523fef2a9bce48a338953385141b2c8c7aa76e9f9079791c2f443b30c18b006685c3792060fc0c5844dda10ac09cbd29af75dd9d6ddbd10cd91d545a4b9ceec2b233045b1c262aa97b2484eae5779fee95a53cfb20f5b95e8de82f0d1b59296d4b1fb0fad0e886cfe0f048e1c69650e3e5849b0577a7289809f1ee5dc4aeb718ec179260e7d13a", 0xc5, 0x4}, {&(0x7f0000000340)="027b1d4e80152ff3e5473f72d3e2f9a2fb5bb2692107643c222af7651877149621e6465553d253e182cde6a5bbe2f0416f3b15abb51352a19e45f8b5dc26bb8d423e7b036ab5e6dd370bf086180410cb5bbff39f26c27464c79a97adb918a51f19776fb925237402b81e3ba67f02fc2947987d6faa77f1770f61c95035103c2bdcd13ad3b12273c5de7b35ace53984b86c550ec3eb00704bfb1676", 0x9b, 0x1}], 0x20, &(0x7f0000003ac0)=ANY=[@ANYBLOB="237d935de52c736d61636b66736861743d2c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',appraise,fowner=', @ANYRESDEC=0xee01, @ANYBLOB="01000a56fdb764cef21dac7e1bfa8dea611fa29fd77eb0554be3902496c134a1d6570e8e1d32cdb4ae7e9bfd76c7eb746e75f5c4cca860a16c83a32e61345637cfac558bdde4776189e440fcc839fce8a0c262b9972c33"]) utimensat(r3, &(0x7f0000000540)='./file0/file0\x00', &(0x7f0000000580), 0x100) dup3(r2, r0, 0x0) 12:25:34 executing program 0: ioperm(0x15c, 0x56, 0x10001) 12:25:34 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r0) 12:25:34 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) dup3(r2, r0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x4) 12:25:34 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x2, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:34 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000180)="6f5c26bdb64928b0433edb80d05ef24dd8ce249170519cc3eec0901dfecfcc710dc07639fccb74e44e33799ee3b3febd6b35a49c84a4ee0d867c8c1a6dcbd4fbd614092cf5ff7daa6412e94d8749cf", 0x4f, 0x5e, 0x0, 0x2, r2}]) 12:25:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r1, 0x0, 0xee00) fchmod(r1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) fchmod(r2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYRESOCT, @ANYRESDEC, @ANYRES16=0x0, @ANYRES32, @ANYRES16=r0, @ANYRESDEC=r1, @ANYRES16=r1, @ANYRES32=r2, @ANYRESDEC=r0]) mkdirat(r3, &(0x7f0000000080)='./file0\x00', 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) r5 = dup(r4) open(&(0x7f0000000040)='./file0\x00', 0x2080, 0x8) dup3(r5, r3, 0x0) 12:25:34 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) add_key$user(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000180)="a79e07a2c93ad530822c0edb1aed47301664e4724ec04a7c08f1a90f6678ba43d08de60679c71e6103625e977c5f07e76eca171d5e0b093c8f325312e4ad5753e75aa706a67d092ee1fb6abf509206f468b2fad9b9660af733fdee7c98f67b2bcb8cba6e532811a3bd4d170bdb5deb881e36722e1bb789c2aae88c6cace5e2d410d394874d3596988d4411aa86e3276db326bceeb3f612828f58122eb7f3749602149c699fc5e9ea073d92ce0b00983089c4c82fcebeb5eaaa920cc94f326ae8a6c8adfe1e7a2921a64b7fd5", 0xcc, 0xfffffffffffffffa) 12:25:35 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet6(r0, &(0x7f0000000000)="e9d0e0e4bbdcce47e7760f169f05d89164d69d73d657c0785d6c7b02a3f5511a00d507be27d62181d5fca83453b3be567c0ef8a38e", 0x35, 0x1, &(0x7f0000000080)={0xa, 0x4e21, 0x1, @empty, 0x4}, 0x1c) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) 12:25:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) fchmod(0xffffffffffffffff, 0x0) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000cc0), 0x2000, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000d00)={0x0, 0x0}) getresuid(&(0x7f0000000d40)=0x0, &(0x7f0000000d80), &(0x7f0000000dc0)) r5 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r6, r6, 0x0) r7 = fcntl$dupfd(r1, 0x0, r0) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000e00)='net/ip_mr_cache\x00') r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = geteuid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140)=[{&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000140)="f80932c5442c942015b0f95e0d216aa2e1272168957d52982f543520bb257a245485f04c00e8df84bd7c7827310c4bce90b72a7dfad0b850ec85af8e5fe7915b0157e0475f0f68b34beb", 0x4a}, {&(0x7f00000001c0)="c80d91c4de650de7f359703c34a2a980ea398e410f93dbd0f34c10f14e26746d8e17e92a73119d50c98f2942e2a531feb640a7863285712c21188a96274fcf8a86869f350ef2b766e02e196b3b3f2e312f1ea5b8a55263c06cde35ab4d5bd2e5727aca058aa4da257180b03fd9ae453947785bef2e2dccf932585da4e1ccfd9c761832f80fc8437ec9ff93d8cf38f8d2d91b596b5a5bf43160625f2bc6ed95de12063e96fdf443047c818d8fb9dc2b507d18436195ae2114d31e", 0xba}, {&(0x7f0000000280)="713d004bb6e99c9e217e57061436489566d007c94100070879e5563458b93bee0bf8ffe1dc3528fa67ae34c0ba0065d39da6c5e7c15cc9af717762228713d87141215956a7d37aa11d6c474557b1fc8167d9d68871fbc8c892f65469a399de912b6f54cb170938411ae62efa52375d762b8f9f81500a7d16e28cfb80864313903babe89a5131f6a4ce9c0cbe39ceb6ba90adf15122dc2c26b252379f2323111e411306c7eebf8f0dde95bd51241a3fb765ab32fb0e57397e3a7d94e26b8bcab2f4be63bc0df04cf4045c0aec28ae7e397fe8dca99ba65294f3f21f8576473e46cf67cb00e1a95e62e2d181", 0xeb}, {&(0x7f0000000380)="0410a9655b996befb8b4553eeb0c965e462c522a76629de4ae585f77061eebfc6fa4ed77c408cd1c8aa694d9e0e319324ea348", 0x33}], 0x4, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}], 0x98, 0x980}, {&(0x7f0000000700)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f00000008c0)=[{&(0x7f0000000780)="c3e68ef8b45df48f973d93b934b351eb9c9f6b2055e2831142ab090c477f9e5f4506784fb301db034764a9a03f5fe7d0c39cca585b135c07c4802fc84f8f1786272fc01c954d772f6ad98aa9610eefd5dd098e67628d082b97fc3485c504712055c59b40794b", 0x66}, {&(0x7f0000000800)="61eb8b451105296926d5d5ac2918fb9d19b5a5cfaeedab79b698872d5725c51647f970d85fbab7e7d6f1b0b2dc14402ef558cd425d72b15e125e62ddc14479e1783814c8fd184726165d2d1645cb935003f6da347b981ab30021ec94cf6ab8e18d21f9811d786838b275985693297f4e91b32fe8ed8fc3b41ec2aef2958aa9dc792c206537d2e434df45e4ef471faf9f2a834be67fbe6a183e675dbcaea0045ebcac885cdcb3f307ba33662d9388e7dd15aae15c98cef7475b37fe4a19479d62", 0xc0}, {&(0x7f0000000540)="d5ca03e257078ce7431f40199556f5be2a77269c3f913ef71fcc47730e6ad5f5297447e1851afdd9cd64ac0991c2", 0x2e}], 0x3, &(0x7f0000000a80)=[@rights={{0x18, 0x1, 0x1, [r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [r1, 0xffffffffffffffff, r0]}}, @rights={{0x30, 0x1, 0x1, [r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}], 0x128, 0x48055}, {&(0x7f0000000bc0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000c80)=[{&(0x7f0000000c40)="51e4e8a1cfa3891530f757", 0xb}], 0x1, &(0x7f0000000400)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r9, 0xffffffffffffffff, r7, r1]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r2, r1]}}, @cred={{0x1c, 0x1, 0x2, {r3, r4, r6}}}, @rights={{0x20, 0x1, 0x1, [r0, r7, r8, r9]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0xd8, 0x8800}, {&(0x7f0000000f40)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000010c0)=[{&(0x7f0000000fc0)="846895d4aca232d65aa0fb3505af9335a3cd71621dbe84b12821b28fc8d4b7100ac877442577904f8020ebcad0b9825945c81d45abb7b913db27a4f12efc05ec347ea0c75a4d4bdb5aed9dd72864af62daac30e8bcffa2c46da5a8eb420eacae68b4abfb07127d0219844a996be61ef7f552d072e787348b7cdb73b6391c48371927ef193c84f57fabb5ac4ff34caf7e2207b5d0732cad3cf7a508f49a46c922c7b06ba9624c63ba4b67eb1ad519aa6b31767b4ed999173e9446707980768f2e3a3edb3ec93b5169db3678a751fb4e73f727e3ee", 0xd4}], 0x1, &(0x7f0000001100)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r10, 0xee01}}}], 0x20, 0x40004}], 0x4, 0x4048040) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) poll(&(0x7f0000000000)=[{r0, 0x82}, {0xffffffffffffffff, 0x4000}, {0xffffffffffffffff, 0x1444}, {r0, 0xa0a1}, {0xffffffffffffffff, 0x8010}, {0xffffffffffffffff, 0x2000}, {r0, 0x220}, {r0, 0x253}, {r0, 0x4064}, {0xffffffffffffffff, 0x12c8}], 0xa, 0xffff) readahead(r0, 0x8, 0x80000001) 12:25:35 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:35 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TIOCSTI(r2, 0x5412, &(0x7f00000000c0)=0x8) r3 = dup(r1) r4 = dup3(r3, r0, 0x0) r5 = dup(r3) syz_io_uring_setup(0x5fb3, &(0x7f0000000180)={0x0, 0x3a05, 0xef96bd2f8cd5e8b0, 0x3, 0xa2}, &(0x7f0000064000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000003c0)=0x0, &(0x7f0000000280)=0x0) syz_io_uring_setup(0x2de5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r8, r7, &(0x7f0000000380)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index, 0x10000000, 0x0}, 0x0) io_uring_enter(r4, 0x286, 0x17f2, 0x0, &(0x7f0000000340)={[0x3ff]}, 0x8) syz_io_uring_setup(0x7463, &(0x7f0000000180)={0x0, 0xfffffffc, 0x0, 0x4, 0x3}, &(0x7f00003b2000/0x800000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000000)=0x0) r12 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r10, r11, &(0x7f0000000200)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r12}}, 0x0) syz_io_uring_submit(r6, r9, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x2, 0x0, r0, 0x0, &(0x7f00000002c0)='./file0\x00', 0x57, 0x602040, 0x12345, {0x0, r12}}, 0x1) ioctl$TCSETSF(r5, 0x5404, &(0x7f0000000140)={0x7ff, 0x1464, 0x2, 0x3, 0x5, "86f61fc1bc8d4556ba71a07d4453c87ea7d247"}) 12:25:35 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000180)="6f5c26bdb64928b0433edb80d05ef24dd8ce249170519cc3eec0901dfecfcc710dc07639fccb74e44e33799ee3b3febd6b35a49c84a4ee0d867c8c1a6dcbd4fbd614092cf5ff7daa6412e94d8749cf", 0x4f, 0x5e, 0x0, 0x2, r2}]) 12:25:35 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r0) socket$nl_xfrm(0x10, 0x3, 0x6) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) mmap(&(0x7f0000722000/0x1000)=nil, 0x1000, 0xb, 0x2010, r2, 0x18e43000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="3801000010001307000000000000000020010000000000c0d2cdcdf9529e97e52c5a0593000000000000001a81b5ab9c000020010000000000000000000000000001000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffff000000000000000032000000fe80000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0200656362286369706865725f6e756c6c2900"/240], 0x138}, 0x1, 0x1400000000000000}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@getsadinfo={0x1c, 0x23, 0x200, 0x70bd25, 0x25dfdbfc, 0x0, [@XFRMA_SET_MARK={0x8, 0x1d, 0x1210}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x20000010) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x4ffe0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f00000000c0)={0x2, 0x3, 0xad, 0x100000001}) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r3, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000280)={&(0x7f0000000400)=ANY=[@ANYBLOB="78ff010047a2e9933fa19a9305e2f87333a43d30140f153fb8aded227d", @ANYRES16=0x0, @ANYBLOB="080028bd7000ffdbdf25040000000800020005000000080002000000000048000180080006000500000014000400fe8000000000000000000000000000bb08000300ac1414bb0800060001000000060001000200000008000700", @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32=0x0, @ANYBLOB="08000200030000000800020006000000"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000010) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r3, &(0x7f0000000600)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8800142}, 0xc, &(0x7f0000000240)={&(0x7f0000000640)=ANY=[@ANYBLOB="33009db8747038f75ed8627109a3a514ed606972fbd98ff95103bbc73ea87ac2958417012ba5ce6e447b822d7533dfccb1444236e0921b8310f86b2ca593af528c4dff1f47f91f67a015754f3e82e65343d52e6f938bbcad1e89618ad3f6d4b9cc", @ANYRES16=0x0, @ANYBLOB="000625bd7000fcdbdf25050000000800020003000000080002000500000008000200020000000800020007000000"], 0x34}, 0x1, 0x0, 0x0, 0x4000801}, 0x40000) 12:25:35 executing program 0: r0 = request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\xa7>F\xb8\tC|\xeb\xfd\xf5g\x00\x00c\x03\\\x89rVtx~\xc7\x17\x11;lf\xb2&\xdd\x9c\xa8V\xae\xcd\x99-\xec\x88\xe1\xd6:\xd2 \xcdw\xcf\xbb\xe7\xbb\x83@\xa6\x95$\x82\b\xd7\xb5\x93{\x1d\x8c/\xfe\xbcC\xdek{\x0f\x93\x06P\x13\x81c\xaf7\"\x10\x85\x18\xfed\x8f\xba\x06:\x1a\xdc\xddl', 0x0) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r0) request_key(&(0x7f0000000000)='.dead\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00', r1) 12:25:35 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ff9000/0x4000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000240)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x100}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x2, 0x0, r0, 0x0, &(0x7f0000000100)="d795b80176be2565bfeda40decf4acd6c293ab8051cddf3c639989ffc6a2dcf12eec493b1e69befc0f0284f611ae886204e140f3ac9c300e6021a27d9784d71a8550", 0x42, 0x804, 0x1}, 0x4) io_uring_enter(r1, 0x450c, 0x0, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x24, 0x0, 0xc15, 0xfffffffe, 0x0, {{}, {}, {0x8, 0x11, 0x4}}}, 0x24}}, 0x0) 12:25:35 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) tkill(0x0, 0x34) statx(r0, &(0x7f0000000840)='./file0\x00', 0x800, 0x800, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r3, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r4, 0x0, 0xee00) fchmod(r4, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r5, 0x0, 0xee00) fchmod(r5, 0x0) r6 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000fc0)='tasks\x00', 0x2, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001000)='cpu.stat\x00', 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001080)=[{&(0x7f0000000140)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000001c0)="15f8d576684df389c8", 0x9}], 0x1, 0x0, 0x0, 0x8800}, {&(0x7f0000000280)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000300)="d809744a98d7847b5e98f88c0178489590548e3d00c1c6d26f6161aa0202db44770e4c2796c014b6ee6464b8c6e33ae4512937e4864980ffb9f1d38ff71e9c30", 0x40}, {&(0x7f0000000340)="3485f8e18dc9072c2bf31c79e25218549b61996735508978c0b30e816bafbe837cdbfa4d33c5d75674d18862f797d0ca4239d1c991778411ee8126297b11e41f5ebfb114db5496c0b8686c6f17fd9f84cdd279ff4050f1a4f550aa63fd159015ff7ea210949b6c6cdc2885a168029d81b97024db8bbbefd6282b46980343a9d69fdd813c60291954fe06518104adf108de82ddbcd3cb38ef5be7abd368241ef3b1881444dc77a0cef46c505a90945a4e10bbb73a613914305497ec413a75", 0xbe}, {&(0x7f0000000440)="31f74f86564954ac0b7e8313e14aee9d44a1274de2a711a4603c473baa6703f0eb195af7e91e4181b4f062e1455d24003393f3918be59a052e5fd43ee60c2f8e328313e0410264a767bbaa011ff17097b692f095c04d022bca1495174ed7b487", 0x60}], 0x3, &(0x7f0000000980)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee00}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, r1}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r3, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff, 0xee00}}}], 0xd0, 0xc000}, {&(0x7f0000000a80)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000b00), 0x0, 0x0, 0x0, 0x20000000}, {&(0x7f0000000b40)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000bc0)="1ca0e5f6bface55084e28ffc2f3c82b40f301aac3a5bf103266a3bb2ac9855d44b908e37867db0fc30", 0x29}, {&(0x7f0000000c00)="ae0b2ba95ba4c29cb6e8162e0d606821420eb83871659436054ac2244f8700bbf4660e8fee28bd7066f8dabb2261f95c51303dab78d5fe5c8d9277b835589be71d48c748b184c769ba7f5e3e3279c6201f2c3f9b797dd30dc4c2dae247db1e203d42bc958dd070f671a894f1154ffe23c5d5d08123c0c6d9c0dcd5398dd1e62937de08ed6484eab11419fd066ace6af1f5f9bfaa67adae9a6f281602a24275863a62688988c4d9e7a593918011be82b6b3df385edc580a4132d292ff14055e83443271835c6059347f3ea3cb624d9962c9a4ad6d5ae3f95c8563e08497a894ca43ef1b7d", 0xe4}], 0x2, &(0x7f0000000d40)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, r0, r4, r0, r0, 0xffffffffffffffff, r0, r5]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee01}}}], 0x60, 0x80c0}, {&(0x7f0000000dc0)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000f80)=[{&(0x7f0000000e40)="2637c7ab85c1212445eb0de62ccafc4ec0848863d74ed4a4fecbe8795e74dd6f4d8b3fc8b8fa540e1f2b9e02a8acaec7f5c21f024042627eb9f32e68d0fa15d193d655187488758a6a9b0b7af715f6cf85937ad91454b287af756ef8946853696a7a393c5f4882c95511aa661f5282c67b57f91b76bcba2c728a672f9fccf475270028783b46887cc82bffcb836ce5b224dcb36fc1c815e20e1aca746e4ee3210c3938317d03030e50265fb3fe78e2b92429fb3ddf65b4900939f2975c42468c63c73bc1c058f731455d849460c8faf094769ca78736e0", 0xd7}, {&(0x7f0000000f40)="3eb36438", 0x4}], 0x2, &(0x7f0000001040)=[@rights={{0x1c, 0x1, 0x1, [r0, r6, r7]}}], 0x20, 0x80}], 0x5, 0x4000004) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) r9 = dup(r8) dup3(r9, r0, 0x0) 12:25:35 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) 12:25:35 executing program 5: set_mempolicy(0x1, &(0x7f0000000200)=0x5, 0x6) set_mempolicy(0x4000, &(0x7f0000000000)=0xe7, 0x4) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) set_mempolicy(0x8000, &(0x7f0000000040), 0x7dc) set_mempolicy(0x3, &(0x7f00000000c0)=0x8, 0x1ff) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000080)=""/35) set_mempolicy(0x1, &(0x7f0000000100)=0xd2e0, 0x13) 12:25:35 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0xbc}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESDEC]) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) fchmod(r2, 0x0) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000240)) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x3d) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = dup(r3) dup3(r4, r0, 0x0) 12:25:35 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x4, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:36 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0xaaaaaaaaaaaab41, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x200000000011000}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000000c0)) fcntl$setstatus(r0, 0x4, 0x4000) 12:25:36 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000000)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) 12:25:36 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = signalfd4(r0, &(0x7f0000000000)={[0x2]}, 0x8, 0x80000) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r1) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1}) 12:25:36 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x80c5, 0x3ce47c9a4b8a4c9e) r6 = inotify_init1(0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r7, 0x0) preadv(r5, &(0x7f0000000280), 0x0, 0xd9f, 0x0) inotify_add_watch(r6, &(0x7f00000007c0)='./file0\x00', 0x40000024) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x8600, 0x7c13b2da8987737f) utime(&(0x7f0000000040)='./file0\x00', 0x0) setresuid(0x0, 0xfffe, 0x0) write$9p(r5, &(0x7f0000001400)=';', 0x1) dup3(r2, r4, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000180)="4a185a7475baef56bb4a78f638c7b05a0b76433ab7a1cc0d28b635d5a382e1dde64de491d466cfe1487eceaa7f6f927fbbbee51cfe", 0x35}], 0x1) 12:25:36 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x5, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:36 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(0x0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000180)="6f5c26bdb64928b0433edb80d05ef24dd8ce249170519cc3eec0901dfecfcc710dc07639fccb74e44e33799ee3b3febd6b35a49c84a4ee0d867c8c1a6dcbd4fbd614092cf5ff7daa6412e94d8749cf", 0x4f, 0x5e, 0x0, 0x2, r2}]) 12:25:36 executing program 0: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0xbb, 0x6) r0 = request_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0xfffffffffffffffc) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/stat\x00', 0x0, 0x0) r2 = request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='id_resolver\x00', r0) keyctl$search(0xa, r0, &(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000100)={'syz', 0x0}, r2) fsync(r1) 12:25:36 executing program 5: syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000180)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x2}], 0x0, &(0x7f0000000100)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000002, 0x100010, r1, 0x405c7000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_setup(0x2de5, &(0x7f0000000000), &(0x7f0000002000/0x2000)=nil, &(0x7f0000040000/0x2000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f0000000040)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x3, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1}, 0x8) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r5, 0x0, 0xee00) fchmod(r5, 0x0) mmap(&(0x7f0000517000/0x1000)=nil, 0x1000, 0x0, 0x4000010, r5, 0x622f2000) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r6, r4, 0x0, 0x0) fcntl$getownex(r6, 0x10, &(0x7f0000001800)) [ 707.676001][ T1754] "struct vt_consize"->v_clin is ignored. Please report if you need this. 12:25:36 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f00000000c0)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) dup3(r2, r0, 0x0) 12:25:36 executing program 0: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)={'#! ', './file0', [{0x20, '!}'}, {0x20, ',!\'./-!'}], 0xa, "ebb8eb9e737377ea6c05f6d49c4f5a9d9b69604b104e26e7ea1814017412487689925443d400e54749344e7ad6b4ab28832d37516a43f4e6a0316e89109b9736271d12aca0b177b933809e377cc9f2bf6727c0d04ef695a453"}, 0x6f) [ 707.747827][ T1779] loop5: detected capacity change from 0 to 264192 [ 707.759934][ T1779] FAT-fs (loop5): invalid media value (0x74) [ 707.765978][ T1779] FAT-fs (loop5): Can't find a valid FAT filesystem 12:25:36 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x7, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:36 executing program 0: r0 = request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) keyctl$link(0x8, r0, r0) 12:25:36 executing program 2: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000240)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r1, 0x0, r3, 0x0, 0x88000cc, 0x0) write$eventfd(r2, &(0x7f0000000240), 0xffffff14) 12:25:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(0xffffffffffffffff, 0x0, 0xee01) fchmod(r1, 0x1d) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e666174000201f68bb136108000f801", 0x17, 0x93}, {0x0, 0x0, 0x600}], 0x8018, &(0x7f0000000180)=ANY=[@ANYRESOCT, @ANYRES64, @ANYRES16=r0, @ANYRESDEC=r0]) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r5, 0x0, 0xee00) fchmod(r5, 0x0) sendfile(r3, r5, &(0x7f00000000c0)=0x100000000, 0x808) r6 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r6, 0x0, 0xee00) fchmod(r6, 0x0) ioctl$FITRIM(r6, 0xc0185879, &(0x7f0000000140)={0x80, 0x1, 0x9}) dup3(r4, r2, 0x0) 12:25:36 executing program 0: request_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='{@^\x00', 0xfffffffffffffffa) 12:25:36 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r3, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x9000, &(0x7f00000001c0)={0x2, 0x0, 0x40000, {r5}}, 0x20) r6 = syz_open_dev$sg(&(0x7f00000000c0), 0x3ff, 0x80000) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r6, &(0x7f0000000140)={0x2000}) r7 = socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$BTRFS_IOC_QUOTA_RESCAN(r7, 0x4040942c, &(0x7f0000000300)={0x0, 0x7, [0x2, 0xee, 0x80000001, 0x18, 0x1, 0x5]}) 12:25:36 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x8, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) [ 707.876158][ T1779] loop5: detected capacity change from 0 to 264192 [ 707.899743][ T1779] FAT-fs (loop5): Unrecognized mount option "%" or missing value 12:25:36 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(0x0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000180)="6f5c26bdb64928b0433edb80d05ef24dd8ce249170519cc3eec0901dfecfcc710dc07639fccb74e44e33799ee3b3febd6b35a49c84a4ee0d867c8c1a6dcbd4fbd614092cf5ff7daa6412e94d8749cf", 0x4f, 0x5e, 0x0, 0x2, r2}]) 12:25:36 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x50, r1, 0x100, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xd1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3ff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x40000}, 0x1) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) 12:25:36 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r1, 0x0, 0xee00) fchmod(r1, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000140)=@in={0x2, 0x4e24, @empty}}, 0xd5) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = dup(r2) dup3(r3, r0, 0x0) 12:25:36 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TIOCCBRK(r1, 0x5428) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x2000}]}) r2 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x9) ioctl$PIO_UNIMAP(r2, 0x4b67, &(0x7f00000000c0)={0x8, &(0x7f0000000000)=[{0x9, 0xee3}, {0xfff, 0x1}, {0x2, 0x8000}, {0x6f, 0x1000}, {0xa3, 0x6}, {0x1f}, {0x0, 0xfffc}, {0x5, 0xffe1}]}) 12:25:36 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0xfe, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:36 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) fchmod(r2, 0x0) dup3(r2, r0, 0x80000) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000140)='(pu\t&\"\"\n\x00\xfe\x00\xdc\x10\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\a\x00\x00\x00\xd0\xcd0\xa4\xda\xa8\x05\'u\xe1o+\xbd}ET\xbe6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\x04\x01\x00\x00\x94\xdf\x11J;\x00\x00\x00\x00\x00\x00\x00\x01\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6') 12:25:36 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) r3 = dup3(r2, r0, 0x0) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) r4 = signalfd4(r1, &(0x7f0000000180)={[0x24]}, 0x8, 0x80000) ioctl$KDMKTONE(r4, 0x4b30, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f00000000c0)={0x0, 0x1, 0x462}) 12:25:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000240)={@private2, 0x0, 0x1, 0x0, 0xd}, 0x20) pipe(&(0x7f0000000d00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x5, 0x7, &(0x7f0000000480)=[{&(0x7f00000000c0)='P', 0x1, 0x4}, {&(0x7f0000000100)="368a69042e30123e15b2905d48aa4549936f69f008b3fbff3d5c934435cc1d8c997f82a2aa04452f992d91ae5bd27bcf7b6fdb0a5871d3527174eebc2c90072fe6f948f116472af87d182f460a728e600f9cc6a136ed69a1eceab5481fc6aaf43bbfa36d09b936baf5b69c1e3428e946f2dc9473714f52b159a20899f2a2644c8b12b2b1580e57b6850e65c5365e2752ffb86862a4fbec5e846065b1ee642645a351c1dbab08f0d6700fd500cb736809725cc003ee0e54cb90ea8579738de7d1eb181ca533818ffdf8f15a18757f197e39200bec9686ea42e6be3abc85fc55b13c46f7a6d881de16979f489f", 0xec}, {&(0x7f0000000200)="97d3a88e6353fbcd84472664330be8a017", 0x11, 0x7ff}, {&(0x7f00000002c0)="e23373e83c769e82cef76d8b608dea4ae5816dad42d1439c389cb8ffdf2000e9deb7609a452eea5755004d42172faa33a66ce6b69966d05c29e3bbd9a6ff6a97a047404b2e3161190560667d7297dafcb7c182adbe1ae8a8ecbdddcd", 0x5c, 0xfffffffffffffff9}, {&(0x7f0000000340)="04e16b1d756299065871e7852042be609c47c5e9ec9e2c4b70e19ce0621ce4c31a41edf0344d21f2d67841fbae05794e4d2c5f8a88e9f726c5b76a", 0x3b, 0x1}, {&(0x7f0000000380)="c118a60d0133b182297778641b9b21497f8bc124a092cd75490190a27d3f2ab4f6aa5cf6096776dc3e699511c1c147f15d9fd0e91101750f", 0x38, 0x2}, {&(0x7f00000003c0)="0fb643701bbaaeb05bb2f83e45e30683f7958632f626030e9c89e800557647b709428c3b38369fee9d3d39e44ac4a9516a68b4171283d1ec458e0af672352fb04de1c09411b74f7645eb5aa6f0846127515e3494316bca463e6b4496f9d22d88193708162a33d764db3dacdc8c7dcab53260922b4376180ed0df85410054f116ae239ba4ecfb3961de5c790bb454c4bda78b7063a5fcc79707cdba", 0x9b, 0x8}], 0x1000046, &(0x7f0000000540)={[{@uni_xlate}, {@uni_xlate}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'cp950'}}, {@fat=@codepage={'codepage', 0x3d, '866'}}, {@utf8}, {@shortname_lower}, {@shortname_win95}, {@uni_xlateno}, {@uni_xlateno}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@smackfsfloor={'smackfsfloor', 0x3d, '+^$'}}, {@obj_role={'obj_role', 0x3d, '&'}}, {@appraise}]}) fspick(r5, &(0x7f0000000640)='./file0\x00', 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="00000000be34468bc984b127266047b83fc686e6a4dafe871188870f16cfd1418e645d3cc41b383028fa0613bd536284e4b43e00ee9f59f9410ba8cb8b5fa7af7b275626639faba8579815cb67432cd80972be2507c2f8856697ca8691a9ca04bacd"], 0x1}}, 0x0) socket$netlink(0x10, 0x3, 0xf) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 12:25:39 executing program 0: request_key(&(0x7f0000000040)='logon\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) 12:25:39 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x5) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = dup(r2) dup3(r3, r0, 0x0) 12:25:39 executing program 5: sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100), 0xc, 0x0}, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x1}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8}) shmctl$SHM_LOCK(0x0, 0xb) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000d07000/0x1000)=nil, 0x6000) shmctl$IPC_STAT(0x0, 0x2, 0x0) shmat(0x0, &(0x7f0000ffa000/0x4000)=nil, 0x5000) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) shmctl$IPC_RMID(0x0, 0x0) r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) r1 = shmat(r0, &(0x7f0000ffa000/0x3000)=nil, 0x4000) shmdt(r1) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0), 0x16ffa6269fe5e5b1, 0x0) mmap(&(0x7f00002d5000/0x3000)=nil, 0x3000, 0x0, 0x10010, r2, 0x5a3ff000) shmdt(r1) 12:25:39 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x300, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:39 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(0x0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000180)="6f5c26bdb64928b0433edb80d05ef24dd8ce249170519cc3eec0901dfecfcc710dc07639fccb74e44e33799ee3b3febd6b35a49c84a4ee0d867c8c1a6dcbd4fbd614092cf5ff7daa6412e94d8749cf", 0x4f, 0x5e, 0x0, 0x2, r2}]) 12:25:39 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) syz_open_dev$tty1(0xc, 0x4, 0x1) dup3(r2, r0, 0x0) 12:25:39 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8982, &(0x7f0000000000)={0x6, '\x00', {0x3}, 0x8}) sendmsg$nl_xfrm(r0, &(0x7f00000023c0)={0x0, 0x0, &(0x7f0000002380)={&(0x7f0000002200)=ANY=[@ANYBLOB="040100001a0001000000000000000000e0000001000000000000000000000000fc00d82cab150b599135d4915d00000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000003c000000ac1e0001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002dbd7000000000000a000400680000000000000014000e00fe880000000000000000000000000001"], 0x104}}, 0x0) 12:25:39 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000000000)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) 12:25:40 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x500, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:40 executing program 0: request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000001ffb)={'syz', 0x0}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) 12:25:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r1, 0x0, 0xee00) fchmod(r1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) fchmod(r2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[@ANYRESOCT, @ANYRESHEX, @ANYRES32=0x0, @ANYRESOCT, @ANYRESHEX=r0, @ANYRES64=r1, @ANYRESHEX=r1, @ANYRESDEC=r1, @ANYRES16=r0, @ANYRESDEC=r2]) mkdirat(r3, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000100)='./file0/file0\x00', 0x15) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount(&(0x7f0000000040)=@md0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='adfs\x00', 0x400, &(0x7f00000001c0)='(\x00') r5 = dup(r4) dup3(r5, r3, 0x0) [ 711.561772][ T1873] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 711.578306][ T1878] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 12:25:40 executing program 0: sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x0, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x2004c000) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99@\xe4\xf4\xfe\'^\x9aH\x92\x8bJ\xb9g\xc8\xab\b\x93\xfaF\xb8\tC|\xeb', 0x0) 12:25:40 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x1c30c2, 0x0) r1 = open(0x0, 0x0, 0x0) name_to_handle_at(r1, 0x0, &(0x7f00000002c0)=ANY=[], 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x4000000000010046) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{0x7ff, 0x5, 0x8, 0x1f}, {0x20, 0x0, 0xf7, 0x80}, {0x100, 0x66, 0x2, 0xfffffffb}, {0xbba, 0x50, 0x2, 0x9}]}) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r3, 0x8010671f, &(0x7f0000000000)={&(0x7f0000000140)=""/223, 0xdf}) 12:25:40 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x0, 0x0) 12:25:40 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) getdents64(r0, &(0x7f0000000140)=""/93, 0x5d) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) dup3(r2, r0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0), 0x800, 0x0) mkdirat(r3, &(0x7f00000001c0)='./file0\x00', 0x63) 12:25:40 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x700, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f0000000200)=""/41, 0x29}, {&(0x7f0000000300)=""/56, 0x38}, {&(0x7f0000000440)=""/194, 0xc2}, {&(0x7f0000000540)}, {&(0x7f0000000580)=""/14, 0xe}], 0x5, 0x8000, 0x6) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x5fe}, {&(0x7f00000001c0)="e17ed60016962ed0ba8848bb2ee33f93e1f7402905209ab9", 0x18, 0xfffffffffffff701}, {&(0x7f0000000280)="b5be4e52a4a0f5712538a2dfd119f40b8fa42a1f8e6f74d1fd0f798cfb7242a619ea00b43a5ffa692be616dea03605a177755ad6849fe8d69005f3bf3b8908455bc15f246547aa8ce1fb46014a2dc355922263871caaad30fe4937ed7c0cecdad3b221eb98cb75e5ea34f8a4f52290a9dc03a7158b441fa76e2a67754292eb78", 0x80, 0x8}], 0x10, &(0x7f00000000c0)=ANY=[@ANYBLOB='nonumtail=0,euid=', @ANYRESDEC=r2, @ANYBLOB="2c636f6e050000000000000061646d5f752c00"]) r4 = accept4(r1, &(0x7f0000001ac0)=@rc, &(0x7f0000000540)=0x80, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r4, &(0x7f0000001d40)={&(0x7f0000001b40)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001d00)={&(0x7f0000001b80)={0x160, 0x0, 0x2, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x7f}, @CTA_EXPECT_NAT={0x144, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0x8c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @private1}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_TUPLE={0x30, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @local}}}]}, @CTA_EXPECT_NAT_TUPLE={0x84, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @empty}}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private=0xa010101}, {0x8, 0x2, @empty}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}]}]}, 0x160}, 0x1, 0x0, 0x0, 0xc0}, 0x4) open(&(0x7f0000000240)='./file0/file0\x00', 0x2140, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r5, 0x0, 0xee00) r6 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r6, 0x0, 0xee00) fchmod(r6, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x100000d, 0x1010, r6, 0x96a09000) fchmod(r5, 0x0) preadv(r3, &(0x7f0000001a40)=[{&(0x7f0000000640)=""/98, 0x62}, {&(0x7f00000006c0)=""/222, 0xde}, {&(0x7f00000007c0)=""/141, 0x8d}, {&(0x7f0000000880)=""/154, 0x9a}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/255, 0xff}], 0x6, 0x1, 0x1) sendfile(r0, r5, &(0x7f0000000080)=0x6ec, 0x6) 12:25:40 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000000)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) 12:25:40 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) r3 = dup3(r2, r0, 0x0) sendfile(r3, r3, 0x0, 0x40) 12:25:40 executing program 5: clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000040)='\xa1w\xb1\x170]\xe9\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@oO\x00\x00 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'\b\xe6\xd2\x8e\xbc)J\xa0TDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02=T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x92\xa8\xc2\xcb\xae\xb0\xc3\x93\xb8\x04\xf1\x99\xc2y', 0x6) clone(0x40851200, &(0x7f00000000c0)="536107ea23733376c758a30536c816c02611c84117b0c4ae8a0b989930ad0890cba08e793f7ab708b7809ae2f2573a123900f651ac5baed018d6e2d0c701a8d8f18b03cb8c7cc307dbbfa936387c10742bb44aa5382abdd303f327d18be92922d6d90821", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="17ee9ae4bc0382d052ba") execveat(0xffffffffffffff9c, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 12:25:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) readv(r1, &(0x7f0000000040)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 12:25:40 executing program 5: r0 = gettid() r1 = gettid() tkill(r1, 0x34) sched_getscheduler(r1) r2 = gettid() ptrace$setregs(0xd, r0, 0x4, &(0x7f0000000040)="0e14a10b4cc5a6fffe44d00ecab1") r3 = getpgrp(r1) ptrace$setopts(0x4200, r3, 0x7fffffffffc, 0x0) tkill(r2, 0x27) tkill(r2, 0x17) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) tkill(r2, 0x2e) r4 = syz_open_procfs$userns(r0, &(0x7f0000000000)) ioctl$NS_GET_PARENT(r4, 0xb702, 0x0) 12:25:40 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) chown(&(0x7f0000000140)='./file0\x00', 0xffffffffffffffff, 0xee00) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r1) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x200480, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r3, 0x0, 0xee00) fchmod(r3, 0x0) dup3(r3, r0, 0x0) 12:25:40 executing program 0: request_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='\x99\xfaF\xb8\t\xc4_\xc1Jm^C|\xeb\xfd\xf5g`\xeb\x98\xdf\xa8\xe4-_\xe5\xba\x19\xa67\xbf;_\xc4\xc1\xdbU\xb8/\xf5\xd7Ur\xdd\xbbT\xb7\xb6\xf1}\x1f\xe3v\xdb\x8a', 0xfffffffffffffffd) 12:25:40 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0xeffd, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:40 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x0, 0x0) 12:25:40 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) pipe2(&(0x7f0000000040), 0x80000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="0107000000000000000020000000080008", @ANYRESOCT, @ANYRESHEX=r2], 0x1c}, 0x1, 0x0, 0x0, 0x4008040}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) 12:25:40 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="240000005a001f00ff03f4f9002304000a04f5110800010002010002080002d294ac46ec97582896994f98aea358432197f31227e010910e40b506e248510f84909e9fbec480fa23bd147374696290e5e88083999be437ae8e75828f2990cbe77551fdbfbb5815889bfa983ae35c51229d96f8e3495efb6de26b42b2ce4548e8210f8cfee0570e7a94a2b0db9705", 0x8e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) fchmod(r2, 0x0) splice(r0, 0x0, r2, 0x0, 0xd1cb, 0x0) 12:25:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESOCT=r0]) shutdown(r0, 0x0) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = dup(r2) dup3(r3, r1, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x20400, 0x0) 12:25:41 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0xfcfd, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:41 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000140)={'filter\x00', 0x0, [0x9, 0xfffffffd, 0x0, 0x2, 0x2]}, &(0x7f00000000c0)=0x54) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = dup(r2) dup3(r3, r1, 0x0) 12:25:41 executing program 0: request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\rrVix~\xc7\x17\xc7\xaeV\x1b\x03\x9d~\xdb\x02\x8e\x04\xe0\x8bW\x91\'S\xae?\xac\x1c5/\xad\xbcZ\vG\xf2J\xff\xf7\x00\xefk\x8c\xb5\x17{\xf5\xa1IO\xb0=\xec\xd5\xc9Y7 \xf5X\xc1\xda\x1eY\\\xae*\xa8\xe3BZ/\xdd\xe0\xd7q\x1b\xb7\x03r\xee\x99\xbe^\x93\xf6\x9a\x97\xe4\xa3\xf2H,Q\x1f \xa5\x1aR\x1b\xf9w\xa9\x89\xa2\xe1\xba\xcdT\x7f\x0ez\x9e\xbb\\(\xff\xac\xb8\xad\x12\xe9\x14\x99\xd8\xdc\xf9\xe5\x904\xd0i\xa3\x93X\xbdR\r\x8aJ\xd5/\x8e\xcd<\'\xd8H6\xfb\x1e\x84\x03\x14\xb92\xda\x93\xb3\xf4\t\xde\x90\xeb\a\x8c\"#\x82q\x03\x1eJp\xccP\xf3\xc41\x02J\xad\xe0X#\x92-\x0e\xc6\xf3/\xb4\xe4\xfa\xc7$\xcdj\xdf\xd7\xdf', 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0x6, r0, 0x0, 0x0, 0xfffffffffffffffc) getgroups(0x2, &(0x7f0000000180)=[0xffffffffffffffff, 0xee00]) keyctl$chown(0x4, r0, 0xee00, r1) 12:25:41 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f00000000c0)=0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) dup3(r2, r0, 0x0) 12:25:41 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0xfffffffffffffff8) 12:25:41 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0xfdef, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:41 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/cgroups\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) read$char_raw(r1, 0x0, 0x75) close(r1) 12:25:41 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000240)="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", 0x1bc, 0x8000000000000000}, {0x0, 0xfffffffffffffda2, 0x5}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x9) openat(r0, &(0x7f0000000180)='./file0\x00', 0x4000, 0x41) chmod(&(0x7f0000000140)='./file0\x00', 0x4) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) dup3(r2, r0, 0x0) 12:25:41 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0xfdfc, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f0000000140)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@dots}]}) r2 = dup2(r0, r1) mmap$IORING_OFF_SQ_RING(&(0x7f00005d3000/0x2000)=nil, 0x2000, 0x1000004, 0x12, r2, 0x0) [ 713.059277][ T1978] loop5: detected capacity change from 0 to 264192 [ 713.071099][ T1978] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 12:25:41 executing program 2: set_mempolicy(0x2, &(0x7f00000000c0)=0xfffffffffffffffd, 0x80) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000000022, &(0x7f0000000080)=0x1, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r1, 0x0, 0xee00) fchmod(r1, 0x0) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14, 0x80000) ppoll(&(0x7f0000000180)=[{r0, 0x2180}, {r1, 0x4}, {r2, 0x40}, {r0, 0x8}], 0x4, &(0x7f00000001c0)={0x77359400}, &(0x7f0000000200)={[0x7f]}, 0x8) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000240)="077cb224fa5a28556e0c0a2d62c5774cccea7e739d084e501eac2062aa44c0137da4ff51fa76e83500d820c666aaadb8ecc6b779340616a9548e48b3dfeccce8c13646a2953da19bccb3de910a52ec", 0x4f}], 0x1}}], 0x4000000000001d0, 0x24044075) 12:25:41 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x0, 0x0) 12:25:41 executing program 0: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000140)='\x99\xfaF\xb8\tC|\xeb\xfd\xf5g`\xebc\x03\\\x89rVix~\xc7\x17', 0x0) add_key$user(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="b302b71a90cd1a89dd56912bb4b50544ccea1bab07a49d6e622bd250a27824ee106c8df17ec4a22e9ea01113c753c66ddbd6adc45c5deec6d53c9ab8e66b07601cdeeb876af702f92d3c68e260b31b7ea6937551e720060897254b01f9d07a0227e901791f80770ee26a0d252e021430aceb3611d72f41a62d07195689b9", 0x7e, r0) request_key(&(0x7f0000000180)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)='\x02\x00\x00\x00@ \x00\x01\xa9\x03U\xe5\x01\x00\x00\x000', r0) r1 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$search(0x6, r1, 0x0, 0x0, 0xfffffffffffffffc) keyctl$revoke(0x3, r1) 12:25:41 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) dup3(r2, r0, 0x0) faccessat2(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x100) 12:25:41 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)=0x0) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x0, 0x307f, 0x7, 0x100, 0x7, 0x7, 0x3, 0x1000}, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000013900)="11", 0x1}], 0x0, &(0x7f00000000c0)=ANY=[]) 12:25:41 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0xfdfe, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:41 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) dup3(r2, r0, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x4942, 0x0) openat(r3, &(0x7f0000000140)='./file0\x00', 0x1, 0x20) 12:25:41 executing program 1: mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) chdir(&(0x7f0000000000)='./file0\x00') lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180), 0x2, 0x1) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) dup3(r1, 0xffffffffffffffff, 0x0) [ 713.450603][ T1997] loop5: detected capacity change from 0 to 4096 [ 713.476169][ T1997] EXT4-fs error (device loop5): ext4_quota_enable:6405: comm syz-executor.5: Bad quota inode # 3 [ 713.486840][ T1997] EXT4-fs warning (device loop5): ext4_enable_quotas:6445: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 12:25:41 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) rseq(&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5}, 0x20, 0x0, 0x0) rseq(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0xb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x8400, 0x8, 0x0, 0x2, 0x0, 0x7fff}, 0x0, 0xf, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file1\x00', 0x5, 0x4, &(0x7f0000003680)=[{&(0x7f0000000580)="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", 0x1000, 0x1000}, {&(0x7f0000001580)="1206f24ccf30d2fa340ad9375f012a2cfa7a8c8f899a5b6be68b10b094387bbe32646f1b122a5f13fc93534b59cafd3cd8f7a5f0174da275c2471cde94b18fbe6d7d77bc0a41ebc463f4cd20313ce6bdab52cdcd52cbdc47646454670a6f0a370baab2b1608e29cf2082963e4034bb965a6522885f80d3b76b94887f09cc938956d9371f04f78fd982da5668079524d1e4b06e070ecf3baa8a16f377b4c97a31e66d179b72aead5000347aec408c471c4082d2ca2031a53bbe7f76182551711ed3889f15455786055901aae216aa218b54e1bdfa0f14616081576477ec8eea3f3ae361c260a44acc8139836d3e1df390dbfde95f09cf702c1978af138a3ed8c0d9636b7ebd992d80196b0c0e3f7941185f042b817829ab9fd1d056b80c72764e867507917867270c4404c8bd4f25d3fbbff92693d7400bb35628711d46a7c81d69896959df33ed35710e7434c0bc48f3b587a6ef9c7f44e0b9266ef87e8bd4356908753163f6c868fc502ae60dc7e68d89a2eba3e81734e3089dff353f47b58d22ca5317ec06a2f0e837242675d42dca0fc03a6b457db8fc528b387d60676e6c7376e6004953c44f0dc2233dfa58469392e115e65bf0130c9cbdc40056176f5d1c57814c6cd73f19ee89e81748fd1d8f6c9c0b93d07dcfb915218afcbf8b9e4a1bbff074e749a6ecbb4f5c8fee8e2cebb0158272f82412f8854d8efd5ac4727fb42924a1c7dae1083e6c1ea116ba3022846acb5d023b340f6131c315c76f30ef52f7cbf3b7ee1c7ca17f29fc3c935e100da3afab23eb05afd93c2baa89d6178ccc02582c346e5eb7b80a0c434475b5c32ed7356afca77baa8accff60b7cde55bfaa7d475206e7978eb925ecdf9a9b7cfb0f598ffccbf61aef30c00be1e888518f1f9befdce482b31765ce859ff3c848e85c7bb6a658f7b64380516b8d705929b47877d45ac30421cf01fac6ab946251abe414438cb269a28b3622a2dad0590513d4593767584bf338f33fc053412aec9c23fe0e1cd3f8faaad7609f2e3db877368a4bb108b605651946c8a9191e45c83fa8ac7ff4423f43102afc7105969bf1358c8b1f420a675132dff3ace8aa1e1b30287f444d36c159f88b48444f288d903ab247f11b588408d100c14dabfe8fb85d010f2da07194f9dd405f6168a26d299f46e66104f6eb787e95ca969c87d67f28ab56262fca59a7730681d96821d358e269a55f2042927951696db3fdaf9e6455f25294c9fcc0e4b49414b6a4070f83e44b7861166f3cca6b3bbc950e4f2834511188d953dd9fb8159e87a2f00c85aee18ee219a9d52c4ed73ac39d67420f94722ed761ac4f110fb435f182af58e7b8e223473a82f948e9679dd4937f5949219f428e87b8da967c8d18f683b4ceaa0d0941557cce76f3077e2d19c7fc611a69733a30f018d435ca9ddcce9eaf90050d0f9e18a1152087301f426edc2699ffd52f56eae0ce434b311d0f10091e6f9fffd0a83d3601c1285042970cccc420f1845a0b7b8508e844256af9a08d4655e321644c084da24ae050bed3095e5a5b71183ae76e15e3462673cd57759042e3bfc1c1cae562a3cddaed9e34e093451b240baf8f2f8582d393889c7daaba2ae0be8383c2a18e13bbb48afca733d87fe9e8005e1f462aafc6ba3a5e3de665326fb7f4f486a44c2049c91b48b652bbea4b68b89c54d591d4218fd4eba720cf1a45a7bf3eff66396893d6afc8ea12c11d4ac5e2c83bb333f68914282a3799c68c07bac8313b226b7c3b8dbdd24bae96778d1792598507fbc5b63d3687df889748458aded1eb1e8bc31cf604dc88936a3311f1a0f113e1a5637ec3126641e549bc7f9f13a9888e42490a4684244ccf635a494c2c13dea65a09fabbd337b3362afa8c98281e95cc743b0e5d6d7c2392c99b8c2e12da10bbfc8fd18e008bab541ef4e65ca6a4b606b0105aa75943c0f46e3a60feeffa310f32996527d368e6893fcbc2ab5ebde7803aee16ec64995dbb46a8baa90b8482f0520fb8a591cb5c189c8add13775744704b218b3f28c018c482fd08eed0905aacd40679e13c11da9fcaddcda45b2231b3f5d466aae13e495b1e7eb8a9fdb19194302629789b33dd90c6c81cceaa2e30acc99323438f53e6cc9805a43c0be9ca0486490bf3a34c59fe9e92fd2bf9114b9ea1c0f20504714b7cffe957da0d0db95cbadad42caa3ace0b42c32adad3d4384e74aeac683aa04ad55492f5913e663810472cdf76c39d1ac084320446557d794b74c10cf239f0517b229c14f61b624f95d54860d8eb3a3ac2325990992db0f2b1c11d1701ad42ea877aa8f4bb8bfd9f96c5036b8bb46863ca12ddca50df98376700f3c1c57a6a65a35d50bd56f55a296c9913323c476e39daf19c8bec1d479cd092acf0095474d4ba62f7fbf54e6eb55a639147fefc8045a91766accaa09b75cd40a1e1578f70f27dd4d5f1c943ea41c736d967ff375ed903860f3d3c3dc0632fb7fbeab4753267b600b0b02d1cc9746b5c805d6d91bd4a4bff07bd9930829e1624c002174c69af15d8da0bb5b85de6dd62d350c6e0bba21a8735811708fc63f2c54eb173e5845d8f288d990d931f877c34fdb2d482623a11516c4dcdd27988a38c82ba9d591f3bb138015996afea7565012afe437a0988e8c36826e3c80670cb58e24e65a573dda4f5544b418a319298154fe02977ff282443fa480865048bd1dfdf49efb00127c7245c29f674be4e81710bbf950d2d9090ade9f8d5659b16ad97a7709fb87af0f3768dcaaeb62e038950743af0850fc8e3af5944a2a9f465757ace389142bd74b3e388659cc4d1aaa866b5c9b4c065fa3239977150772b7a8ca54dc5dc88950a2fbc3", 0x7ec, 0x3}, {&(0x7f0000002580)="fd6c466fb1c9869aec4a3ae03daf53fc26c505008b5d3dd42efea6f0054281cf84457191551e0d8e372533bdccd287c482f1b9ab342e0d1df719a885d97ca28aa9714e476742aeeef2bcfa8c3cc2cd045fb9de7c6a27fc3554c995885d5e23d9790514b3f904b588491c8cc5e652a0b51abc2f15b43fbbe7", 0x78, 0x42}, {0x0, 0x0, 0x5}], 0x2080, &(0x7f0000003700)={[{@sb={'sb', 0x3d, 0x4}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}, {@block_validity}, {@barrier_val}], [{@dont_appraise}, {@subj_user={'subj_user', 0x3d, '/dev/vcsu#\x00'}}, {@dont_appraise}, {@seclabel}, {@fsname={'fsname', 0x3d, '^@-'}}, {@audit}, {@subj_user={'subj_user', 0x3d, '/dev/vcsu#\x00'}}, {@appraise_type}, {@obj_type={'obj_type', 0x3d, '/dev/vcsu#\x00'}}]}) syz_open_dev$vcsu(0x0, 0xff, 0x500) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) rseq(&(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x4, 0x7b92605f, 0x3, 0x1}, 0x2}, 0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1, 0x824b2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0xfffffffc}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x19404, 0x0) close(r0) 12:25:41 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)=0x0) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x0, 0x307f, 0x7, 0x100, 0x7, 0x7, 0x3, 0x1000}, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000013900)="11", 0x1}], 0x0, &(0x7f00000000c0)=ANY=[]) 12:25:41 executing program 2: r0 = socket(0x10, 0x800, 0x6) write(r0, &(0x7f0000000000)="2400000043001f0014f97407010944000a0007100800010001000000080080e20000000b", 0x24) [ 713.501889][ T1997] EXT4-fs (loop5): mount failed 12:25:42 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0xfdff, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2002}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) open(&(0x7f0000000040)='./file0\x00', 0x80000, 0x82) creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) [ 713.582038][ T2018] loop5: detected capacity change from 0 to 4096 [ 713.602211][ T2018] EXT4-fs error (device loop5): ext4_quota_enable:6405: comm syz-executor.5: Bad quota inode # 3 [ 713.612801][ T2018] EXT4-fs warning (device loop5): ext4_enable_quotas:6445: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 12:25:42 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x0, &(0x7f0000001440)) 12:25:42 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) dup3(r2, r0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ftruncate(r3, 0x80000000) 12:25:42 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000180)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x1000) fchmod(0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000001c0)={0x0, @aes128, 0x0, @desc2}) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8400fffffffa) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="f0000000100001000000000000000000ff0100000000000000000000000000010000000000000000000000000000000000000000000000000a000000000000008ecfe2f365c9ddd3d66732c4bc647bf91d27538e742527319e46a139e67a7f099e9d172b8b93162241017c29af1ff1c5da3a46e454442f52b7d4610600af5d1bbeb4f8acd08c8b8310d144e8c7a4735f00c049c6dc36998bb6d512f6257e2f91ff6091e9bd777e54357e590c80298fb91df0f1c9b0d2f74582b4e6", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="fc00000000000000000000000000000000000000000000007f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200"/168], 0xf0}}, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{0x0}, {&(0x7f00000002c0)="64e9dabe32d070f6ea637c07d2a89503436820985e75126edc9c15236a901e49f8fead5c538eb210662f107d627c4782b14821653ce1314731a71eb4ae58acbcbf261aa97cb06b07f52e32e99a02769125b7055d3c22c1ab52ef50ef46d8bd33", 0x60}], 0x2, 0xfffffff8, 0x4, 0x4) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r4, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f0000000040)=ANY=[]}) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000100), 0x4) r5 = open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) sendfile(r0, r5, 0x0, 0x8400fffffffa) 12:25:42 executing program 2: r0 = socket(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000001b80)=[{{&(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10, 0x0}}, {{&(0x7f0000000300)={0x2, 0x4e21, @remote}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=[@ip_pktinfo={{0xf, 0x0, 0x8, {0x0, @dev, @multicast1}}}], 0x20}}], 0x2, 0x0) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000040)='.pending_reads\x00', 0x40c2, 0x50) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r3, 0x0, 0xee00) fchmod(r3, 0x0) sendmmsg$sock(r3, &(0x7f0000006440)=[{{&(0x7f0000000200)=@hci={0x1f, 0x1, 0x4}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000340)="ae211e8f600522346930e4c802209cd4dffe688e94d7cdbf915c035b7dd86417f45b4315de26bf8ddc81bb2efe4ea5d58e5219e7c08b111fecac409079968e63e6e86798bfae586d7def63cefa63e4c5b8030a2bd5d4262ea6533b0111a5e2ad0f4578770fc8414d01c366dcceef28780e30b912d5824296167a0a3fbad975935323015d8131c59a959f95dde9d61d236b53da61f7023889f92029693fac298b5112085da7e123d6f0f72b8061e7b118ae6e650f09390cca3628579723d32aa94716782c89741bddd57581a9fa03f388f70958f678156dcc690cc4654cb234a0311c809144cf23cecd908098774bcca7c736b074d0c51135d5b40cbb3e8791297bbe68cb943c4280e0f3b7fa84ea964af7aff8ffb74af84fc75f0e88b8585a27f1e7c9b307297932b68155937f9e9472e0ddd290337a23263ccba9b54d7d15217ee5480c647efb2afd2611b88c33b2fc9916ea3938049240ca35a27e3c93df9cc2e14ce75aa9c3a6042b9636ba5df3160612da309ea043cfa7ab6d3b38bb01599b342f50d050d25bb9b51c4d42e1c520b45d5cfb5f8af8296522d12382588288005232de83a52850cfbcc49d7c24c40d11d84cfcb58737f4a0d30c9a110afad0740e2ee53961b02dc0c8638817771a6560bce0f1187e116a6cc2c36fc92e68060da268b945ff5ce5cb0b7d087e68f8b51af4ef682affc4b65d8caf751b9c53f0c351df6a60983e3135f4e878b7718578ba5385e499a298a613b6025175c21e4acb93a6281fe7e50ef2a0b49f4018c9647f9e2ccc73078d37eb329cd5331d8750110b89ce27ea15d43b250b8ed9b681c163bdabc0c1b798ea153b64e005228d611db8a64b3e5b39fc71aefea59ed867bf9a2a6fe1be276954020787140e1f74e7724927b8575d2d1f5062da6c89dd908fabb41cf0dce170be08f94695e4d045ab081bf51caab7f87518c9f1cc86671e3b8b0b7d07b2a9d4cea30bbed5435ed1d35289505bc4f7d439b807afdb89398209002e2103687cf8c7a7cb081d628d0a6d8961196222de19a60a019fad46e751d35ae7045fbc7d895606f474bdb5a8f44ac72351974a4ed6b4ae890d115dccb4025e2961e8a36c63755a8d8c0b4be21acc8e327f0e59b4806d1b945ffd55684b165423891f3e8cb34f1bb606005174b9fb81002f709c96d55ac76bca1321ffc44e87c27f5a943920ea8947e049156bdffc80cb8840fd033779decd36e9ca9b6d851116b85d9537aa005b7f37b6fdf80059a763de770b385a1fd6589a07b3a39254c444da5b327a8469eaf91728e99ffe0e75f4c0806ed70b6ee419b1d2c896cddfc2f3552d213cf8c2abbb482d5f6603e01cd8f2d8b17550d8fa3a4179323675d7e62cbaeefc07c67be52643e8968b921d3d307ff1543ad8b27dc4194aff28adbecbe65d78ed1a087fc9db242106c97052268cc68705e4ce5812cb92f1e179b50523131f071e81427687bb231e1b579d29108c0e9a4a5499233ebd16a48265477b886f23988d6a1fec30df04292bbd6f59b9bcddce1f9a727f5a99be84694a29d3ef70685a70604d32e777e1e5b074ef889f662ddff3d36a56df72bf98ba9ae39a4f05b021e296aa4b2fe01fababe9e63818b83fd7457b469ca1101f77cec75d80f8d330517e986f4652732ece243af4a45f4e130246474fbf8ef688f1de6a6061cc21b4823707c221a949fab7f556f8eb97693e93895a396a71a960e606c7259d0b8cbab0ff1aca53e0824e5098a61ee8210ee5114c292716debf92ccc5271b3ed259205bd2c4f8e0abc35afd1b45d3b6dac0020730e5902048baa8ab892404fc5da3937830d9b27263d0a0d550b34c078e746fe4fef3bbfb7e3796ad589e619d5831907717421b41ef47db79318dd3d1dda2d24576a61129eecf8c4a107d91c940bd1b994ca8f07873cf56732d5d95f1f74108b3a84614fcbcf4883eb264764eb1004fd04c5649c5e36c7d0b7ad56771cccf1309d66304c6df8edd7414f7003a5ca1d87d63f9cb6153a71171ec88c3df802844cce853f337b11d874fcde9897b66dfa8a83b6732d8076f3f9e5cbe67e12d5461b2856f80a0efe033c55362db0a014fc6d4cb335b94e9a8605edf0621cd01e904c5e85a3aa0ab7a8902f32afbe32cfb69178bd0931210f6e77c6bc336913293da8f33de33ddfa5d962394e82496aa2fee244429a83cdc90e807118c0521d5507b45ee81b2adaca54ad30cc68b333449626becc56fa122c11f2d38ebbc9fced722e4b1eff498050891daa1df4c9eb73a1abf607e25da0413f1931381cfb7550744217d1a00024306c138ece262b80416482635ebbd9bb8df13a3964f8e87dac09b9925e57a8882fa110070c250f0e1f068a174f54f34a6e4b709318350b9f6396ff717d57826fa122c7bbc165cb24fe982b42c3686daae930337c4bd7129e193bf9c7ba6bd124ac707fa394058b7e6dd7644482fbbb0800e8bdeae399bf3c341270c4f11d0fca509202e263c861aa0313b835e58a08c14da48ae3ce7ce5b3140fdb05fdb90220899e8c6e7cc2502b2e7151296f500dd27f4158b798cd4bcffe9c3787f7d9319e63c77eecf372910ae8f007b5fb8d5922ffbf5e27a2baeac41195aaf9514dc4d60b48ee45454298ef9ef33f5a9aacfa05b5f06ad207596275fba424ba4f19f6e95acbe7ab7187e2d5be97f75fa308c64d3e4db11ec39eaf12c74fb4719f0e63bd34e8c6b41f7ede6b86b38b2db40276acf5d73438e44932e92b336de47851e3e04322ec886c24c917612d2bc9f084eecf5518559d8510753f4579c2afb413343cf36d1b69c3b0b232a30640bf2c56ba17fc8d281cfa0b12586fae64ca74cf69a3e5e839fd6af73f7949bbe8a061b7323a4b67a0cb7e91b0742e5fd24d7519052a99b291697c563353bdae8381792b39791483745844ead525713999a811795efbd5aba69ee5496d60cc6bd8fabdb127dc1469b57f4f1042bfab254e9d69959800db9fde90d760edba7ab30e67f2826ec444831faa88ae55c21d37e66d3dc88cafef1839a95440b40574edf86744c2d7cff7db4cf07bd39537dd72e6ef6adde39091db8e8d7776d1f3a8fdfe70c889109fdf27cc556fd97bcbedb4feaa1d0d82d7361381423dae34b69ad72975d6d602251f5c6424a557aa298ba3350d6a00b91f2b689723c3b0a0c6a3d7ed115b8ddeb22e2da68062ac2e6e4c5c989f16c4ded9b91c9434420909315ee9b5a41f7819c7ff667b423266869310492d6607f416d36d0313623139c6bf1c4992a5b5e2c3ee5add3edd308ef44c9fa7664dfd5a5fe5e99427085dc06942fce58e2ca3cc716fe493968a289485a1733d30da17cd7b786e175c1937b0ba55c3636b34176266d5b56673ad1dcd1401ca55c90c10f4b2f862d0f18c7cd8d984436e5155cd3bab0bf137dfc276a010b291ac65f04076613b8766b840731cee7e37d528d26cb3f0d34ff0032148623af38953e74fbe8d6f2be8bd7d019808b90abf1d0f8947171348d790e5889b9014306abf81788fddbf5cf0f707d5ac883d58b18302e816305de76cec875ac272d3780658498c2fcf4b03aaf4e1b60f3117b511c78a5c918d61c4b0ed45787d74f23464ccde3e0603585cfaebfee776fb7de7b03c132deae6b37bebb2a0a882a6690c38def956b8ea1fc75b7636f28df2c19752d06692a4a7624c7301b121137018d8e161aff2fc0d7067581e80f171681ddf5d5bed92814a07c6e01ee2caaaf834d8a5a5a0d04d1c9d009846cfe0034110d1b05de732275a7dc77bd7293667420e4acded1672cf2c2780a797c6b51be400ed2e7aa723a1684275954cd60750b5cc89a38672827804c4cc732e80da92261cb5b697cbe9d22d51b3bef867f5bffdcac632958a3d51d3c6f261013a39d95fa5891e6316d64b579db7284df773a941b00acb98627db5f9d0ffc2eb7a0ed194668c6604c91215405f2a3b674a519f7afcf56a0061a76a246497d8323f8316b23b8d0b9e42b514083867b95f00944f1115099af5498d3e9405dee482e67469237d0cd425f054e497ac3df4f1f699aebc511df3fb7f7d5773812b690745f33a2ca177c2a705cf6b05d56fcdd360c358080b2e288ac1f586a81d64da037113f461b74122384b66b3110af7ddc724007ef78db079169bd48c7740576ba2ef76f6d084fb204c09ca4f309c1c143e21ff599185742a5f44bee12ce0b09cf1561dc80b0b8ffd0eba89f4deea7a22e6cb9e97b637d70b7fa3dcee8515b484a074d4ce99821e3483eb57790cdfb82a30c3a0d9fa0247358453675cac93252de08e6a8087cfe7eff47adf31b6dd20efd60cb2611c87ffe05d5487af846c37e7a878e25a4875bc127999b8ce7d7d3c28bdcacb133ae2a63c9d06c292c365296ec124bd1c7c69d68c9ddd5fcd8c8b62cb6bddb8e73c9b83652da210243f9b4732d6b805dac66162d57e48110ac9383208be7fb3782c51164490e51bd2b352c04bbcbad7bed5efcb6a3bb8acdc4a1409277aac03ca6d7df0201b9f0440d2d8566e04c9b1f3308ed090dfa9308bfec3b3691cd402f71fa9765cd03ef5d7bf97e42aa53fa3576760d2d007f1d5f8f8e3c0cf8fbc0115fcd3a125adef07a681df72c0f2c6cedfb887e824f2a1cb375c5c919badd6ec26ccd44ffb4af6ba73a08d874ff0f5df84ead720b1dca7f4cf9f12386203f7df204d11737e5276e2e3f673404f70a0aed87dc23e87ac4736a4f1382b204f9e28e0251ea841acb6fb9c857fde3d62f7941ac8b401095363422a208a9d776634de0edc87356eff0b83499e7c5e4e356aaf5d4dc901883e3fc7607359c6be8d384770c7cbdb734725b2456f51107448319675a3a96cb48755f9140b2b1c1f5c40f9f8d3ef8ab0b3b8e740e228f88c1dff1527377a42161070739bfd10dd58649e686e444e72dc005d00b40d1a2cbaaf000e2fa8976c2d62afa9fbad2f65b78b6897ab6295995d91fd887e165dbdd44093b072dd3e05e96104a218b189ad49e4f345c66d68f0fec0c73e3277b3b8448b24ddbcabc8049bf51545fb0fbc91b561e05f710a5ef18ff69b9911b04fbf29c811bfea2bdd0e8228ec7bb1ce70a6270b0f48550054ddbe3b8925bbcab5bccba5245cb26233433c3d042ff86c3d9a1ef113d19e1d0ff9856cbabffecd55a87df5d0c565cec46729e9de4d3a16bf6c245ae7cbbbe53da96eecb5df4bccbb317f276f828fe683de551cffe43fb29b89de4f0344c15859e5f9cb59e8cc793489dd44196d7652aa7c289e037673dc44e45469c6d651c2cadf6fc83094a3374443b4006a693edfb723f1142167c9fc4f22db3a62783a80beec0d027e726d5e6d7b227263176d9b2e0fc5164ed9c2821f753880446e1de0cd5e2178755574f117e7b21396e676454e09d0a801433d063b1cc5188e1bfd562224e4daeaecf592f3e736e50547b6e1ed3f0971dc9481f5811f3ee5c937bccddcf2bc6120930d914141a8fdd9ef00dcf879c06ff6b082186c516aa2814b2996a23e9e32f777d075e37d9b04d098bc654db1d63d518a5f00f5c7ac75d4f112873232c9a0dcb233bd66fedcd4f9c0498e23c545a6136ad073e7eb810d404fb7ae9ec58b0c088c69af90d8fcc5e31e0d855963395d0d74194716abe012221839fd88196b34115d04e02a9329cf0914141ac4430daf8f91180d0df2c0ec57eb30fabb3a6b26d666c72b0cc36b0cd0d82be3ed7363530b927d887a8cd7736c5bfb5d15eeb37dfd8fbbeb7aab8327957b959832e37e91fc014295ce605c508c053ac4c81", 0x1000}], 0x1, &(0x7f0000001380)=[@txtime={{0x18, 0x1, 0x3d, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0xfff}}, @timestamping={{0x14, 0x1, 0x25, 0xffffffff}}, @txtime={{0x18, 0x1, 0x3d, 0x180b}}], 0x78}}, {{&(0x7f0000001400)=@in6={0xa, 0x4e20, 0x4, @private1, 0x7f}, 0x80, &(0x7f00000016c0)=[{&(0x7f0000001480)="0a0dc8f704df6e1ab4e23a378e2878d07a8ef8b5451a31b66cdb861c6733aaec01f8fce35cf2cef95b45ba61c9e70b4638e09ec1d4ed09e6bd1f0cedbdf359620b380a56a02b1faf1cb028f3c00f89749afda00a7713b1d7edecff41cf", 0x5d}, {&(0x7f0000001500)="f84a1b0d797e6fe54a1f339715b73c45c5eee018ac4f941c4233fc37edb6dc33e7d1a307ee7c1b4c900576b0b062962b4db027e51922075c9d73ecd4bd81bb20247d0e0d0e2be95c93e7cb6f4716c00dfdf0559fde73e5067a2abaf269f4886d98270c6c9bad4f1f8c93e3b9582a19f79fe202e4d614e7370bf620616d244f7a02b1dc5b6ea4bd85c40511fd0bcdcca54fbd59430b42cd258e53ed906884a5c7ef0aedd82b9e5aa73ae9f4beadb3f5352a5c96aab7d94191690191e907e858b644e9df4d31b33804a603f84f65878cbbe0f0558f5e28cf9e242258c392a2fb2060c7be3cb2e1bc9083c31e78f5de", 0xee}, {&(0x7f0000001c00)="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", 0x1000}, {&(0x7f00000002c0)="18d02ef3e906f4f63a86a585fb672d7c817c9dc2ec565fabcc205f064e5a", 0x1e}, {&(0x7f0000001600)="3edcacf18d3ac307294d13e9e35ed16f0a919b67f4ad35ca9aed018c1ab68dab26edeb6eed86aab3a49b7a7ab52b24da44310f344e3956013c4b9d49b2f402f038af00ac2a0618774a5dd003d24a4969c4b4948d09b73cb88ddd54fb40062de070f66903ac0e790fbddbe83200018ca7d7e752615e2078cc6ad316172d3833edc86b3bcc0b682e74fd6671148bcae570dae5d5a8843478435b076df50878c7a51a84728cd6199cd95cfc1d268b8d7dd9d0", 0xb1}], 0x5}}, {{0x0, 0x0, &(0x7f0000001800), 0x0, &(0x7f0000001840)=[@txtime={{0x18, 0x1, 0x3d, 0x20}}, @timestamping={{0x14, 0x1, 0x25, 0x9b}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x10000}}], 0x90}}, {{&(0x7f0000001900)=@l2={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}, 0x200, 0x2}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000002c00)="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", 0x1000}, {&(0x7f0000001980)="c430fa1dc55f193b557a57346d7c765b09761c26e09de915114b21bfff134b9baf87cba651a96ba074df6baaf719af51df762b7bf0b52313cf8fccad55f8b4", 0x3f}, {&(0x7f00000019c0)="a05881116e5502d16a123acbb2658773d49f4e4f93ae4525dacc010e22292b1ec9ef9edb7b50d066de68d27d2e7b39f9d2e9323966f6341b21394633e392e58008aa9ef3cf1ee7a99080e8c4ffcdd1844cdd236861c8dd", 0x57}, {&(0x7f0000001a40)="9a48a28b5f72c1329f49df4d7f0daa48e1fc6a0baa3fa72b25f3ea57a33aa685dd68b1ee8ce69773acbdc20e77fc7a70c8ca455e1ee50ac4dbc541cadf389567936eda1b1c204980e7a31957d92e81bcf6080e81713fa92ae95cfdbe6bc3bf93be98beaca6cc95f3cc76967669fbb2002232d0192b92f0f42b0ee3659266a25963f150d8ffa04fd488ae60731101ac0a74a89eb0486d992e7d819751dca996e43b487db83b751b66eb1ddf8e15029e553dfe9438f41f4cf791e00e0e523590008e51502f727f72e4d167a89363be2d4ef6db37af4c2dceab093e9311c5", 0xdd}], 0x4, &(0x7f0000003c00)=[@mark={{0x14, 0x1, 0x24, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x5}}, @mark={{0x14, 0x1, 0x24, 0x101}}, @timestamping={{0x14}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @txtime={{0x18, 0x1, 0x3d, 0x1ff}}, @mark={{0x14, 0x1, 0x24, 0xa67}}], 0xc0}}, {{&(0x7f0000003cc0)=@hci={0x1f, 0xffffffffffffffff, 0x2}, 0x80, &(0x7f0000004340)=[{&(0x7f0000003d40)="761bae8123fcc1279bf7da2a0007b1016fd867d59ace33de456c42f240d14c01f5a029f82a6aa63b53470995361da1026fe9deca579e6327aaf2ece10b602d993618b9e8b393725169fefe4d48f6e27308cc15e092b0d7b4dd997a1160e7e4308a408674094b599f0273b1ee5a2407227dcfd31c5131a91c679de42230266537aab0941690dccbee57c2542a0ce7f70245328c763f957bad792509fe30726c56e43d5969ee3c1256aa1c6489aa", 0xad}, {&(0x7f0000003e00)="04ad5aa68ea55381bb7cb9de847e2d614276e73617d4205574df08f0315ec1328cd777efa4b2cb4ca6d9a2ab4f0a8c11038e0edfc2dafe6b0e1c93cf383a0f5dba554c1e4efec8f090393a950e211a24d53e862d661692065c7cd2c60e893c69dbf155a8540c2efa8e922cf64c3a4de5e502bee7de456d27ad6354ec82", 0x7d}, {&(0x7f0000003e80)="01c271ad45078e0e9c1b25a2e913b8e9", 0x10}, {&(0x7f0000003ec0)="518c8a3ead06f772f98b53412a0441c3f990dfb9653cc1a238f4ced34a25f759fc78055d9576ec11778bd0afae75e95e6b7fce271ee1cc52e984c2b776fd98ecf466d1194d35be76", 0x48}, {&(0x7f0000003f40)="1d6e452b21d3bfbac527ec162d17e9a0a68fc1f1d9590c3361f144f08e05b031949f26fd68ec59e268203910aeca2c03ccefcddcacfaf6632e01e22e8ebb8b8ef2d500f2be54cf4651a2ecc6bbb187169909b04412ec0a0a9ee92b34eea449a5478aa53c822d2cb96bdf791d6fc96038c861aeeac8cb9032d02f98249df9c35c17f55c848bb3fc1220d09a6e4185902866c100536a8c84ea8ff5cea915892c6489a73e6c24416437e534b9ab317cc115c8a8d5ac3cd127e50419030c4f7abbffc6cc44b4986f45b76b6aae662893637701b745b3c3e6f55107555d16eca23fa6cf42238cccf4caabe3a201b8de", 0xed}, {&(0x7f0000004040)="d2a44e9ee188d625097a66ea62890625c4275fdb634493c9f8c340229f8273d1865387ff14d567310c2f26ea63760dcc14ae5cd7d26c09e4e73f8bbf01efec95611fdfac727237b3826a94ebfe09ee342649bfa0f9fe2ca07f959ec750bfe1f0c69d8594084f309b34a86440f1c8997e19df3c3dbb528185b8170e35321f17b6fb2cc8ffa571693e1016fbdea719325eb5cd0e08915671e4b48bac51022277f0be5a6b43bba3881c6794afa35e73e4525bf29877430e3e4f3635ce71546593b8768c354c4ce71b63a2f3504d7b69b7d07383fe22ca8bcff0", 0xd8}, {&(0x7f0000004140)="3ea15d9bd5249c0bcbe2ff86d8bdc8e6812c371d9fe0dca99b5b17f3244c95e8890c38dc8d8bb444e274aa3938d3910656a4611101e9d367c04b27906434a6968c8c4b9dbe0f6a22a82defced176ffbbb21c2b", 0x53}, {&(0x7f00000041c0)="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", 0xfb}, {&(0x7f00000042c0)="638b531fbb1873a63a3b2565e3467fa3d66d413e5930eef6bd76f55fdd6b63fe13233ac672aa9df655097b1709ed7e6591409275eac7ef164ad9384e9970daa990ce0aff45ef2828c8082e", 0x4b}], 0x9, &(0x7f0000004400)=[@txtime={{0x18, 0x1, 0x3d, 0x28f}}, @mark={{0x14, 0x1, 0x24, 0x1c}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}], 0x48}}, {{&(0x7f0000004480)=@nfc={0x27, 0x1, 0x0, 0x2}, 0x80, &(0x7f0000004740)=[{&(0x7f0000004500)="970743490d23a3b92f273a35835e0afaee7e77084b525579c8261d8222944c33ee64a35c9948f2fde5d2d2f448979cdc2d5406070b1b6d29e3b6b19e3efab8d9483a574d402aff1c5e3f722bcbbfbb13af55790d35c4dc3a07fb793b59fa969beb0fbb76fa587322662f38b7e78b9363a7f113f26a166d513f3c8512bdd9b8a08a36ea5da8e04a2f6263e229d2765343a11d6f00971e01bb9f4c640322a6921a641f84b316dc9a70231242525e7f6b1548f089", 0xb3}, {&(0x7f00000045c0)="3a1de4d5cae70fd1bc6aff804e65a753c11257534af06fc5dbe50d99", 0x1c}, {&(0x7f0000004600)="b32c35befa9fc8c4e0f41e6c04c2bee730048333ef915f16b22d7a4c47bdb7942184eef40726cb4e9ef2964cc2bb89d373e78ee482843a73da09a97f3eb2662bb8b803897515ef889938ffa6ecdd84d2f3ba1e84beea3e41b4ec279c2d727d2db0dfbb82c949cffce5d17f2cd9a929313c076c7db515fbc5e9a38bf64788d9f8fb2e86d7fd2508e406cc49c41a1b375a5f5b6823e0b9cd96c44f7b25696bc7aea5bcc13c43699b21a4a2316e82342fbb2290e5f2c67fa1237df094420a680ccb6ecea6ec028350e2c3aeb9fe54e7f0212d9de0cd46f5bb3a4aad4f7ae88065e42a047973a62b5d915c92a4b3ae2653e9", 0xf0}, {&(0x7f0000004700)="ff0342572447a422e1da2b0de54be5351fecd282", 0x14}], 0x4, &(0x7f0000004780)=[@mark={{0x14, 0x1, 0x24, 0x7c72}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}], 0x30}}, {{&(0x7f00000047c0)=@pppoe={0x18, 0x0, {0x4, @remote, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000004900)=[{&(0x7f0000004840)="795f6bf87d06cb22e54a10a1e2588c71fcde024efebe3ad7a52f5cbd890c4be4520f0cbc6671a8e12c527e43c77b3087c6da3ec490b07189189be4d44964bc53ce191bdd2fd1337f68f0eb4c8b0672f8f7dea4def8cee02b1e53f20931ea9c3b92399195fd9cb55eae1132a966ef00bac83b22678ab0d9248f4162dc61e2f73ee0c8c60510a0a3a1930e38b132be81cf85", 0x91}], 0x1, &(0x7f0000004940)=[@txtime={{0x18}}, @txtime={{0x18, 0x1, 0x3d, 0xffffffffffff4fd2}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x5}}], 0x78}}, {{0x0, 0x0, &(0x7f0000004ec0)=[{&(0x7f00000049c0)="824eb6d0e6985e365f7abe584c6aa9ab5e13e925bf3a96c7a1906956237e518516ff31dde72f58cb38d4ee2f7a47980116a4f9f7986d40a072bc2a1c676bec40fb586abfc38b", 0x46}, {&(0x7f0000004a40)="88e197b18505bd43c4052a0a66810227d414b824aff8af3120739fc38cf24b44aaa1c0d0922aef20cc8264f1597d0a0afd6f93a766dbcb1b4224bc999d8b899925f49534a479a9fbfb8677df089a8cd0affeb3bf27868ebb3aeb7d9dbfbab2687851e05cc4aea28d65e43a931b7944a0bd4eb69f3fd3c300bb429fefa7a6a6bff55a44ce5ee27980a4904e09946b5246f4b5ef5c256adddd3496043dada82f9ebc7c5295c92ab2a02aa63f674d80577350a46551622a0a671256dce79a782aaebb7d10678b8595131813064c0c02cafd0d207a1988ae124780b88b562dbccbf65cb3fa3b1645d0263a7c2171293ac0d80443bcd567491c", 0xf7}, {&(0x7f0000004b40)="a7b096c1289194e9c8fd34b2e1fc36a3180e3d7413abdbb2e510242b311ad52198cfbd15a75610a654cc24b23a06556718c1a4661d5929f686f5ef7ffd72c3214e8822cba21524aa3b33835e118f48ea4b305be1fd8e96665688ae94df30baefa508586806844d", 0x67}, {&(0x7f0000004bc0)="a571962f9e9277ef999dbc0066368cb701f40a6016712f1ee52b8601062ff697cc925106c8377326b582e56a50a5cbcee6f9c74dc9084da1d8ad873075c5e86ec4165629683b09fc348c4c0d978a5c7eb41c1cbbd115437afa8712ed70ed59c3ff745db3ce015696afd69b91396b5634f6cde87275fb0b442cd5c8d00eaec31cad96e6c4793e395adca3470b4286ff6ed8baaa8ec215d35a41c392690fcfcee9bbc6776c61963d05be0d23454592516dd97b3430b3078ab16d74d48e6933ff50bad0894404fae0d26684b638c067c9d31da9c8393832", 0xd6}, {&(0x7f0000004cc0)="709ef1475871ce8ef195a16cbababbc8c23d5e404011a71fc3", 0x19}, {&(0x7f0000004d00)="08add7c3a1d8856f2d17db8d6bd8a436e5f90c8a5b8fda9906da79ce54a3b7a23e5504e1e5e267a227071fe2f115d7e27b62899cef35847199d65c7297ad932a84d110b23f1b0a5fe5d970478ff4c2d441e8553c647d372f298510f452d19115e6d8c8b6e7f4c55f77e7202c57aa819f0ca85ff43f27cf3b268c9997c37519f66ef1fe3d559690eb7e3ab5176f4d8d03c3059fb07f1bbc85fd0be9878a741b5b7d7be7030b410387951cc8988a5bd535017d20da9936e30d74213114c62e89c23d7dd87de8bcdfc256f9ddf36e8f4c43b95396b33872e2afe34d87fecd170afc8f510e8f327b13ecbaa3e019eecf02b659a47881da48a334042e", 0xfa}, {&(0x7f0000004e00)="438e09136a517cf053d148093d465901bf900d1217eb4cd74cb438553e3b07be85adc5ceb5b72132b1a080eed3fe2c095bf81ebafffa6afe3e0b5e291cf79fdf64d9f8300384543f055a2eaccd5aba8427f67e76b52cf2afcdb271b56d880426c0afb1794940bd42e8cbedf9002a818b8270238cd5726673e85bfceb2ee91537b7c1f2cf2a8e8a7b402efe31be582be9ca3d506995a68022bfe636b74c20aedebd16965065dd4c38b091", 0xaa}], 0x7, &(0x7f0000004f40)=[@mark={{0x14, 0x1, 0x24, 0x5}}], 0x18}}, {{&(0x7f0000004f80)=@isdn={0x22, 0x4, 0x8, 0xf7, 0x7f}, 0x80, &(0x7f00000063c0)=[{&(0x7f0000005000)="7afc8b19d42cae187af54b198af0aadce104484ffe806b7b0880917200fa1ee491904835ea2eb1d73dbe99ec287b9bc47c921889b3e53b1443587203ede99f8f16a5244619295fa03699649a7716c18d31729797c384602066b5e837a5f90c910389a8a6a11c3bd86b71084ac1f0a7f44393", 0x72}, {&(0x7f0000006680)="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", 0x1000}, {&(0x7f0000006080)="f455b275ebe2de56ebbb310c07b5028436bfdea28f6dda766fb2e81c39229b79c58e0a858b1f21c7cf3f3a41f9", 0x2d}, {&(0x7f00000060c0)="b1da546e6aa639992a20dad8e8f225ed2d5b1fb0b4924e04832eea273c7ad85ae99256932d2bcccaf13c4d8a67cf1e99c70e21d1c9c785c0e76f31486859d0c9aec1ea6ff449db2b38a994765cf74d83144157e3a2f1b13d33d7f3f57ad40eb0768532e70aaf1fab684b11631e4c2256dfb84fe6c0a66e2d33c72af5b62717abaaba4a34beab63010c7a9569ad7d3b95eb8d0c78ff658525314e922b0ed0017a9f8a19d68497bf2378b10506b13a4e60b7530745ef4daff9145c865461122e1015", 0xc1}, {&(0x7f00000061c0)="efe8fb2d9d0257f14ebdf5be61dfd3fcc0dab6427f8e41ecc9a9293d314afc77b0c9ae6970d35c189025097b2584136cbbff418a2050b395433172a4669c7b81043ba848724262b778a2b620a62ca25da672d76e18139de255641c466054c3889307694d6b86bdc147457d7b76f9489ca3cc891d30be00c3c2bc6a98bbbf46c6b7dd641e633c6a5fb901328b409826edee72192d", 0x94}, {&(0x7f0000006280)="d81e733ea0984166b0630921facc220c608bf2b85e9e2e1e5818dd16", 0x1c}, {&(0x7f00000062c0)="c3c6bf63ad81f4c864926fe6866d1088f31f40d6b19113c2dd340d99a7ec98cb684f2c69c3910d058fa6427cbd4b3fc9007a3eafec159232f64d87525d8b", 0x3e}, {&(0x7f0000006300)="b9fea7bd443888032b5a749765f83590ea7583872a72dac8cec4f981ac9c2452d1140b9f714414a74f31ff3ca9dc7027a6da596a1b2aee35ab3368831bc61d96da2d165475871ee8bfbad527291036a8462fcd421a516767664a20896052ab56be1ce6ee0816ef186ed164236828715d27a7f191119c13c9af6a715d54099c93c4774acab43a559cd7097e43f9cf18da39e55e362f27c545d1e6d9a4345e9d7d643648c2e36694079193280b444d5b1904cb43606cfbb8f11a42b10da429b7", 0xbf}], 0x8, 0xfffffffffffffffc}}], 0x9, 0x80) r4 = socket(0x11, 0x2, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendto$packet(r2, &(0x7f0000001340)="97cd82f513b7e9323bba9b2988f7", 0x1000e, 0x0, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x48, 0x0, 0x4, 0x70bd2d, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r5}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x6}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}]}, 0x48}, 0x1, 0x0, 0x0, 0x40c0000}, 0x20008000) [ 713.628069][ T2018] EXT4-fs (loop5): mount failed 12:25:42 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0xfe00, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:42 executing program 5: r0 = syz_io_uring_setup(0x18, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f000022d000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) poll(&(0x7f0000000340)=[{r0}], 0x1, 0xfff) ioctl$int_in(r0, 0x5452, &(0x7f0000000180)=0x6) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r3, 0x0, 0xee00) fchmod(r3, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) ppoll(&(0x7f0000000100)=[{r3, 0x211}], 0x1, &(0x7f0000000240)={r4, r5+10000000}, &(0x7f0000000280)={[0x5]}, 0x8) write(r0, &(0x7f0000000080)="c32cc49b03a497e1dd317b2ffff79b9ee53b0404cc358d5545f3dbb1693d09af323e3a18079904aaf63cb1", 0x2b) 12:25:42 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180)={0x0, 0xfb, 0x15, 0x2, 0x2, "03035859c98510d6725eedaf6f6a3da1"}, 0x15, 0x0) r2 = dup(r1) dup3(r2, r0, 0x0) 12:25:42 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0xeb93ec4709f465b0, 0x0) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x44, r1, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'wg1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4008001) syz_read_part_table(0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201bfffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa60000000900000087771f72003007000500000000000000008000ca55aa", 0x40, 0x1c0}]) 12:25:42 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x2a) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) dup3(r2, r0, 0x0) 12:25:42 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[], 0x8) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r3, 0x800) r4 = openat(0xffffffffffffffff, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800001, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fallocate(r0, 0x3, 0x5, 0x886a) dup2(r1, r2) 12:25:42 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fstat(r0, &(0x7f0000000140)) r2 = dup(r1) dup3(r2, r0, 0x0) 12:25:42 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0xfefd, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:42 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x0, &(0x7f0000001440)) 12:25:42 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x2) r2 = dup(r1) r3 = socket$inet(0x2, 0x2, 0x200) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000140)={'broute\x00', 0x0, 0x0, 0x0, [0x8000, 0x10001, 0x0, 0x5, 0x5, 0x6], 0x4, &(0x7f00000000c0)=[{}, {}], 0x0, [{}, {}, {}, {}]}, 0xb8) r4 = syz_open_dev$loop(&(0x7f0000000000), 0x2000000000, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) renameat(r2, &(0x7f0000000300)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000340)='./file0\x00') connect$inet(r2, &(0x7f0000000240)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) fchown(r5, 0x0, 0xee00) fchmod(r5, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r6, 0x0, 0xee00) fchmod(r6, 0x0) fsetxattr$trusted_overlay_redirect(r6, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x0) r7 = dup3(r1, r0, 0x0) dup3(r5, r7, 0x80000) 12:25:43 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pipe2(&(0x7f0000001500)={0xffffffffffffffff, 0xffffffffffffffff}, 0x6800) gettid() r3 = getpgrp(0x0) fcntl$setown(r2, 0x8, r3) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open$dir(&(0x7f00000001c0)='./file0/file0\x00', 0x200001, 0x10) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r5 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000002c0)="f3edaa1e486a1d78f28b8e6172a740b122cfc23d0168d50c82b6f55a106af1da879ed056bac24b1adc1d34758faf988cd6cd2238308c7fed3d25ff9bc513b4dc93", 0x41, 0xffffffffffffffff}, {&(0x7f0000000440)="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", 0x1000, 0x4}, {&(0x7f0000000340)="f79fa504a66f4ac401a353db076689be3fb79e034274995fb5b9", 0x1a, 0xb8b}], 0x24a000, &(0x7f0000001440)={[{@shortname_mixed}, {@uni_xlate}, {@shortname_mixed}, {@numtail}, {@shortname_mixed}, {@shortname_winnt}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@smackfsdef={'smackfsdef', 0x3d, ',,]\xb2'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@fsname}, {@obj_type={'obj_type', 0x3d, 'vfat\x00'}}]}) mkdirat(r5, &(0x7f0000000240)='./file0/file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) open(&(0x7f00000000c0)='./file0\x00', 0x20000, 0x10) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) r7 = dup(r6) dup3(r7, r0, 0x0) utimes(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={{}, {0x0, 0xea60}}) 12:25:43 executing program 2: add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f0000000140)={0x0, "4d2662a99da47b11a54fe8e9ebd84988a7a3f66a5d27d1d02ec35c988a7a7819dbcd2765b523e980c5ef394ec157d74a08634982ae1e6b58029ccba3474a0c8e", 0x10}, 0x48, 0xfffffffffffffffe) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="01", 0x1, 0x1000}], 0x7, &(0x7f0000013a00)) 12:25:43 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0xfffd, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:43 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x0, &(0x7f0000001440)) 12:25:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) splice(r0, &(0x7f0000000180)=0x8, r0, &(0x7f00000001c0)=0x5, 0x101, 0xa) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$NFULNL_MSG_CONFIG(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x1, 0x4, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@NFULA_CFG_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0xea2f}]}, 0x1c}}, 0x20040800) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000040)={0x1}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000580)=[{0x1d, 0x0, 0x0, 0xfffff000}, {0x6}]}, 0x10) 12:25:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x31, 0x0, 0xc04a01) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x1c, &(0x7f00000006c0)=""/133, &(0x7f0000000780)=0x85) recvmsg(r0, &(0x7f0000000580)={&(0x7f0000000000)=@generic, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000080)=""/231, 0xe7}, {&(0x7f0000000180)=""/243, 0xf3}, {&(0x7f0000000280)=""/253, 0xfd}, {&(0x7f0000000380)=""/124, 0x7c}, {&(0x7f0000000400)=""/9, 0x9}, {&(0x7f0000000440)=""/125, 0x7d}], 0x6, &(0x7f0000000540)=""/24, 0x18}, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) fchmod(r2, 0x0) flock(r2, 0xb) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x34, 0x3, 0x6, 0x5, 0x0, 0x0, {0xa, 0x0, 0x8}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x20004000}, 0x4000801) socket(0x9, 0x800, 0x2) 12:25:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/133, 0x85}, {&(0x7f0000000200)=""/255, 0xff}, {&(0x7f0000000300)=""/230, 0xe6}], 0x3, 0x4, 0x4) dup2(r0, r1) rmdir(&(0x7f0000000080)='./file0\x00') 12:25:43 executing program 5: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x1fb978507dcbbbf6) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = accept$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f0000000140)=0x10) lchown(&(0x7f0000000340)='./bus\x00', r2, 0x0) lsetxattr$security_capability(&(0x7f0000000080)='./bus\x00', &(0x7f0000000180), &(0x7f0000000040)=@v3={0x3000000, [{0x2, 0x2}, {0x3ff, 0xffffff7f}], r2}, 0x18, 0x0) r4 = fcntl$dupfd(r3, 0x0, r1) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e22, @multicast1}, 0x10) lchown(&(0x7f0000000000)='./bus\x00', 0xee00, 0xffffffffffffffff) 12:25:43 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x619e7f88b96767f6, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) fchmod(r2, 0x0) preadv(r2, &(0x7f0000000500)=[{&(0x7f0000000180)=""/115, 0x73}, {&(0x7f0000000240)=""/177, 0xb1}, {&(0x7f0000000300)=""/184, 0xb8}, {&(0x7f00000003c0)=""/60, 0x3c}, {&(0x7f0000000440)=""/177, 0xb1}], 0x5, 0x4, 0x6) mkdirat(r1, &(0x7f0000000080)='./file1\x00', 0x1b6) umount2(&(0x7f0000000040)='./file0\x00', 0x2) pivot_root(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000140)='./file0\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = dup(r3) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchownat(r5, &(0x7f0000000580)='./file1\x00', 0x0, 0xee01, 0x1000) dup3(r4, r0, 0x0) 12:25:43 executing program 2: getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000000c0)={@multicast2, @private}, &(0x7f0000000100)=0xc) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)=[0x7, 0xa, 0x5, 0xce7, 0x8000, 0x6]) r0 = syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f00000014c0)=[{0x0, 0x0, 0x80000000}, {&(0x7f00000011c0)="bec043968e3e697dcb7fa2e7ad5779c8f0", 0x11, 0x5}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0032edd9c051d0f3ea4bb51b82e96490391dd8863184131e1038803ceb58b29144bee3fc34a2ebbe40e23a3df64d0d210d7c2dff73189af1c8deecae7253043327d2bf9509916a96ee73c3cc7f71dd"]) r1 = fcntl$dupfd(r0, 0x0, r0) recvfrom(r1, &(0x7f0000000180)=""/190, 0xbe, 0x0, &(0x7f0000000240)=@sco={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}}, 0x80) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x81, 0x58) 12:25:43 executing program 5: r0 = getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)={0x0, r0}) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x2, &(0x7f00000005c0)={0x0}) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x7) sched_setattr(0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0xfe, 0x2, 0x6, 0x94, 0x0, 0xc7c, 0x400, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x8, 0x100, 0x2, 0x9, 0x10001, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xd}, 0x1c) 12:25:43 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r2, 0x0) syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x1, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="25dcacde591ab540dfec00140d72a323c8f65c75dcd4a5bfa18e0e41bca82c780a727d1ea27e5f1d363390c744d161353e3514d49248d301368e3b48fc944e7e286bc02b7da36fbdcc39e2fb4a6f2f6d5141dca9464583616bc2d0df284c22c427cfced22a4baf8b51a6b9c134", 0x6d, 0x1}, {&(0x7f0000000240)="49ee56ed9691010514def86dff37465d6a603431ba8da7385e8edb7a47d6049a8c63d93b76ee11e4b850f9ed10089eda7f81a229bc92b2708a0bace7ca83b54afffd2ccdbc3f1ebf3438a3b5cbe73a9b291a6ae44fb537445da27cc0a7c0dd0aba34e8e01a7d47f331ff94a0f5bf18d64e21df5c99b6c1165f3c65cc9197e88543776e906b09b7", 0x87, 0xe0}, {&(0x7f0000000300)="3db3732136fca78a75afb5eedea419e602b36954a427f5dffc794337dc7032eba68ff1fe2154c45589a7ec967a4c75408ec50c2203daf288b3b27852d35f4cb5fd", 0x41, 0x3}], 0x40000, &(0x7f0000000440)={[{@dmode={'dmode', 0x3d, 0x6}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '{$'}}, {@obj_user={'obj_user', 0x3d, ']{'}}, {@fsname={'fsname', 0x3d, ')\'-&'}}, {@dont_measure}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@euid_gt={'euid>', r2}}]}) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = dup(r3) dup3(r4, r0, 0x0) 12:25:43 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0xf0ff7f, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:43 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000200)='./file1\x00') accept4(0xffffffffffffffff, &(0x7f0000000140)=@nfc_llcp, &(0x7f00000001c0)=0x80, 0x800) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x10012, r0, 0x0) mknod$loop(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file1\x00', 0x141400, 0x4) r1 = syz_open_dev$vcsn(&(0x7f0000000280), 0x20, 0x420140) write$binfmt_script(r1, &(0x7f00000002c0)={'#! ', './bus', [{0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}], 0xa, "07e5ffabc19b54c83555e9b41379c18fc3dd642598f674392746c78c2c559d8ef309665402b1698a42ec6fbe3602918b86ed6ffce99b5d948cbc116e0d417352e94d5f1b1cd8b5ca0252a6823af237eed4fdf429f3b05587155546919b784a87b26ff9016d0f06565fb149bfdc71f9"}, 0x86) 12:25:43 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x4e24, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="200000000000000000000000070800000703e5440c0901e00000020000000000"], 0x20}, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000200)={0x0, 'sit0\x00', {0x4}, 0x6}) r2 = socket(0x11, 0x2, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendto$packet(r1, &(0x7f0000001340)="97cd82f513b7e9323bba9b2988f7", 0x1000e, 0x0, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @broadcast}, 0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB='tunl0\x00'/16, @ANYRES32=r3, @ANYBLOB="0020000700000006000066374b1a006c00640000050890780a010100ac1414aa1f1cac1e0101640101027f000001ac1414bbac1414bbac1414bbac1414bb831b0fac141424ffffffff7f00000164010101ac1414aaac1414aa831bcbac1414bbac141435ac1414bbffffffffe0000001ac1e0101000000"]}) 12:25:43 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0xfeffff, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:43 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="78ea7cd6d44a7991c3567f75f220e41a3b1ce51a36c494d627a6a4e19dee5f30f225ca3ee2ebc857316d9e1c5f91c9ba2caf637dfd0cd6f4c18b9e3f196ef8291d3b2af1b39bd74cd245878267b5993d43ce06eedc038ed28cf4b0c60ebc5e67934077843327ec82795005c13b2e33704dfb5bf5014e6854b7da12e3bf4db648b0aad39e9689456581ef221aad448820a8362e192ee9871577df7c8bef4add21f53608a5ae6c8072e77e1efb1f847976132014c70530412535da9f4c095547765e5b8e8d7973707508da38e0f2b29e69f6d2459e18895c7d4c64744bfeb9517decb90e544bcbac63b818fc2a40933b0a570a387af0713c4b4c99fe2feda1f52e092515ff7b768cbae8e26b3116e0064db3c33b10580ed25f391f7ed22156cc1617b662a8961c5aad70c97bbec581525429c61e51ddea6bda07424705267e7b1ae36e8e8870ddaa85ddf57667d175b16fb124ec5748f91c02e9d9", 0x15a}, {0x0, 0x0, 0x600}], 0x0, &(0x7f00000000c0)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) open(&(0x7f0000000140)='./file0/file0\x00', 0x230c00, 0x2) r2 = dup(r1) r3 = dup3(r2, r0, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(r3, &(0x7f00000001c0)='./file0/file0\x00', 0x2000, 0x10) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) listxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=""/200, 0xc8) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0x40, 0x7, 0x92, 0x8}}) [ 715.148953][ T2125] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 715.157012][ T2125] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 715.168746][ T2125] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 715.176790][ T2125] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 [ 715.230446][ T2125] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 715.238519][ T2125] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 715.250329][ T2125] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 715.258344][ T2125] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:25:43 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x80, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) fchmod(r2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000280)={0x0, r0, 0x9, 0x6, 0x30d28976, 0x8}) ioctl$CHAR_RAW_RESETZONE(r1, 0x40101283, &(0x7f00000002c0)={0x5, 0x4}) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x1, 0x4, 0x0, 0x20, 0x0, 0x9, 0x380, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0x4, 0x7e5}, 0x10300, 0x5, 0x7, 0x9, 0x6, 0x8001, 0x7, 0x0, 0x401, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}], 0x0, &(0x7f0000000540)=ANY=[]) r3 = gettid() tkill(r3, 0x34) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x5, 0x3, 0x3, 0x0, 0x0, 0x8, 0x8001, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x2, @perf_bp={&(0x7f0000000140)}, 0x900, 0x0, 0x3002, 0x7, 0x2, 0x7, 0x0, 0x0, 0x4, 0x0, 0x40}, r3, 0xe, r4, 0x8) 12:25:43 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[0x0]) 12:25:43 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x1000000, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=ANY=[@ANYBLOB="440000cb4ce326258700ed620002020101000000000000000002000000300002802c0001801400030000003203e18765b26ffb47f40000001400040000d1bd248f0034dfc4e35d88c20f78a100000000000000000000200000000083d8c6deb1f910749d269483fa81abdd70ea287b57e0590c922dafc6d43c8aa1ad26727b1645ed3c8e51e0fa13ed80a7d40e83dcf845641180d9e375"], 0x44}}, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_setup(0x2caa, &(0x7f00000000c0)={0x0, 0xa9eb, 0x8, 0x1, 0x2c5, 0x0, r1}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240), 0x82, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000440)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, r4, &(0x7f0000000380)=0x80, &(0x7f00000003c0)=@xdp, 0x0, 0x800, 0x1}, 0x2) sendmsg$IPSET_CMD_SWAP(r4, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x6, 0x6, 0x201, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x8001) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_io_uring_submit(0x0, r3, &(0x7f0000000200)=@IORING_OP_MADVISE={0x19, 0x3, 0x0, 0x0, 0x0, &(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xc, 0x0, {0x0, r5}}, 0x1) 12:25:43 executing program 5: r0 = getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)={0x0, r0}) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x2, &(0x7f00000005c0)={0x0}) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x7) sched_setattr(0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0xfe, 0x2, 0x6, 0x94, 0x0, 0xc7c, 0x400, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x8, 0x100, 0x2, 0x9, 0x10001, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xd}, 0x1c) 12:25:44 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x90, 0x62, 0xff, 0x7f, 0x0, 0x9, 0x4000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x8, 0x25}, 0x21, 0x4, 0x0, 0x0, 0x2, 0x6, 0x3f7, 0x0, 0x401, 0x0, 0x1ff}, 0xffffffffffffffff, 0xb, r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) dup(r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0x28000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f00000000c0)) preadv(r4, &(0x7f0000000580)=[{&(0x7f0000000100)=""/12, 0xc}, {&(0x7f0000000140)=""/125, 0x7d}, {&(0x7f00000001c0)=""/98, 0x62}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000280)=""/152, 0x98}, {&(0x7f0000000340)=""/254, 0xfe}, {&(0x7f0000000440)=""/145, 0x91}, {&(0x7f0000000500)=""/127, 0x7f}], 0x8, 0x8001, 0xfff) r5 = syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$TIOCVHANGUP(r5, 0x5437, 0x0) 12:25:44 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000400)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000000200)=[{&(0x7f00000001c0)=""/5, 0x5}, {&(0x7f00000002c0)=""/194, 0xc2}], 0x2, &(0x7f00000003c0)=""/40, 0x28}, 0x2) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) epoll_pwait(r2, &(0x7f0000000000)=[{}, {}, {}, {}, {}], 0x5, 0x13, &(0x7f0000000080)={[0x8]}, 0x8) 12:25:44 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000142000/0x4000)=nil, 0x4000, 0x7, 0x50, 0xffffffffffffffff, 0xffffe000) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 12:25:44 executing program 1: bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000001340)="97cd82f513b7e9323bba9b2988f7", 0x1000e, 0x0, &(0x7f0000000100)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @broadcast}, 0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000c80)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl0\x00', 0x0, 0x8, 0x20, 0xffffffe0, 0x7, {{0x23, 0x4, 0x0, 0x2b, 0x8c, 0x68, 0x0, 0xfd, 0x4, 0x0, @multicast1, @local, {[@timestamp={0x44, 0x20, 0x94, 0x0, 0x1, [0x2, 0xb6, 0x76a, 0x6, 0x8, 0x5, 0x30000]}, @end, @end, @timestamp_addr={0x44, 0x3c, 0x75, 0x1, 0x2, [{@rand_addr=0x64010102, 0x2}, {@loopback, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x95}, {@empty, 0x2}, {@loopback, 0x1321}, {@broadcast, 0x8}, {@loopback, 0x9}]}, @timestamp_addr={0x44, 0xc, 0x8, 0x1, 0x2, [{@dev={0xac, 0x14, 0x14, 0x2b}, 0x40}]}, @generic={0x94, 0x3, "8b"}, @end, @ssrr={0x89, 0x7, 0x89, [@multicast2]}]}}}}}) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendto$packet(r2, &(0x7f0000001340)="97cd82f513b7e9323bba9b2988f7", 0x1000e, 0x0, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001180)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001140)={&(0x7f0000000cc0)={0x478, 0x0, 0x300, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x50, 0x2, 0x0, 0x1, [{0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x3, 0x4, 0x3, 0x2}, {0x4, 0x8, 0x5, 0x7fffffff}, {0x9, 0x8, 0x7, 0x99b3}]}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}, {{0x8}, {0x134, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}]}}, {{0x8}, {0xc0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xffff}}, {0x8}}}, {0x7c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x4c, 0x4, [{0x9, 0x6, 0x4, 0x80000000}, {0x0, 0x7, 0x1, 0x8000}, {0x9, 0x4, 0x8, 0x72d6}, {0x9, 0x5, 0x3, 0xc10c}, {0x800, 0x5, 0x3, 0x1}, {0x0, 0x1, 0x0, 0x1000}, {0x57, 0x0, 0xff, 0x20}, {0x3, 0x7f, 0x3, 0x5}, {0x3, 0x20, 0x3a, 0xfffffff7}]}}}]}}, {{0x8, 0x1, r0}, {0x84, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r1}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7f7}}, {0x8}}}]}}, {{0x8, 0x1, r4}, {0xe8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3ff}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1d1b6e8a}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xa6}}}]}}]}, 0x478}, 0x1, 0x0, 0x0, 0x4008084}, 0x4004801) r5 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) r6 = socket$packet(0x11, 0x3, 0x300) sendmsg$sock(r6, &(0x7f0000000540)={&(0x7f0000000140)=@in6={0xa, 0x4e24, 0x10000, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000240)="b82908984738395e1ab749886930cfa4e61c076ed4a15d373b3337f829024d3bc49913bf3016a041ea508197c7a5c3eb8f45103e40082c881ce17ea18df3a6fca262a444d1718316011c1f9ed15ff5cb228583359f8299c4ade0587164be89623c5b54af0a351476db4696b91ba9b0115a00f0c4d5662074bb82744a95249b2ce5b1d3afc0951d46767101e510085784521fb74b45cc3492a880d3f76beede33bc39211fc362dc3d3bc14e568132af24a68a4b5be7a41eddacfc340bcca23b6a5477829e2169481e44c030ddea09a1", 0xcf}, {&(0x7f00000000c0)="78fdf54ca7d54be695f001ed7c82117bfd0a0bad510df879", 0x18}, {&(0x7f0000000440)="a6dc3e4b9ea938dba1a8273f5b673f4381b37ea6a8e942ff0cfdc5e8f9c2f8480f47b511e0537ab1d194b6aa7f2b958723814c91a02a5cbaa04dc1f0532f6239bd3e5892ced18dafa153ec8d834fb184699bf2f5b55b0fbab795e770fe4cafb86efaf4b0669eb49ddf43e34f219bf1bf282b0be3d8e72cccbbdd4734775b1636e510dd8c0279a68cf4a1ef7d1d8d9cdf9925cbf5c98e7935b211a552b0f8dc1b0ad60add099e2af8bab2203050ae89b33685fb6a995f09f2e5afd5082e1c3a50608c1d28da799c088ad9", 0xca}], 0x3, &(0x7f0000000340)=[@timestamping={{0x14, 0x1, 0x25, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x1139}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x23f59b0a}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x5}}], 0xa8}, 0x40040) mkdirat(r5, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) r8 = dup(r7) openat$urandom(0xffffffffffffff9c, &(0x7f0000000580), 0x80000, 0x0) r9 = ioctl$NS_GET_PARENT(r8, 0xb702, 0x0) dup3(r9, r8, 0x0) 12:25:44 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8802}, {&(0x7f0000000200)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d41", 0x34, 0xe000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='md\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 12:25:44 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x2000000, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:44 executing program 0: r0 = perf_event_open$cgroup(&(0x7f0000000100)={0x2, 0x80, 0x11, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4001, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) r1 = syz_open_dev$vcsu(&(0x7f0000000000), 0xffffffffffffffff, 0x20001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) fchmod(r2, 0x0) accept(r2, &(0x7f0000000040)=@l2tp6, &(0x7f00000000c0)=0x80) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x1) 12:25:44 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) dup3(r2, r0, 0x0) 12:25:44 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[0x0]) 12:25:44 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000280)=""/148, 0x94}], 0x1) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000040)={0x4, 0x6, 0x6a, 0x5, 0x1b, "cc0558488435be774706436af99b89ab67a727"}) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r1, 0x541c, &(0x7f0000000080)={0xd, 0x100}) readv(r0, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/178}], 0xf8) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000072000032eb00"}) r2 = syz_open_pts(r0, 0x2002) dup3(r2, r0, 0x0) write(r0, &(0x7f0000000040), 0x0) [ 715.811152][ T2158] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 715.819217][ T2158] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 715.830529][ T2158] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 715.838757][ T2158] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:25:44 executing program 2: unshare(0x400) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = clone3(&(0x7f0000001680)={0x14080, 0x0, 0x0, 0x0, {0x10000000}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x13, 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000080)={0x0, {0x2, 0x4e23, @local}, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e21, @empty}, 0x40, 0x0, 0x0, 0x0, 0xffff, &(0x7f0000000040)='caif0\x00', 0x3be4a1e3, 0x1, 0x5}) waitid$P_PIDFD(0x3, r2, 0x0, 0x4000000e, 0x0) 12:25:44 executing program 5: r0 = getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)={0x0, r0}) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x2, &(0x7f00000005c0)={0x0}) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x7) sched_setattr(0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0xfe, 0x2, 0x6, 0x94, 0x0, 0xc7c, 0x400, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x8, 0x100, 0x2, 0x9, 0x10001, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xd}, 0x1c) 12:25:44 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x5, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17, 0x4}, {0x0, 0x0, 0x600}], 0x1000012, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) open(&(0x7f00000000c0)='./file0\x00', 0x1c9000, 0x34) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) dup3(r2, r0, 0x0) [ 715.922495][ T2158] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 715.930545][ T2158] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 715.941777][ T2158] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 715.949894][ T2158] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:25:44 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x4d}, {0x6, 0x0, 0x0, 0x7ffffff7}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 12:25:44 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@known='trusted.overlay.nlink\x00') r2 = dup(r1) dup3(r2, r0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpeername(r3, &(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f00000000c0)=0x80) 12:25:44 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x4000000000000c, r0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) fallocate(r1, 0x48, 0xfffffffffffffffd, 0x801fffc) 12:25:44 executing program 2: set_mempolicy(0x8000, 0x0, 0x456e7f62) syz_open_dev$tty20(0xc, 0x4, 0x0) 12:25:44 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x3000000, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:44 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[0x0]) 12:25:44 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cpuset\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='sysfs\x00', 0x0, 0x0) 12:25:44 executing program 0: sendmsg$AUDIT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3e8, 0x10, 0xb2d, 0x25dfdbff, "", ["", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000}, 0x2000c000) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, 0x0, 0x806, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth0_to_bridge\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x4040000}, 0x4004000) r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x5c, r0, 0x400, 0x70bd27, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast2}, @NLBL_UNLABEL_A_SECCTX={0x1f, 0x7, 'system_u:object_r:man_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6tnl0\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4880}, 0x20000000) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x54, r0, 0x400, 0x70bd29, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @empty}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:auditctl_exec_t:s0\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x24000005) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000500)={0xa8, r0, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @empty}, @NLBL_UNLABEL_A_SECCTX={0x1f, 0x7, 'system_u:object_r:usr_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_SECCTX={0x30, 0x7, 'system_u:object_r:system_dbusd_var_lib_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'bond_slave_1\x00'}]}, 0xa8}}, 0x20040000) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)={0x68, 0x0, 0x20, 0x70bd28, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private1}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x800}, 0x40881) sendmsg$IPCTNL_MSG_CT_GET(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000008c0)={&(0x7f00000007c0)={0xe4, 0x1, 0x1, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@CTA_SEQ_ADJ_ORIG={0x4}, @CTA_LABELS={0x24, 0x16, 0x1, 0x0, [0x0, 0x5, 0x9, 0x8, 0x0, 0x5, 0x10000, 0x102000]}, @CTA_NAT_DST={0x34, 0xd, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @mcast1}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, @CTA_TUPLE_MASTER={0x74, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private0}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x2000c001}, 0x8005) sendmsg$NLBL_MGMT_C_LISTALL(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000009c0)={&(0x7f0000000980)={0x3c, 0x0, 0x0, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @rand_addr=0x64010102}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x2}, @NLBL_MGMT_A_DOMAIN={0x6, 0x1, '\xd4\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000091}, 0x4000) syz_genetlink_get_family_id$nl802154(&(0x7f0000000a40), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000ac0), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICADD(r1, &(0x7f0000000c00)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b00)={0xa8, r2, 0x8, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6_vti0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x2a, 0x7, 'system_u:object_r:logrotate_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @empty}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @loopback}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x3f}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, 0xa8}, 0x1, 0x0, 0x0, 0x10}, 0x20044085) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r1, &(0x7f0000000d00)={&(0x7f0000000c40)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000cc0)={&(0x7f0000000c80)={0x3c, r0, 0x800, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_SECCTX={0x1f, 0x7, 'system_u:object_r:usr_t:s0\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x808}, 0x8000) sendmsg$NLBL_UNLABEL_C_LIST(r1, &(0x7f0000000e80)={&(0x7f0000000d40)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000e40)={&(0x7f0000000d80)={0x88, r2, 0x300, 0x70bd2c, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @loopback}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private1}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @rand_addr=0x64010100}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @empty}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast2}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:pam_console_exec_t:s0\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0xccaff43461553ac6) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000f00), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_PMK(0xffffffffffffffff, &(0x7f0000001000)={&(0x7f0000000ec0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f40)={0x5c, r3, 0x1, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004800}, 0x20048000) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000001100)={&(0x7f0000001040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000010c0)={&(0x7f0000001080)={0x14, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000051}, 0x8850) sendmsg$IPCTNL_MSG_CT_GET(0xffffffffffffffff, &(0x7f0000002600)={&(0x7f0000002440)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000025c0)={&(0x7f0000002480)={0x128, 0x1, 0x1, 0x101, 0x0, 0x0, {0x5, 0x0, 0x7}, [@CTA_TUPLE_REPLY={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private=0xa010102}, {0x8, 0x2, @rand_addr=0x64010102}}}]}, @CTA_SEQ_ADJ_ORIG={0x34, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x6}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x4}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0xc91b}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x400}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x8001}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x7}]}, @CTA_NAT_SRC={0x48, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @empty}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @private2={0xfc, 0x2, '\x00', 0x1}}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @broadcast}, @CTA_NAT_PROTO={0xc, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e23}]}]}, @CTA_PROTOINFO={0x1c, 0x4, 0x0, 0x1, @CTA_PROTOINFO_DCCP={0x18, 0x2, 0x0, 0x1, [@CTA_PROTOINFO_DCCP_ROLE={0x5, 0x2, 0xfe}, @CTA_PROTOINFO_DCCP_HANDSHAKE_SEQ={0xc, 0x3, 0x1, 0x0, 0x55}]}}, @CTA_NAT_DST={0x58, 0xd, 0x0, 0x1, [@CTA_NAT_PROTO={0x54, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e24}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e24}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e20}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e20}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e23}]}]}, @CTA_HELP={0xc, 0x5, 0x0, 0x1, {0x8, 0x1, 'RAS\x00'}}]}, 0x128}, 0x1, 0x0, 0x0, 0x20000849}, 0x800) 12:25:44 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x384) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCMBIS(r1, 0x5413, &(0x7f0000000000)) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = dup(r2) ftruncate(r2, 0x3) dup3(r3, r0, 0x0) 12:25:44 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) chdir(&(0x7f00000000c0)='./file0\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) dup3(r2, r0, 0x0) [ 716.150652][ T2229] new mount options do not match the existing superblock, will be ignored [ 716.164828][ T2229] new mount options do not match the existing superblock, will be ignored [ 716.286964][ T2208] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 716.294993][ T2208] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 716.307041][ T2208] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 716.315040][ T2208] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 [ 716.326136][ T2208] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 716.334173][ T2208] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000001b0a5c04 [ 716.390520][ T2208] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 716.398550][ T2208] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 716.419847][ T2208] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 716.427935][ T2208] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:25:44 executing program 5: r0 = getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)={0x0, r0}) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x2, &(0x7f00000005c0)={0x0}) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x7) sched_setattr(0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0xfe, 0x2, 0x6, 0x94, 0x0, 0xc7c, 0x400, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x8, 0x100, 0x2, 0x9, 0x10001, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xd}, 0x1c) 12:25:44 executing program 2: sendmsg$SMC_PNETID_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x68, 0x0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'team0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x68}, 0x1, 0x0, 0x0, 0x4008081}, 0x48000) r0 = syz_open_dev$vcsu(&(0x7f0000000140), 0x2, 0x210000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_MPATH(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="010000000000000000001600000008000500", @ANYRESOCT], 0x1c}}, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x5c, r2, 0x0, 0x70bd2c, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4, 0x2b}}}}, [@NL80211_ATTR_TSID={0x5, 0xd2, 0xe}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TSID={0x5, 0xd2, 0xf}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000000}, 0x44800) 12:25:44 executing program 0: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) set_mempolicy(0x3, &(0x7f0000000080)=0x637b73ca, 0x680d) set_mempolicy(0x2, &(0x7f0000000300)=0x6, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) fchmod(r2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffff9c, 0xc0406619, &(0x7f0000000340)={@id={0x2, 0x0, @c}}) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f00000000c0)) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) r3 = syz_open_dev$vcsu(&(0x7f0000000380), 0x71a, 0x40a01) ioctl$RTC_VL_READ(r3, 0x80047013, &(0x7f00000003c0)) 12:25:44 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x4000000, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:44 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000180)="6f5c26bdb64928b0433edb80d05ef24dd8ce249170519cc3eec0901dfecfcc710dc07639fccb74e44e33799ee3b3febd6b35a49c84a4ee0d867c8c1a6dcbd4fbd614092cf5ff7daa6412e94d8749cf", 0x4f, 0x5e, 0x0, 0x2, r1}]) 12:25:44 executing program 1: r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000240)=""/125) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=0x6e, 0x400) fcntl$dupfd(r2, 0x406, r1) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = dup(r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fremovexattr(r5, &(0x7f00000000c0)=@known='user.syz\x00') dup3(r1, r3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r6, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, 0x0, r8) r9 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003780)={&(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003500)=[{&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="d2217cfb4fa72d364758b25817c2a8d5c262c0d2fae7187c203611467a944a05ea8978bf7bd6fddab370eed13980de4d6de14acbd6f5da6a89a8ffd67d57dc8b97c584068d9573ae4e37b8ac5651e4f355958e1e09f030003ccbef70bc3379e16c4bd85fc7e4add00354889c9ae04ffdf4d9f91c9d51dfafd7ea3b87a7204b0f0874608b5b5f32aff4f045052af08a554b719b04182150234ae16478eba770303ea2f69dc786a716f0ee85352d5c1e10173641b034e8bacb25bfcf", 0xbb}, {&(0x7f0000001500)="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", 0x1000}, {&(0x7f0000002500)="dd9057b67ff2fd969f5cd0c4e3fc86a0c261e1a6fec1839ff170b98ce56a8ec24da08d729fe9ace49dec4df881bcf48ce3b7ea6efff6538f3aa48bf69c65fbfecb858aa58f2927314f3ed599ed28512947e9ce9ea57334ebaf5021f75c8c3bd690e82ff8f7e79eb2a8a30256af5d97ffd0b5b23f64d74bfca00ee3de341d32d56ed5355fa4580fa4cb0379e1f962c8b7574ccd2a794e696dafb5401a9739cff12a94bac38533a0773ca977509a4e30b0d869996858d08713ee0cdafe42e540d57fa6fa4e30a1f91896122cdf04cbce379b13b85a1a963b7e03b0e7c933159f934db2727b2d09a8506cc5417e630a0c183729978fa59e8ec9f493ed5222b93d58a5566c93b065d0f2ccb81bd736ba9dd73eba26b36e83a30280226941cf39e05d33d369bd2ff0ece226fcdf196c4c50b00e26b418789547acb63a6c7fd865b0fba233173402512384fd4dbdf7c96629403ae13a869c99a156a5eb1ff2ee1d07715bcc1e8334f40e3457d179d1d517a24247a34e01d2e69193d1ca411def1d25e46e6d6c8a4819c37fd7d70ff4b5414c1a78203f8eb8d09de875ba402c00c838913984ae5ca21de14760b78f88796ad0e0bd362123286c367aec11f25b23cd1eccc3da31d4ab0f41605f878594796fb2cef19ebbe1953c0b24d13855d5b7c7f556a27b5b92313064284d5dec0affb5042300f4e934cc504c25bbbc03e0014f230de42338cc83d7571e7ec41c954715d9373e30546d526d1f26d29c80b9e523f427a070c417d37875144306bb853f197cd52ce123a378552c1571887a96ccb07df803847cab6e432327ec371efb13a6c071c26aea342660d8503e08b039aa3e2d07d09298ba78993040b275af02ee75bec9d23c731c44b794ffa5105d5e3c63d9efe3d416eeea7eca2f801fc2c2dae4a9089b58db6c809ba8fe2363ceac59b13f189f03c5cfb8df01ec264a542d5551f1807b072253cfd709909781afec15b54160c9ed2e180bc61ede1eee67a2b9bbcdef82761a96acf70be26f4265b9b1ab4521a327fd5f3aa5e1d7274a194f387f7e4ca26fa5d4e09a9e14de8d788444cfa72fb7bab86f686cc788cf330d9e2f3200fb777e8b919c0bea462a58c35f7a88eb59dd387f850f4c86b538fe7c8584b35a8f3a58cadead0ff678c52ad0ee9bdfacca879f5c51ac21a698dbb307dea1d8c9b4219a142149fc0d18bbd98940b450ff65c82ffd9a9af652a4085ae0e7f447156bc1f646063d1c9cb1621cb77f3ccfd2f19d3cf9a20c319abafc852acaab8c14e81597ed8e83312a8069ec9f9b288adf4c3bb38dddbda320a54be15a981283f17afada8a61685936a7d8453d424a5cc24d4c998a5648de0b606210528403b7f8880417ee00ff9d5af0a8600c57bfdf9f3b5cee0063af6f76e3b97e371bfafec5bd41e3b5b52fd78d5691677719177111b8d151cc48f1c1e1fecb6d16f2ee15af6565d9dee0db9ee7b39ac28e306c4dffc4d6a85237a1de6c4acdb0ed3ccf2d57ddf7981a15c21b7057ee8dd4334c7a09fd0b96eafb0f123844d6b135d0a49f03adbe70d429a1f8476155de94082ec4e5add75a6698f8a11b8bddd76ed1568e873d961d9d5008b91c25418913c50ae86eb6db860d1a7fb231dfb81ea1f798b8a4ffd3c1df72f838460c43771bf67b2885186c92435bd2a75917b887e7b242e9fca2b626e8b33e95f35eaefc1b04d7408ac10c929402fb999ae91c87482cb80926958ac0b6cf0edcdeb070c06f8ee7dda6db5d1a05d87fc9ccda0f6b23e73b69e73b94385a81fe576d9a46882b90cc3a1765c107b26e9531c4b3a1e595cc6b09f18dc0f3a49b1ffb52797f7a592ba73076785294f2e9a6f97c06a2026547ec393d813bf13efe2facc0dc8d33699ee8144ffb04f5f755baa3f298a207dc0db2cbc7ac6cb06aca96ad2616d24e357a9f4bcfbb6876df3c9668811794627dc33b2ec05d2c63eb03a3e3e845e3a037e95941e7647616a2ad9c8f6f5424bd0e97796478a90ea664bb29752bf60a880c3cd645822c9f30128c949ed121bf4a55bdce44dca7b280b38d58dfc014f042c89c02414ec4d1b4c182a9913afcb88fe30f4cedab4cb85399d21f984bfd05d40684fc8bfbc3d18362c201a897da359b8b1a1bfcc5bc724aa9890aaa4a35c7ae064b711bb523ee211518251efdb97ba0203e14bdb5113f4b681bc7cbd89cf9df27e0282e563e274b4aed792b5bb48ad2fe5ce2a0b87a904195f18600ea2466ae5924268b749a703c54ee6da6907a5ac44e649daed290debaab272d47fa83001921f47ec48398fd39f95c8c77acf184e840248f4fb134944756bbda7d1c1cd92393e9113af397067e9b8ce2102eb6f5d0dc0617b11edffd912b65c80de75de2f9f15a128361833ff9a274ce62ba02a83f58b1dcd9f3409d735ab485dc00270053528381b4f2b4011918ac2e736a9dec5f131e2a8a7ee5e16f05ca3bc6b67c85cc55edf8baa386d2c66d18855178031ba6cb9f3da08acf84b1f65bfb48b4da5251920642a014324eb6a67b3064c102bdae6048356dbd6c4ad7d454ae197dacb596a5f87e9e7fc2a3d44e64b562b4f524410be0e94fc4e0fedd1a58c957dccb75f960e63a897b1594951a14bb52dbf9908995958e0ec708d2cbbd5345db40d60386551b9fb413939791284058f2fb9b6895e68cfd6f51448ca2d41957def12b6bdd13e85405c804c88730fdb55784be1e3e6b7f234ebb2e88457dca39a3ecbbea5f6fc51a66ac22d5f4e6e508bba58965be07a326da2fce34aac43821f4798c50deb9f7fdab945cb77db0f01d06f395897e168db242121e17ed1dbc9017b94e3d23496d6012eff5fb841ca259ab1bdb3a9464ce517164b22c3782978db148828b28e3a1e4bfcd2a00973d8bfacd697424a80e614b1f48c6b20243fe5bf179b244854a638a83328f210c597ee5e915363b98a6f1e529eb38153ca76dfc005fbac92ac6076be4129564609f1b016132116700147ce2ff45ee5f3e1f25be0688a2a796d507b04432b62ae8e4e2724394bb7724c469d954c553de00adf00c308ff47a90750fbb54ae788fd68f4e44b2937bfd6a3af6880c7f58455d79b7fe9f7bea6d7863910b97e82c6bdd33ea70ca1e477f38c40d73edf78bdc801b142d023ea5a386b38668aa722d072d0650afcde6fd7591024947aee029a30d388a6e3922cdb81c6827c8a6d9189cb37a00cdbecdae1f1a2a611e7ef2ec8626e9e5af4008fdd52bee7652b3f4a4abceab50f948b3f0c2e4d9c07bd8006a9d5a4bc367faf46ac8772b90153dd349e0cbaf7272c68e661158a475ee096813fe27d695459b669b0290859fac89b0bdfe82552cbf74047b6195c903a8f6b397475bbc9b64b63b8563f907561df63194a406ba508a7f09455108df0a746eb17d8dff3c93fbf0ef49521c1c4208591769272c646252c126b33686705e5e7f34ac55a92e58a6207e08755e50757f042214ee60723409d9980c74020df2a0d2a0baf7293079c6b0a021cdd45463c286808f1c04c07406289ea73a8913b0f6b9eefecfdc465d2ea1f952db897a564e0fb2a9b0d30beee1f2f7410c249b8b7683d5625d197db4a4b979b70e8fdf44c7cba1c7e16d0bf2a055ca6dbcdcce15508181294e6f07cd4472d504ce7cdcd76b1034b7e84e4b68ca5b907ee9de05ded2285beb37fe873f892b14cc895bc60488ddfe64981bc930406077a02f675fd710103bddf4801ae3de07f78fa44437aec37620b32f85e6b668cd2a602d725a527665bde496e804154103324ecb9c6c698ea6fdd289e67e217c11262be2f80e026bf3912ca6ce9a6163b17befddfd8edc427115990df5c52fb9d932e50989db3274c5f282530d86303b927c40a24909be36d388caa3db0ba2bc5a6c1846913e2db888d95f8fc9f4cda5951d1938b098ce05a4317dd45e2a8b10c21cf7bc167f0263ce67f807298a098d5ddd64b970b6a7235eaf403f9104ed7ec201f9f0d29c5232bf567e47fd8139f4defa6ef46f6336bfc3ae895654bfb69a2a704a96d1c523854b3ad7c521d8b9a2ed29499a5206cd85ac40f89eb2fe54fe57da34e6b3bce4837aca858a81007971485e4ccb1eddb18a04b4e6ac9fd0132b92f7ba747e04b286c3e0be0d7b484eb05d38f3d85903708f49af9daf455a77dbd06943a770125a72f7bafcf95f7bc3bde2ac29bc6797ba8b1cb18faffbfb5ad5672ddc84a70036d2f6095cf5c99029e6f55e95df11e0f829a65997880d5e10b045d8cd4982547e2ce75015c9df6e0792aca4be3462d44686cff1018cf42c478ecb48549fa90ef74e3a50872703b7d1ab8ecb91560c8bff0785e35659795e94e326695167c7625679c419a769700aca9e1fe4cece45365fd9b24e738208718862928635f8072059f0aec27e659db2ee58947d4bd41028143238f5eaaad00fbaac9a2e356d36de7d515a0e9e121b66a20e780fe8c3c6f884af2541abf39673a0ce3bb61b299a332e330c2d0355b36c15860097c637505570c3ba7bc90c59e412aa41db22d2dd37d598eb35e79b3785e4a3f09df39f6d759a37715b5217c38fbb243483db901b3fa8cbc6f9a50fc9deda61cdf7d121bc56c4acf2a938e1db7ff8f711568b083a63565ee68bf07f8d229f13e293a469b5ebe2252abadafc4700eb18b9d786b74364403a18fc98d026558ff90abb26522d85516863d35d7ced3371aadd74d41b313f00c4f9083663dfaa9a275f670c9b7186992a028fbc827513c7250a372a600c72efe7b311de3c77d5161d7fabbee591d625fd222b97dd9029c2b0748c396254138be39a30fc1435da9d1889ffe8a623dd01db019a4d2f1609e5640f71ffbb60182a4306a389a974cf687fc8aaaa8b8cd0f3f2e2968457156a0740f74b2e98fd74dabcfd9241eae5128600d48a7574d8aabc81d9e3d3999a8c843b7d2484a65b52f81401f6e6d4173c000483814ef96ecdcaac80aca545e0dd096c59886b4f266edc888db1b7b32a2a305530042ee40baaf3a00d833b36da04fe707c263a147b0f5edadf26b43a780bbdcec5e393ee4ffdef5ceba7ab94cb812bf726e640ce5364574871bfc8260c161967097353e5fb2a68a71e919043c2ef5bdfff2db08eefefb3817b18589bf17ca573c9c96c8d3453f9bfd9b49ed269be64e266d44b67f48824604ea9539a9562d4507b06e246ed531a11c6f08a7573cabdc382db66af097a57c6f5a804bd39e1a80549de4044f2bff1dd927926911afc31fb05fda2b2ace5c1a1b460fc220903c29cbd431f3ec011a612b1e83c11faa0bf202e0af7ac5255fc179077f5ef003c9bfc4a66e84a9fdf011e56ade97c47b70a3cbb9eabe82d9d01d6da830258b2f5640a0320bfbca49631970357bd10973cd5713153d60b1ce143ded5f41f73bbbea7ee0d70c5a7891647cf36323d77c9342ff251a174af2df8c9b65591b77572a6e2f8eef808fc2417114af1aaa1a4a6050e2abd947c8d4951884e320e111d6661023d72a396667ad215dd3b5514a09cdd955f4a4f81aff1758d12bb7184c528f8b86e9d8d2679ec45f08733ab2640cd060cb2c450211386ee181419fd54691f0ef11c2b8e76d836a2a45955b12b79d10107b23c733f4cb7e1a7a4ef71b69e67311ab1a7c4e33388d1e3e3cd4b3d8d4bcbb43728f7a573524bf54143adfd72ec97b8491f17b01b8a5431fdb1dda70cf9e5a1ab6e4a214962ca2308c1df565e4caf37d3e6662937b9208fe36d5fda18c2ba365b5531b8bc317f532f294541a3231e3da9fca6c7afb6d9631dc1a98d", 0x1000}, {&(0x7f0000000380)="f92513921621f9822b48c51c0655b3ca39b2749f9ae37cf7a44963fad798537c123c805a472e6a019f9ffba95ecbcfd65b3f2feb7987383cf196d26e44eb2264", 0x40}], 0x5, &(0x7f0000003580)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="00001c0000edffffff0001000000020000000000bad90c9633dca9890144", @ANYRES32=0x0, @ANYRES32=r6, @ANYRES32=r8, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r4, @ANYRES32=r1, @ANYRES32=r5, @ANYRES32=r9], 0x60, 0x4040481}, 0x4000010) [ 716.439410][ T2208] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 716.447425][ T2208] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000001b0a5c04 12:25:44 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x5000000, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d3f4655fd3f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000079d64a30b19941939d5c6a24092e8c9a010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="0000000000070000000000000000000000000000000000000000003bd17d062f8334485719e98ceb00200020000100000000007cdd", 0x35, 0x540}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {0x0, 0x0, 0x1000}, {&(0x7f0000011600)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040040", 0x1d, 0x2400}, {0x0}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0ee5bc777a2022dd3dd0af8140764d4b00"]) 12:25:44 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000340)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) dup3(r2, r0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 12:25:44 executing program 0: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) set_mempolicy(0x3, &(0x7f0000000080)=0x637b73ca, 0x680d) set_mempolicy(0x2, &(0x7f0000000300)=0x6, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) fchmod(r2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffff9c, 0xc0406619, &(0x7f0000000340)={@id={0x2, 0x0, @c}}) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f00000000c0)) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) r3 = syz_open_dev$vcsu(&(0x7f0000000380), 0x71a, 0x40a01) ioctl$RTC_VL_READ(r3, 0x80047013, &(0x7f00000003c0)) 12:25:45 executing program 0: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) set_mempolicy(0x3, &(0x7f0000000080)=0x637b73ca, 0x680d) set_mempolicy(0x2, &(0x7f0000000300)=0x6, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) fchmod(r2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffff9c, 0xc0406619, &(0x7f0000000340)={@id={0x2, 0x0, @c}}) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f00000000c0)) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) r3 = syz_open_dev$vcsu(&(0x7f0000000380), 0x71a, 0x40a01) ioctl$RTC_VL_READ(r3, 0x80047013, &(0x7f00000003c0)) 12:25:45 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000001180)=[{0x0, 0x0, 0x200}, {&(0x7f0000000180)="6d800258d6ef20f95a5c9596d4974e315caa0f0483fd", 0x16}], 0x0, &(0x7f00000011c0)) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') [ 716.815157][ T2250] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 716.823185][ T2250] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 716.834642][ T2250] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 716.842686][ T2250] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:25:45 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x7000000, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:45 executing program 5: r0 = getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)={0x0, r0}) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x2, &(0x7f00000005c0)={0x0}) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x7) sched_setattr(0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0xfe, 0x2, 0x6, 0x94, 0x0, 0xc7c, 0x400, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x8, 0x100, 0x2, 0x9, 0x10001, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) 12:25:45 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080), 0x100000000, 0x201) ppoll(&(0x7f0000000140)=[{r0}], 0x1, 0x0, 0x0, 0x0) write$P9_RMKNOD(r0, &(0x7f0000000000)={0x14}, 0x14) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r1, 0x0, 0xee00) fcntl$setsig(r1, 0xa, 0x20) writev(r1, &(0x7f0000000040)=[{&(0x7f0000001240)="b6decda942c3ea83184f8969ea8fd10cbe3aded16f0b2d04e8dda30ea170c49d3011073ae0ba0e2aabcd402966982300eabd751738dee790fd21d73bf8f0e016642c9ab5721bb067a91408d87597503b02fc3bf3c77ee6a45a32a9c0108fb781834fec12b37fd7236bec46e7071999f4072d29c947aba85cbcd8bc205cd136c2d1cf0daa98515c15ee11042d8677ae780364195f549af3e8588125d36d17462aa61dfa00437effde93a68d05a091f72ab27948967f9c9750c61b95ec02b2a46ab6cf0d9abe3b5a9f03446967050012bc24cfebe57372f57e788c1cffeccab2a52b9e8208b00b2a65d5a2e7e09a179be428e5b026d993717874363b7b79c022476c2c3819800cdf719a4c611270aa75babf7dca30a29bc793561a3c20e7ec2ec9f9ff71b5ace6c1ee9ff4740f86f8c3d3a1d900a6467bd00ab7f168b964c7780976722726bb4495b2b3d77bddff81a2b9e3970a9768ffd1f2bff9d65ae2abb8daa57df42b36d7c3991b447b93ae6880dd0d37b71e884c5a403022160c73667d1a69b63ad7a23b262ee15995e13df7d6c77762d2d554a45a30c77355c2d659e343ee2cdfa7a47341a88a44acfad24daa8e0cb270f8ec7cefcbda93a54aa222134f144583b2f63056dce2689b8053fb2a3059fb4d274b6dd0ea64cae00ca72a9bcfc34a05dede719dfb84e60006664b4852afe24c2d396e94071feb71d07002f0d74420fc2902505cda738b52b1f6955a19af022192cf6734719532a520e63133dcf88197f28fdd85816c63b070fd9076300e01ed78b1dbded2a11543775b6c2dd830899442a8d5887835d25d66eba2084b8af6e1830cc1db277800291b0f719e3a70c165b3da2cea550b0f824045717dc598e05cc59b4204c782f9e789351f2d1e0d1e3ff1fe435a85ecfd623f730c897e04262b520f8122b62b0330d1da2ed8ed2ca4fc88486f55c1dadc7b2d386daa1e46eb68d36e235ae503bcee6d0b61052b115c9f82ac6b531337c7d98c51bbbc0757426f4cf9a1d8b299bb25bbdc2431ec022808f8bf9dc9e6d976ce0d931ed813d22864643378648554060bd3747d9272f8ccdc4d71b86d729bc579767102f91a8abe6892a99ee8ada18f203fb4a939c4cf7e0fbb500bc1d475d99c0d25e644ef01e3670b64845cfd0e89629c3ab036a2ce910a9e84db40b37589f6dd8ff75156bde1b06dd61a4efdae704dd6260dea7578c30f6190eb327673da139ac5852c5eb73af2074fa2bf406f472f6a2d733b76c50a9608ab5d31a4bbf6096d82f8f3cef70ec4856dce4d127655b6c607eb1500f12c4ce796a433d68ea7e030527ce8bc85363c6588196214bbb1365ed9f0474f9c3b169faa31bc76297f509cd58b3e1263c87a28ce07ac83354dd44df3cfd525bd9219118720d0ba0b2f9c63b3b3eca94ed4fe5c9c1acd91592e38a4677662c640b1cf08d87421eeca0001dd211e0b9f2568c5c9c961834806400f1b9984510e600d705fc3ff7bca153c0f743aded993c01da65b2821f6259e55e54337c1b5073a06c2457ce13c4effc0e2d644160180e1e30e8fc8e88302e5841abf440c18e25f9fe65a66df7fcf9676ba0ab2be32f5c1880122446b81269a779955dfc8c45dc7a818faf9ccf96124df4e2c82e5d4242ca320b82cfaa3a34978b38247e38a2fd3baff6e64dab0d023588c506d5bf54683e5d3bba1690f37a0f6d2af58a872cbacd7b8c3f0a2f1b6587eeaea1791726e6d233ef17bcf56b6e030f800b1e2aff93e70110986bb02a94c31a2ba786b298c9980988d47597d4dda4ce9e42893aad7fcbd3b0077928ca1184e4b5d46ccf1dba86ed55c70121194a9b1a8853e2c335a25abb86d0c3f26491dfbc4ea71351d74ba10dfcd61d6558ba950cf5969009bb115853bf8eb996ccadbbbc81566f8f207cf9c6d6279620fd4872f9e6af5bde087d4e7efe203467af6fab1616830fc7a8b7e25185dcb69d99a5954de4db351a6df9750a941d6eda545f6188755a6eb8998d2a0442620e010e86208475a910741d133b606bdf3dc304572db82510722243da55cb0dcfd5c2c068e0509f92688a9f2f5f433aae1af5484af6405344044dae83e86ea538975ce4f6e9370f239b951b3deb553a81eef0bcc7beac601ac0f1353b535797f8b7eafd1a15af6272847b83c03ef375e95326f7d3e0698d07acdc78165a39e6b52f37a48264f8ab0e6602f069759a4333561596130e4c8482f70e8a984a4fc5543987e39ace676ecb978e2a1aa08e42cc030ac7a483b6ae1e18ad155bc44229eac9f851619b0ba25b280c68460fed511c9efc5d61539ffa7436adfcf51d5e9cc0322511a1b63772a319180c391bf3533f74fbae7fb66c43e10b2cc71f5d35f1e7cb4c7380613bfe37ec7e1af372786885de196172268ca8cd6938723b54245cea576df15ca8d9ac65e1f0583dd8cb717bb7d2bc27c480fbbb8597e6a7bf616771663d5eefc48b9e5fd04a1a2905781e41f82d6f22fbdbff2d70ddd7d57fe6e80a2c29354452e6d0ee4373ee60db4a3de593b4fd2292eab64831d8e3c21d6aad9c8a469107311b6f179ed9873581e678e0d43aad3c71039a14158cf9d2ad54a20038b173a9129e57a2adf69271a95ae82114642ca6a4ea1ef0900000000000000863d7d86c6321f93748c61ce13f844993038409e64650e00f2a45c6ef3355a4624db846e87bdbf3dd376c4047b0a43f60b2a6b6f15e04de8604f063ad3708c960a4cdb6338cbbf2e3fac64e2f731cc4bb7e87fa2f4cf2926dc71cfb14ca48affea6db61e47c1d3c049b61a5c0ba4244914206dd9c72bf5cac3d9ab84a9f5ea8280951784165b95c30d5e3915bb2538ed64bba9cc07849e60d0879d7343d57da1c4306a39fb761751f919df11335dbc615dd3070530c78074310975e443be90a03a8542ddd73228d2ec2c10833054818c881c2918747945f63553d5d7fa4371f004dc9318663702725b920cad527e7e69100e589324582a92893d321e5c93143a01c018e4256076c936101e086b59a12b5df6babc8d5f0299603b0dc772b264978dab8166edef15f46121aaf4c898688fa77d3cb5535006eeadbc2049a9775f868e8a6418568ccc066142f0b043b79d4cc7b6c7249ea2aca1b81001212619d078eb3dff9953aef5dba6a3f52faf21b654efaf43cb584669172b29856c31f471286b663a883d3e56265c439d3c43de28e1d23b7c13eada99a676dad02fe91b43b4a22bf3afe0c6671c28b237d49bc95ddb835b478da2c602ede4813c9453792b61d83ce8d192ca8edf94378d5270fad64c1e6548be26e7eee02c6b978c7a47cb97ef5d0a26612e5f43fbd7f6662f7b279172dbcfc3d5262ada80391063acc0fe212ba3639dc192660fc9c82440d2ff726e7651934112d0c4f9e7c54c40df153269d0c7062ecd44517b87f9af66e5d94072db377e48772791574c30bed5ca12b86c1abfb8cede38ca30ce16e33ade57fa71cdd054ce67f77b24e967be12f3dae2248a443d8e56be36212e19de151a6ab300b12bdb64fe61afe7060012e9650a67da2f731ecb8917833d8eef2d017674ea7d52d7d550698b27b676627e70adcf75332dad9fb5deaa09d852dabcc761b667fa9d22cee87e09ec438df763837925c9474839798f4f75864ca3fedd473977c340824516b0fd879552b83fbb36475a7d56e136ea5e19bbabfc3f668153b1b2353052982911ab008e30ca984a393cad1cecc1dd14ca39ec7723f3604a44c068225bf433a89365420697183fac67fe63a0acf4b82e6b743aa3b126f7487d9561a1ba86fae07ba8133b87cf5cd0a9a957c9454e6e50e580799aecea59de1153487cc87a7353dd2608cb536e013540cef391fc31e5b4792fdec0b2340870296c9505401a4401cbee5858965d3ce150c77e0240ac3292c953145510092af7da81ce990f576c28711b8f0631f9ae38d678d6fb7907b6ef2cdc369189f86613c2284b1c3ceaf5d13e578b4cc1e954fce2e1312e52389cbb219673e593e7832713a52f79b8f78c04d1d5b98db175296b0f3caa9f2fa6bdce53ee53aef195567cfe15703b50925e49d439b36121d60f956b6ef566d75c464709d8121cb7e2016de50399889f47096bb6903cda5ca530f49dbeeccafa98dd053a5df4219bcea5911c62d4afbe123c765452631bcf1dbe84c3c560f89018902042a90756365ec6c30024d1e93c201d31260caa531a26fbbc8bd2516aa76cdd10156f8d18941b934108404061074dc427c74af4d7a77781484f3f9effd6082173ce103fd4df900da2c72a08f1dd782b7b09f0e46ca240c700c1ec3a3ab4cf103b06a9e5c0d448dde9172d7347c9495b855623585a7bf0b779079c0b6fa681288328fc8dac7adbc769164d9431df7e1301ba82465b6597f96c8d1e0c09a92c15578de859f61ba1a32ae1842727f2067c0d37de160a245414c62ace8aa369fd3213277f428bb4fb92d7f621d5f004fa2a2fc613c556aaae4685e60bcde1d1d9c198ba2c17897e5a83782e15822c4d3faf8d02c1f246dadb8adcd977df2b90f4fd9b9010fd5f5a359f113575fa914b2942a2cb42383721cfa8ffffad41beaa1934e86b1384ce477b70407df4f4ad5edb14707657762530d4c7fb406be1ed55c07c2f9c01eda6fe9fc0ffddb1e05885d0e89c1be24bc6a43b60b64c1ef34d404cc910fb838bd157fb1ed9530a6903b52722ed620f74392ed57e1eb80abf6f79affed5b534e40b8f8360e1e59ca24c8aeb82f3728154240ab6bc18319550d5dd1211dd54ced85764908ed3ee5bb71c61165586731dee8bf0cada79a3b87fa02ea9f6a8ea6d709f038a67d6ef76eac78e5ecf716ab2cb047408f775b828502828a0b54cc53af9583d2dd65a2a158586d95ddd926e73bac8fea8c692b4d8b5b1d30a0d037c566fe4dc315889f149b230beee3ed1d443721f366acb0a7f2adcd2ee91704b7ade5fef1a223d8e039935e106b484eb78a7ede073776f0efe69beee463ce04ece6a7911f4d665e45d151b9f009136d082001dbdc3bc2383c43ea9717116f02b46233882246aff61db1e082f6d5e7eef1da5d7a6f752b8a9aca574106f9238375cef280955c117865ef96bc7bd3dd7c520a90c8b8211ccb020839b7854ab5e5104b15533b41759834239862d4e088d1bcd393b7a972c9050c028966ceb71515c3058ddc2d3ceb4f1a7170049ea8a2f4ccb43c7ec8fba046e72fae69048b6e2f76ef85f45df3c710ec34c5930a73ba16fcf0c955ef0369a6378371f2eb2eeb56b7bc86ad56aa2d3a816dc00a7b84f1844e192619438f0f783577ced1c2df102655117ce261bc841c22c551ae0cc18c0375f3f35099e60a72399d07a07bac74c3f1890306b3bf6ef9e2381960c2ef5cae310c1b054ed7eb23e5b3d41ac94fd2cc6e1805f77f362cd59f9bfd0f49ab3b8bc6e7e5b5951cd6aff0e1ddcb249a246ea02a1731e216893359da053d3ec8303af8ed31458dd1cbd57f23f01000000000000004f0b2b4310aa6101dc21483d487a334f78fa6f15cea6a23687c67a1719889e580a9276b605e45b292b4b940d5eb36ba5920c9851ec6dfc678779f8e960e481b04e576ff09ce90b1546707bcbaa5478c31d6afc9b54a3a313223742b818f63ea763f9ef7f0a88bf2f5380440775288869535aa0441b7660967d2f51aef802b15231641f9fc6e7f942447b7afd626c181c1b432e133ef9ea7d7d4381826586715898733775bad2391e565364985abbb3d2592f130189a477d83269163bf8463a80a68c854507a4880e42f6e3f2b1fd43", 0x1008}, {&(0x7f0000001180)="6d4d84d692be860bff339acd6e757c8e5b6e9844fee367cd8ebf91ef81e7969176929e5c8f9a0fccd2d21908e4082f43011a6d0ddfe753be09ef73e5cb13c74fc7d5e80a724d3739688e9e6cd19c656f76aac4aa65f525f806362e76ff02e52e60b18acf3a9adecc45bba393afe7ceafd84a66682e44b6cfaf808d8e3bd1683ca0bc6da78d9b1cda1cae06cef7d182551f97dc2a417040d0d3e6307922fb267fcfcab1569c3ff29663a681662c27285436c38e60df67ba80fbc446793ec1", 0xbe}], 0x2) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r1, 0xf501, 0x0) ioctl$FICLONE(r0, 0x40049409, r0) 12:25:45 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000180)="6f5c26bdb64928b0433edb80d05ef24dd8ce249170519cc3eec0901dfecfcc710dc07639fccb74e44e33799ee3b3febd6b35a49c84a4ee0d867c8c1a6dcbd4fbd614092cf5ff7daa6412e94d8749cf", 0x4f, 0x5e, 0x0, 0x2, r1}]) 12:25:45 executing program 0: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) set_mempolicy(0x3, &(0x7f0000000080)=0x637b73ca, 0x680d) set_mempolicy(0x2, &(0x7f0000000300)=0x6, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) fchmod(r2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffff9c, 0xc0406619, &(0x7f0000000340)={@id={0x2, 0x0, @c}}) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f00000000c0)) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) r3 = syz_open_dev$vcsu(&(0x7f0000000380), 0x71a, 0x40a01) ioctl$RTC_VL_READ(r3, 0x80047013, &(0x7f00000003c0)) 12:25:45 executing program 2: unshare(0x10000000) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8923, &(0x7f0000000140)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xadh\x00\x00\x00\x00\x00\x00\x7f\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf2\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9c\x15\x8b$VF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5dp5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\xc5\x85Io\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1d\x97\xaf97R\x06\xd52\xcb-\xd4T\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQLa\t\xab\x1e\x8b\xae\xb1\x8a?V\x16\xbb\x8eN\x1c\x17\x05\xfc\xbdhV\xf5\xfbMBY<\xbb\xda.\xe2\x104\xd6\x17\x01\xdd\xcbHD\x96\xba\x90h\xf2KWzy-\x1b\x00PS\x85\x1aCL\xb7A;}\"dyZ\xa9\xb6\xf2\xc5\xdf_\xbdN\xdb(/\xe6d\xac\x06\x14[Z{\xe8\xac\x865~\xc2\xfd.\x92\x11\\\x88rE\xb8\xa3c\x05,\xe3\x8f\x04\xedd\x80:?\x1cM!~\f\xaa\xfas\xdb\xa6@\x93w\xae]\xdfQ,\xc4g\x81\x9cQ-\xbf\x95oA\xa4<\xaaJ\x95\xbe\t\'_p\x01\xa0>~^\xcd\x9da\x03\x9f\xb5\x97\x82Z\xc0\xean\x00\x00\x00') [ 716.886949][ T2250] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 716.894993][ T2250] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 716.906105][ T2250] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 716.914240][ T2250] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:25:45 executing program 0: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) set_mempolicy(0x3, &(0x7f0000000080)=0x637b73ca, 0x680d) set_mempolicy(0x2, &(0x7f0000000300)=0x6, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) fchmod(r2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffff9c, 0xc0406619, &(0x7f0000000340)={@id={0x2, 0x0, @c}}) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f00000000c0)) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) syz_open_dev$vcsu(&(0x7f0000000380), 0x71a, 0x40a01) 12:25:45 executing program 2: r0 = gettid() ptrace$setopts(0x4200, r0, 0x8, 0x100000) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$setopts(0x4206, r0, 0x1, 0x2) semctl$SEM_STAT_ANY(0x0, 0x0, 0x14, &(0x7f0000000100)=""/253) 12:25:45 executing program 2: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x505, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000180)='\x00') r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x6, 0x1f, 0x3, 0x1, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbc, 0x0, 0x5, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x800a}, 0x0, 0x6, r1, 0xe) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000240)=[{&(0x7f0000000280)="8d", 0x1}], 0x1, 0x0) r5 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r5, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback, 0x2}, 0x1c) sendto$inet6(r5, 0x0, 0x0, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r6 = open(&(0x7f00000003c0)='./bus\x00', 0x113742, 0x181) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000200)=0x1fdb, 0x4) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f00000002c0)={0x1a, 0x1f, 0x40000015, 0x1, 0x1, 0x0, 0x0, 0x15a}) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) fcntl$dupfd(r2, 0x406, 0xffffffffffffffff) ftruncate(r6, 0x80006) sendfile(r6, r4, 0x0, 0x8000ffffffff) 12:25:45 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x8000000, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:45 executing program 0: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) set_mempolicy(0x3, &(0x7f0000000080)=0x637b73ca, 0x680d) set_mempolicy(0x2, &(0x7f0000000300)=0x6, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) fchmod(r2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffff9c, 0xc0406619, &(0x7f0000000340)={@id={0x2, 0x0, @c}}) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f00000000c0)) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:45 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000180)="6f5c26bdb64928b0433edb80d05ef24dd8ce249170519cc3eec0901dfecfcc710dc07639fccb74e44e33799ee3b3febd6b35a49c84a4ee0d867c8c1a6dcbd4fbd614092cf5ff7daa6412e94d8749cf", 0x4f, 0x5e, 0x0, 0x2, r1}]) [ 717.132413][ T2290] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 717.140456][ T2290] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 717.151922][ T2290] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 717.159950][ T2290] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:25:45 executing program 0: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) set_mempolicy(0x3, &(0x7f0000000080)=0x637b73ca, 0x680d) set_mempolicy(0x2, &(0x7f0000000300)=0x6, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) fchmod(r2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffff9c, 0xc0406619, &(0x7f0000000340)={@id={0x2, 0x0, @c}}) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:45 executing program 5: r0 = getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)={0x0, r0}) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x2, &(0x7f00000005c0)={0x0}) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x7) sched_setattr(0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0xfe, 0x2, 0x6, 0x94, 0x0, 0xc7c, 0x400, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x8, 0x100, 0x2, 0x9, 0x10001, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 717.227248][ T2290] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 717.235241][ T2290] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 717.246492][ T2290] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 717.254502][ T2290] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 [ 717.439704][ T2330] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 717.447780][ T2330] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 717.459379][ T2330] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 717.467426][ T2330] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 [ 717.507339][ T2330] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 717.515459][ T2330] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 717.527024][ T2330] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 717.535009][ T2330] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:25:46 executing program 1: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) set_mempolicy(0x3, &(0x7f0000000080)=0x637b73ca, 0x680d) set_mempolicy(0x2, &(0x7f0000000300)=0x6, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) fchmod(r2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffff9c, 0xc0406619, &(0x7f0000000340)={@id={0x2, 0x0, @c}}) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f00000000c0)) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) syz_open_dev$vcsu(&(0x7f0000000380), 0x71a, 0x40a01) 12:25:46 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x7ffff000, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:46 executing program 0: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) set_mempolicy(0x3, &(0x7f0000000080)=0x637b73ca, 0x680d) set_mempolicy(0x2, &(0x7f0000000300)=0x6, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) fchmod(r2, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:46 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x5e, 0x0, 0x2, r2}]) 12:25:46 executing program 5: r0 = getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)={0x0, r0}) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x2, &(0x7f00000005c0)={0x0}) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x7) sched_setattr(0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0xfe, 0x2, 0x6, 0x94, 0x0, 0xc7c, 0x400, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x8, 0x100, 0x2, 0x9, 0x10001, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:25:46 executing program 1: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) set_mempolicy(0x3, &(0x7f0000000080)=0x637b73ca, 0x680d) set_mempolicy(0x2, &(0x7f0000000300)=0x6, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) fchmod(r2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffff9c, 0xc0406619, &(0x7f0000000340)={@id={0x2, 0x0, @c}}) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f00000000c0)) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) syz_open_dev$vcsu(&(0x7f0000000380), 0x71a, 0x40a01) 12:25:46 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000040)=[0xffffffffffffffff], 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x15, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000008000000018000000c20500002b8200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37363838323433383400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000016d7fb4ca540446e9e3afc5ae1325600010040000c00000000000000d4f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000006e00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="02000000030000000400000005000f0003000400"/32, 0x20, 0x1000}, {&(0x7f0000010400)="ff07ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d5f4655fd5f4655fd5f4655f00"/8224, 0x2020, 0x2000}, {&(0x7f0000012500)="ed41000000100000d5f4655fd5f4655fd5f4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x4080}, {&(0x7f0000012600)="8081000000c04000d5f4655fd5f4655fd5f4655f000000000000010080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000100"/128, 0x80, 0x4300}, {&(0x7f0000012700)="c041000000400000d5f4655fd5f4655fd5f4655f00000000000002008000000000000800000000000af301000400000000000000000000000400000020000000", 0x40, 0x4500}, {&(0x7f0000012800)="ed41000000100000d5f4655fd5f4655fd5f4655f00000000000002008000000000000800030000000af30100040000000000000000000000010000005000000000000000000000000000000000000000000000000000000000000000000000000000000091d325d6000000000000000000000000000000000000000000000000ed8100001a040000d5f4655fd5f4655fd5f4655f00000000000001008000000000000800010000000af30100040000000000000000000000010000006000000000000000000000000000000000000000000000000000000000000000000000000000000057bbaa66000000000000000000000000000000000000000000000000ffa1000026000000d5f4655fd5f4655fd5f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3736383832343338342f66696c65302f66696c653000000000000000000000000000000000000000000000596e6dde000000000000000000000000000000000000000000000000ed8100000a000000d5f4655fd5f4655fd5f4655f00000000000001000001000000000800010000000af301000400000000000000000000000100000070000000000000000000000000000000000000000000000000000000000000000000000000000000683bd6f4800000000000000000000000000000000000000000000000ed81000028230000d5f4655fd5f4655fd5f4655f00000000000002008000000000000800010000000af30100040000000000000000000000030000009000000002000000010000009200000002000000018000009200000000000000000000000000000006a4ea6c000000000000000000000000000000000000000000000000ed81000064000000d5f4655fd5f4655fd5f4655f00000000000001008000000000000800010000000af3010004000000000000000000000001000000a0000000000000000000000000000000000000000000000000000000000000000000000000000000913591a200"/768, 0x300, 0x4580}, {&(0x7f0000012b00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c653300000011000000940f090166696c652e636f6c64000000", 0x80, 0x10000}, {&(0x7f0000012c00)="0b0000000c0001022e00000002000000f40f02022e2e00"/32, 0x20, 0x20000}, {&(0x7f0000012d00)="00000000001000"/32, 0x20, 0x21000}, {&(0x7f0000012e00)="00000000001000"/32, 0x20, 0x22000}, {&(0x7f0000012f00)="00000000001000"/32, 0x20, 0x23000}, {&(0x7f0000013000)="504d4d00504d4dffd5f4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7032390075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/128, 0x80, 0x40000}, {&(0x7f0000013100)="0c0000000c0001022e000000020000000c0002022e2e00000d0000001000050166696c65300000000e000000d80f050766696c653100"/64, 0x40, 0x50000}, {&(0x7f0000013200)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x60000}, {&(0x7f0000013700)='syzkallers\x00'/32, 0x20, 0x70000}, {&(0x7f0000013800)="000002ea0100000001000000270f240c000000000000000000000000000000000601f80f0000000006000000779b539778617474723100000601f00f00000000060000007498539778617474723200"/96, 0x60, 0x80000}, {&(0x7f0000013900)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xattr2\x00\x00xattr1\x00\x00', 0x20, 0x80fe0}, {&(0x7f0000013a00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0xa0000}], 0x0, &(0x7f0000013b00)) 12:25:46 executing program 1: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) set_mempolicy(0x3, &(0x7f0000000080)=0x637b73ca, 0x680d) set_mempolicy(0x2, &(0x7f0000000300)=0x6, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) fchmod(r2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffff9c, 0xc0406619, &(0x7f0000000340)={@id={0x2, 0x0, @c}}) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f00000000c0)) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) syz_open_dev$vcsu(&(0x7f0000000380), 0x71a, 0x40a01) 12:25:46 executing program 5: r0 = getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)={0x0, r0}) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x2, &(0x7f00000005c0)={0x0}) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x7) sched_setattr(0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0xfe, 0x2, 0x6, 0x94, 0x0, 0xc7c, 0x400, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x8, 0x100, 0x2, 0x9, 0x10001, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:25:46 executing program 0: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) set_mempolicy(0x3, &(0x7f0000000080)=0x637b73ca, 0x680d) set_mempolicy(0x2, &(0x7f0000000300)=0x6, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:46 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2, r2}]) 12:25:46 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0xeffdffff, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:46 executing program 5: r0 = getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)={0x0, r0}) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x2, &(0x7f00000005c0)={0x0}) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x7) sched_setattr(0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0xfe, 0x2, 0x6, 0x94, 0x0, 0xc7c, 0x400, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x8, 0x100, 0x2, 0x9, 0x10001, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:25:46 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x100000003, 0x37) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x6, 0x13, r0, 0x2af11000) r1 = fsopen(&(0x7f0000000000)='coda\x00', 0x0) socket$inet6(0xa, 0x3, 0xf52) close(r1) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x8000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 12:25:46 executing program 1: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) set_mempolicy(0x3, &(0x7f0000000080)=0x637b73ca, 0x680d) set_mempolicy(0x2, &(0x7f0000000300)=0x6, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) fchmod(r2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffff9c, 0xc0406619, &(0x7f0000000340)={@id={0x2, 0x0, @c}}) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f00000000c0)) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:46 executing program 0: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) set_mempolicy(0x3, &(0x7f0000000080)=0x637b73ca, 0x680d) set_mempolicy(0x2, &(0x7f0000000300)=0x6, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:46 executing program 5: r0 = getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)={0x0, r0}) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x2, &(0x7f00000005c0)={0x0}) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x7) sched_setattr(0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0xfe, 0x2, 0x6, 0x94, 0x0, 0xc7c, 0x400, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x8, 0x100, 0x2, 0x9, 0x10001, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:25:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x0, 0x80000001, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000100)="8e0ee867081b28309b3e6d", 0x12e9}], 0x1) 12:25:46 executing program 0: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) set_mempolicy(0x3, &(0x7f0000000080)=0x637b73ca, 0x680d) set_mempolicy(0x2, &(0x7f0000000300)=0x6, 0x1) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:46 executing program 1: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) set_mempolicy(0x3, &(0x7f0000000080)=0x637b73ca, 0x680d) set_mempolicy(0x2, &(0x7f0000000300)=0x6, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) fchmod(r2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffff9c, 0xc0406619, &(0x7f0000000340)={@id={0x2, 0x0, @c}}) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:46 executing program 2: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) set_mempolicy(0x3, &(0x7f0000000080)=0x637b73ca, 0x680d) set_mempolicy(0x2, &(0x7f0000000300)=0x6, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) fchmod(r2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffff9c, 0xc0406619, &(0x7f0000000340)={@id={0x2, 0x0, @c}}) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f00000000c0)) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:46 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, r2}]) 12:25:46 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0xfcfdffff, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:46 executing program 1: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) set_mempolicy(0x3, &(0x7f0000000080)=0x637b73ca, 0x680d) set_mempolicy(0x2, &(0x7f0000000300)=0x6, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) fchmod(r2, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:46 executing program 0: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) set_mempolicy(0x3, &(0x7f0000000080)=0x637b73ca, 0x680d) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:46 executing program 2: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) set_mempolicy(0x3, &(0x7f0000000080)=0x637b73ca, 0x680d) set_mempolicy(0x2, &(0x7f0000000300)=0x6, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) fchmod(r2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffff9c, 0xc0406619, &(0x7f0000000340)={@id={0x2, 0x0, @c}}) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f00000000c0)) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:46 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0xfefdffff, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:46 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, r2}]) [ 718.492338][ T2389] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 718.500463][ T2389] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 718.511807][ T2389] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 718.519822][ T2389] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:25:47 executing program 2: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) set_mempolicy(0x3, &(0x7f0000000080)=0x637b73ca, 0x680d) set_mempolicy(0x2, &(0x7f0000000300)=0x6, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) fchmod(r2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffff9c, 0xc0406619, &(0x7f0000000340)={@id={0x2, 0x0, @c}}) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f00000000c0)) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:47 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0xfffdffff, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:47 executing program 0: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:47 executing program 1: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) set_mempolicy(0x3, &(0x7f0000000080)=0x637b73ca, 0x680d) set_mempolicy(0x2, &(0x7f0000000300)=0x6, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:47 executing program 5: r0 = getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)={0x0, r0}) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x2, &(0x7f00000005c0)={0x0}) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x7) sched_setattr(0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0xfe, 0x2, 0x6, 0x94, 0x0, 0xc7c, 0x400, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x8, 0x100, 0x2, 0x9, 0x10001, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:25:47 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, r2}]) [ 718.673648][ T2389] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 718.681685][ T2389] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 718.692751][ T2389] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 718.700734][ T2389] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:25:47 executing program 2: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) set_mempolicy(0x3, &(0x7f0000000080)=0x637b73ca, 0x680d) set_mempolicy(0x2, &(0x7f0000000300)=0x6, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) fchmod(r2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffff9c, 0xc0406619, &(0x7f0000000340)={@id={0x2, 0x0, @c}}) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:47 executing program 1: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) set_mempolicy(0x3, &(0x7f0000000080)=0x637b73ca, 0x680d) set_mempolicy(0x2, &(0x7f0000000300)=0x6, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:47 executing program 0: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:47 executing program 2: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) set_mempolicy(0x3, &(0x7f0000000080)=0x637b73ca, 0x680d) set_mempolicy(0x2, &(0x7f0000000300)=0x6, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) fchmod(r2, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:47 executing program 1: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) set_mempolicy(0x3, &(0x7f0000000080)=0x637b73ca, 0x680d) set_mempolicy(0x2, &(0x7f0000000300)=0x6, 0x1) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:47 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0xfffffdef, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:47 executing program 0: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:47 executing program 2: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) set_mempolicy(0x3, &(0x7f0000000080)=0x637b73ca, 0x680d) set_mempolicy(0x2, &(0x7f0000000300)=0x6, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:47 executing program 1: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) set_mempolicy(0x3, &(0x7f0000000080)=0x637b73ca, 0x680d) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 719.045191][ T2432] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 719.053453][ T2432] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 719.065025][ T2432] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 719.073035][ T2432] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:25:47 executing program 5: r0 = getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)={0x0, r0}) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x2, &(0x7f00000005c0)={0x0}) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x7) sched_setattr(0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0xfe, 0x2, 0x6, 0x94, 0x0, 0xc7c, 0x400, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x8, 0x100, 0x2, 0x9, 0x10001, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:25:47 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0xfffffdfc, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:47 executing program 4: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:47 executing program 1: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:47 executing program 0: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:47 executing program 2: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) set_mempolicy(0x3, &(0x7f0000000080)=0x637b73ca, 0x680d) set_mempolicy(0x2, &(0x7f0000000300)=0x6, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 719.133592][ T2432] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 719.141631][ T2432] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 719.154636][ T2432] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 719.162658][ T2432] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:25:47 executing program 1: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:47 executing program 0: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) socket$inet_udplite(0x2, 0x2, 0x88) r0 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:47 executing program 2: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) set_mempolicy(0x3, &(0x7f0000000080)=0x637b73ca, 0x680d) set_mempolicy(0x2, &(0x7f0000000300)=0x6, 0x1) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:47 executing program 1: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:47 executing program 0: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) socket$inet_udplite(0x2, 0x2, 0x88) creat(&(0x7f0000000000)='./file1\x00', 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:47 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0xfffffdfe, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) [ 719.404246][ T2478] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 719.412264][ T2478] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 719.423522][ T2478] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 719.431566][ T2478] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:25:47 executing program 5: r0 = getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)={0x0, r0}) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x2, &(0x7f00000005c0)={0x0}) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x7) sched_setattr(0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:25:47 executing program 2: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) set_mempolicy(0x3, &(0x7f0000000080)=0x637b73ca, 0x680d) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:47 executing program 1: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:47 executing program 4: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:47 executing program 0: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) socket$inet_udplite(0x2, 0x2, 0x88) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 719.489817][ T2478] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 719.497883][ T2478] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 719.509022][ T2478] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 719.517022][ T2478] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:25:48 executing program 1: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) socket$inet_udplite(0x2, 0x2, 0x88) r0 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:48 executing program 2: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:48 executing program 0: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:48 executing program 2: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:48 executing program 0: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:48 executing program 1: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) socket$inet_udplite(0x2, 0x2, 0x88) creat(&(0x7f0000000000)='./file1\x00', 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:48 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0xfffffdff, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) [ 719.872812][ T2510] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 719.880975][ T2510] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 719.892028][ T2510] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 719.900014][ T2510] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:25:48 executing program 5: r0 = getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)={0x0, r0}) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x2, &(0x7f00000005c0)={0x0}) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x7) sched_setattr(0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:25:48 executing program 4: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:48 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0xfffffe00, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:48 executing program 0: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:48 executing program 1: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) socket$inet_udplite(0x2, 0x2, 0x88) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:48 executing program 2: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 719.953688][ T2510] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 719.961835][ T2510] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 719.972999][ T2510] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 719.981008][ T2510] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:25:48 executing program 4: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:48 executing program 1: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:48 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:48 executing program 2: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:48 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0xffffffff, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:48 executing program 0: request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 720.312337][ T2559] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 720.320570][ T2559] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 720.331936][ T2559] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 720.339945][ T2559] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:25:48 executing program 5: r0 = getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)={0x0, r0}) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x2, &(0x7f00000005c0)={0x0}) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x7) sched_setattr(0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:25:48 executing program 1: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:48 executing program 4: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fchown(r0, 0x0, 0xee00) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:48 executing program 0: request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:48 executing program 2: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) socket$inet_udplite(0x2, 0x2, 0x88) r0 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:48 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) [ 720.384831][ T2559] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 720.392924][ T2559] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 720.403975][ T2559] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 720.412027][ T2559] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:25:48 executing program 1: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:48 executing program 2: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) socket$inet_udplite(0x2, 0x2, 0x88) creat(&(0x7f0000000000)='./file1\x00', 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:48 executing program 0: request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:48 executing program 4: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) socket$inet_udplite(0x2, 0x2, 0x88) r0 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x211083200, &(0x7f0000000140), 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:48 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:48 executing program 2: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) socket$inet_udplite(0x2, 0x2, 0x88) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 720.677590][ T2587] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 720.685740][ T2587] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 720.696791][ T2587] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 720.704753][ T2587] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:25:49 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:49 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:49 executing program 4: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) socket$inet_udplite(0x2, 0x2, 0x88) creat(&(0x7f0000000000)='./file1\x00', 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:49 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x2, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:49 executing program 5: r0 = getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)={0x0, r0}) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x2, &(0x7f00000005c0)={0x0}) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x7) sched_setattr(0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:25:49 executing program 2: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 720.752408][ T2587] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 720.760433][ T2587] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 720.771669][ T2587] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 720.779662][ T2587] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:25:49 executing program 1: request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:49 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:49 executing program 2: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:49 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x3, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:49 executing program 4: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) socket$inet_udplite(0x2, 0x2, 0x88) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:49 executing program 1: request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:49 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) 12:25:49 executing program 1: request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:49 executing program 2: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:49 executing program 4: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 721.184031][ T2619] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 721.192074][ T2619] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 721.203126][ T2619] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 721.211139][ T2619] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:25:49 executing program 5: r0 = getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)={0x0, r0}) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x2, &(0x7f00000005c0)={0x0}) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x7) sched_setattr(0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:25:49 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x4, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:49 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) 12:25:49 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:49 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:49 executing program 4: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 721.266336][ T2619] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 721.274413][ T2619] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 721.285546][ T2619] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 721.293546][ T2619] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:25:49 executing program 2: request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:49 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:49 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) 12:25:49 executing program 4: pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="d1cef54513a3a62aa419ac9f3dca9de566183e8eef4b5faeb6d3cbf36ca245ebb64fa5d1b0146bdf3321f7b1fc248637e123fa72cf9c10f77ff456460400e707a63726859b4d29812d111965207d468093e8268807d35e8861aea858da6d5b84ab7604a0f720705fa61f9399666d52dfee494a84f9c5b5e1106add20281cf81c5e2d3f4b25d39080c1a83ada2d823d3c6cc8e927c3d6c34e0c89475e933b4784be450b51ae", 0xa5, 0x100) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:49 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x5, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:49 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 721.530973][ T2666] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 721.539181][ T2666] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 721.550890][ T2666] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 721.558891][ T2666] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:25:50 executing program 5: r0 = getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)={0x0, r0}) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x2, &(0x7f00000005c0)={0x0}) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x7) sched_setattr(0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:25:50 executing program 2: request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:50 executing program 0: r0 = getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)={0x0, r0}) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x2, &(0x7f00000005c0)={0x0}) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x7) sched_setattr(0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:25:50 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:50 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) [ 721.617773][ T2666] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 721.625785][ T2666] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 721.637166][ T2666] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 721.645623][ T2666] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:25:50 executing program 2: request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:50 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) 12:25:50 executing program 4: request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:50 executing program 0 (fault-call:0 fault-nth:0): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:50 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) 12:25:50 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x7, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:50 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 721.865270][ T2691] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 721.873411][ T2691] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 721.884802][ T2691] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 721.892831][ T2691] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 [ 721.956348][ T2691] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 721.964366][ T2691] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 721.981394][ T2713] FAULT_INJECTION: forcing a failure. [ 721.981394][ T2713] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 721.985852][ T2691] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 721.994471][ T2713] CPU: 1 PID: 2713 Comm: syz-executor.0 Not tainted 5.12.0-syzkaller #0 [ 722.002450][ T2691] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 [ 722.010729][ T2713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 722.010742][ T2713] Call Trace: [ 722.010749][ T2713] dump_stack+0x137/0x19d [ 722.039405][ T2713] should_fail+0x23c/0x250 [ 722.043825][ T2713] should_fail_usercopy+0x16/0x20 [ 722.050666][ T2713] strncpy_from_user+0x21/0x250 [ 722.055529][ T2713] __se_sys_request_key+0x46/0x280 [ 722.060634][ T2713] ? fput+0x2d/0x130 [ 722.064765][ T2713] ? ksys_write+0x157/0x180 [ 722.069377][ T2713] __x64_sys_request_key+0x51/0x60 [ 722.074483][ T2713] do_syscall_64+0x34/0x50 [ 722.078889][ T2713] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 722.084799][ T2713] RIP: 0033:0x4665f9 12:25:50 executing program 5: r0 = getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)={0x0, r0}) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x2, &(0x7f00000005c0)={0x0}) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x7) sched_setattr(0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:25:50 executing program 1 (fault-call:0 fault-nth:0): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:50 executing program 4: request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:50 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:50 executing program 0 (fault-call:0 fault-nth:1): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 722.088825][ T2713] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 722.108614][ T2713] RSP: 002b:00007f0018c25188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 722.117190][ T2713] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 722.125147][ T2713] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 722.133163][ T2713] RBP: 00007f0018c251d0 R08: 0000000000000000 R09: 0000000000000000 [ 722.141120][ T2713] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 722.149089][ T2713] R13: 00007ffec517880f R14: 00007f0018c25300 R15: 0000000000022000 12:25:50 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x8, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) [ 722.207158][ T2726] FAULT_INJECTION: forcing a failure. [ 722.207158][ T2726] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 722.209003][ T2725] FAULT_INJECTION: forcing a failure. [ 722.209003][ T2725] name failslab, interval 1, probability 0, space 0, times 0 [ 722.220255][ T2726] CPU: 0 PID: 2726 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 722.241397][ T2726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 722.251488][ T2726] Call Trace: [ 722.254766][ T2726] dump_stack+0x137/0x19d [ 722.259082][ T2726] should_fail+0x23c/0x250 [ 722.263480][ T2726] should_fail_usercopy+0x16/0x20 [ 722.268484][ T2726] strncpy_from_user+0x21/0x250 [ 722.273358][ T2726] __se_sys_request_key+0x46/0x280 [ 722.278452][ T2726] ? fput+0x2d/0x130 [ 722.282347][ T2726] ? ksys_write+0x157/0x180 [ 722.286834][ T2726] __x64_sys_request_key+0x51/0x60 [ 722.292001][ T2726] do_syscall_64+0x34/0x50 [ 722.296406][ T2726] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 722.302343][ T2726] RIP: 0033:0x4665f9 [ 722.306230][ T2726] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 722.325820][ T2726] RSP: 002b:00007f7099b78188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 722.334213][ T2726] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 722.342209][ T2726] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 12:25:50 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 722.350162][ T2726] RBP: 00007f7099b781d0 R08: 0000000000000000 R09: 0000000000000000 [ 722.358114][ T2726] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 722.366066][ T2726] R13: 00007fffdc0f2e8f R14: 00007f7099b78300 R15: 0000000000022000 [ 722.374023][ T2725] CPU: 1 PID: 2725 Comm: syz-executor.0 Not tainted 5.12.0-syzkaller #0 [ 722.382359][ T2725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 722.392423][ T2725] Call Trace: [ 722.395707][ T2725] dump_stack+0x137/0x19d [ 722.400041][ T2725] should_fail+0x23c/0x250 12:25:50 executing program 1 (fault-call:0 fault-nth:1): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 722.404530][ T2725] __should_failslab+0x81/0x90 [ 722.409297][ T2725] ? __se_sys_request_key+0xd0/0x280 [ 722.414599][ T2725] should_failslab+0x5/0x20 [ 722.419154][ T2725] __kmalloc_track_caller+0x64/0x360 [ 722.420742][ T2733] FAULT_INJECTION: forcing a failure. [ 722.420742][ T2733] name failslab, interval 1, probability 0, space 0, times 0 [ 722.424440][ T2725] ? strnlen_user+0x137/0x1c0 [ 722.424467][ T2725] strndup_user+0x73/0x120 [ 722.446192][ T2725] __se_sys_request_key+0xd0/0x280 [ 722.451291][ T2725] ? fput+0x2d/0x130 [ 722.455176][ T2725] __x64_sys_request_key+0x51/0x60 [ 722.460271][ T2725] do_syscall_64+0x34/0x50 [ 722.464673][ T2725] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 722.470654][ T2725] RIP: 0033:0x4665f9 [ 722.474530][ T2725] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 722.494121][ T2725] RSP: 002b:00007f0018c25188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 722.502519][ T2725] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 722.510482][ T2725] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 722.518459][ T2725] RBP: 00007f0018c251d0 R08: 0000000000000000 R09: 0000000000000000 [ 722.526425][ T2725] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 722.536290][ T2725] R13: 00007ffec517880f R14: 00007f0018c25300 R15: 0000000000022000 [ 722.544461][ T2733] CPU: 0 PID: 2733 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 722.552879][ T2733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 722.562936][ T2733] Call Trace: [ 722.566225][ T2733] dump_stack+0x137/0x19d [ 722.570591][ T2733] should_fail+0x23c/0x250 [ 722.574998][ T2733] __should_failslab+0x81/0x90 [ 722.579837][ T2733] ? __se_sys_request_key+0xd0/0x280 [ 722.585122][ T2733] should_failslab+0x5/0x20 [ 722.589619][ T2733] __kmalloc_track_caller+0x64/0x360 [ 722.595005][ T2733] ? strnlen_user+0x137/0x1c0 [ 722.599747][ T2733] strndup_user+0x73/0x120 12:25:51 executing program 0 (fault-call:0 fault-nth:2): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:51 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) 12:25:51 executing program 4: request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:51 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 722.604232][ T2733] __se_sys_request_key+0xd0/0x280 [ 722.609470][ T2733] ? fput+0x2d/0x130 [ 722.613374][ T2733] __x64_sys_request_key+0x51/0x60 [ 722.618494][ T2733] do_syscall_64+0x34/0x50 [ 722.622945][ T2733] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 722.628837][ T2733] RIP: 0033:0x4665f9 [ 722.632731][ T2733] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 722.652335][ T2733] RSP: 002b:00007f7099b78188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 722.660743][ T2733] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 722.668711][ T2733] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 722.676699][ T2733] RBP: 00007f7099b781d0 R08: 0000000000000000 R09: 0000000000000000 [ 722.682931][ T2742] FAULT_INJECTION: forcing a failure. [ 722.682931][ T2742] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 722.684675][ T2733] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 722.684691][ T2733] R13: 00007fffdc0f2e8f R14: 00007f7099b78300 R15: 0000000000022000 [ 722.713824][ T2742] CPU: 1 PID: 2742 Comm: syz-executor.0 Not tainted 5.12.0-syzkaller #0 [ 722.722145][ T2742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 722.732183][ T2742] Call Trace: [ 722.735495][ T2742] dump_stack+0x137/0x19d [ 722.739814][ T2742] should_fail+0x23c/0x250 [ 722.744216][ T2742] should_fail_usercopy+0x16/0x20 [ 722.749247][ T2742] _copy_from_user+0x1c/0xd0 [ 722.753833][ T2742] strndup_user+0xb0/0x120 [ 722.758252][ T2742] __se_sys_request_key+0xd0/0x280 [ 722.763351][ T2742] ? fput+0x2d/0x130 [ 722.767240][ T2742] __x64_sys_request_key+0x51/0x60 [ 722.772332][ T2742] do_syscall_64+0x34/0x50 [ 722.776735][ T2742] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 722.782644][ T2742] RIP: 0033:0x4665f9 [ 722.786536][ T2742] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 722.806401][ T2742] RSP: 002b:00007f0018c25188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 722.814865][ T2742] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 722.822820][ T2742] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 722.830792][ T2742] RBP: 00007f0018c251d0 R08: 0000000000000000 R09: 0000000000000000 [ 722.838818][ T2742] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 722.846797][ T2742] R13: 00007ffec517880f R14: 00007f0018c25300 R15: 0000000000022000 [ 722.994453][ T2722] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 723.002479][ T2722] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 723.014055][ T2722] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 723.022057][ T2722] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:25:51 executing program 5: r0 = getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)={0x0, r0}) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x2, &(0x7f00000005c0)={0x0}) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x7) sched_setattr(0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:25:51 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:51 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) 12:25:51 executing program 1 (fault-call:0 fault-nth:2): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:51 executing program 0 (fault-call:0 fault-nth:3): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:51 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0xfe, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) [ 723.062547][ T2722] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 723.070570][ T2722] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 723.081652][ T2722] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 723.089694][ T2722] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:25:51 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) [ 723.147728][ T2755] FAULT_INJECTION: forcing a failure. [ 723.147728][ T2755] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 723.160931][ T2755] CPU: 1 PID: 2755 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 723.169258][ T2755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 723.179333][ T2755] Call Trace: [ 723.182605][ T2755] dump_stack+0x137/0x19d [ 723.186195][ T2758] FAULT_INJECTION: forcing a failure. [ 723.186195][ T2758] name failslab, interval 1, probability 0, space 0, times 0 [ 723.186959][ T2755] should_fail+0x23c/0x250 [ 723.186979][ T2755] should_fail_usercopy+0x16/0x20 [ 723.187004][ T2755] _copy_from_user+0x1c/0xd0 [ 723.187022][ T2755] strndup_user+0xb0/0x120 [ 723.217943][ T2755] __se_sys_request_key+0xd0/0x280 [ 723.223044][ T2755] ? fput+0x2d/0x130 [ 723.227005][ T2755] __x64_sys_request_key+0x51/0x60 [ 723.232144][ T2755] do_syscall_64+0x34/0x50 [ 723.236602][ T2755] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 723.242491][ T2755] RIP: 0033:0x4665f9 [ 723.246366][ T2755] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 723.266022][ T2755] RSP: 002b:00007f7099b78188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 723.274419][ T2755] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 723.282385][ T2755] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 723.290339][ T2755] RBP: 00007f7099b781d0 R08: 0000000000000000 R09: 0000000000000000 [ 723.298335][ T2755] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 723.306289][ T2755] R13: 00007fffdc0f2e8f R14: 00007f7099b78300 R15: 0000000000022000 [ 723.314246][ T2758] CPU: 0 PID: 2758 Comm: syz-executor.0 Not tainted 5.12.0-syzkaller #0 [ 723.322652][ T2758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 723.332704][ T2758] Call Trace: [ 723.335971][ T2758] dump_stack+0x137/0x19d [ 723.340284][ T2758] should_fail+0x23c/0x250 [ 723.344700][ T2758] __should_failslab+0x81/0x90 [ 723.349448][ T2758] ? __se_sys_request_key+0x104/0x280 [ 723.354818][ T2758] should_failslab+0x5/0x20 [ 723.359314][ T2758] __kmalloc_track_caller+0x64/0x360 [ 723.364582][ T2758] ? strnlen_user+0x137/0x1c0 [ 723.369298][ T2758] strndup_user+0x73/0x120 [ 723.373707][ T2758] __se_sys_request_key+0x104/0x280 [ 723.378888][ T2758] ? fput+0x2d/0x130 [ 723.382769][ T2758] __x64_sys_request_key+0x51/0x60 [ 723.387900][ T2758] do_syscall_64+0x34/0x50 [ 723.392302][ T2758] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 723.398191][ T2758] RIP: 0033:0x4665f9 [ 723.402100][ T2758] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 723.421689][ T2758] RSP: 002b:00007f0018c25188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 723.430127][ T2758] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 723.438082][ T2758] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 12:25:51 executing program 0 (fault-call:0 fault-nth:4): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:51 executing program 1 (fault-call:0 fault-nth:3): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:51 executing program 2 (fault-call:0 fault-nth:0): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:51 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 723.446036][ T2758] RBP: 00007f0018c251d0 R08: 0000000000000000 R09: 0000000000000000 [ 723.454038][ T2758] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 723.462118][ T2758] R13: 00007ffec517880f R14: 00007f0018c25300 R15: 0000000000022000 12:25:52 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x300, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) [ 723.603420][ T2751] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 723.611438][ T2751] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 723.622893][ T2751] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 723.630901][ T2751] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 [ 723.695546][ T2751] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 723.698398][ T2771] FAULT_INJECTION: forcing a failure. [ 723.698398][ T2771] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 723.703589][ T2751] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 723.716641][ T2771] CPU: 1 PID: 2771 Comm: syz-executor.0 Not tainted 5.12.0-syzkaller #0 [ 723.728169][ T2770] FAULT_INJECTION: forcing a failure. [ 723.728169][ T2770] name failslab, interval 1, probability 0, space 0, times 0 [ 723.735969][ T2771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 723.735982][ T2771] Call Trace: [ 723.735990][ T2771] dump_stack+0x137/0x19d [ 723.766202][ T2771] should_fail+0x23c/0x250 [ 723.770612][ T2771] should_fail_usercopy+0x16/0x20 [ 723.775630][ T2771] _copy_from_user+0x1c/0xd0 [ 723.780207][ T2771] strndup_user+0xb0/0x120 [ 723.784684][ T2771] __se_sys_request_key+0x104/0x280 [ 723.789895][ T2771] ? fput+0x2d/0x130 [ 723.793803][ T2771] __x64_sys_request_key+0x51/0x60 [ 723.798915][ T2771] do_syscall_64+0x34/0x50 [ 723.803383][ T2771] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 723.809377][ T2771] RIP: 0033:0x4665f9 [ 723.813254][ T2771] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 723.832854][ T2771] RSP: 002b:00007f0018c25188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 723.841249][ T2771] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 723.849202][ T2771] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 723.857155][ T2771] RBP: 00007f0018c251d0 R08: 0000000000000000 R09: 0000000000000000 [ 723.865108][ T2771] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 723.873059][ T2771] R13: 00007ffec517880f R14: 00007f0018c25300 R15: 0000000000022000 [ 723.881017][ T2770] CPU: 0 PID: 2770 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 723.882868][ T2751] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 723.889350][ T2770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 723.889364][ T2770] Call Trace: [ 723.889371][ T2770] dump_stack+0x137/0x19d [ 723.897340][ T2751] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 [ 723.907367][ T2770] should_fail+0x23c/0x250 [ 723.930623][ T2770] __should_failslab+0x81/0x90 [ 723.935410][ T2770] ? __se_sys_request_key+0x104/0x280 [ 723.940801][ T2770] should_failslab+0x5/0x20 [ 723.945310][ T2770] __kmalloc_track_caller+0x64/0x360 [ 723.950675][ T2770] ? strnlen_user+0x137/0x1c0 [ 723.955433][ T2770] strndup_user+0x73/0x120 [ 723.959848][ T2770] __se_sys_request_key+0x104/0x280 [ 723.965039][ T2770] ? fput+0x2d/0x130 [ 723.969066][ T2770] __x64_sys_request_key+0x51/0x60 [ 723.974261][ T2770] do_syscall_64+0x34/0x50 [ 723.978715][ T2770] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 723.984595][ T2770] RIP: 0033:0x4665f9 [ 723.988558][ T2770] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 724.008167][ T2770] RSP: 002b:00007f7099b78188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 724.016567][ T2770] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 724.024613][ T2770] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 724.032584][ T2770] RBP: 00007f7099b781d0 R08: 0000000000000000 R09: 0000000000000000 12:25:52 executing program 5: r0 = getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)={0x0, r0}) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x2, &(0x7f00000005c0)={0x0}) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x7) sched_setattr(0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:25:52 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) 12:25:52 executing program 0 (fault-call:0 fault-nth:5): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:52 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:52 executing program 1 (fault-call:0 fault-nth:4): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 724.040538][ T2770] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 724.048493][ T2770] R13: 00007fffdc0f2e8f R14: 00007f7099b78300 R15: 0000000000022000 [ 724.097341][ T2780] FAULT_INJECTION: forcing a failure. [ 724.097341][ T2780] name failslab, interval 1, probability 0, space 0, times 0 [ 724.110031][ T2780] CPU: 1 PID: 2780 Comm: syz-executor.0 Not tainted 5.12.0-syzkaller #0 [ 724.118401][ T2780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 724.128484][ T2780] Call Trace: [ 724.131761][ T2780] dump_stack+0x137/0x19d [ 724.136124][ T2780] should_fail+0x23c/0x250 [ 724.140581][ T2780] __should_failslab+0x81/0x90 [ 724.145345][ T2780] ? asymmetric_key_hex_to_key_id+0x59/0xd0 [ 724.149615][ T2787] FAULT_INJECTION: forcing a failure. [ 724.149615][ T2787] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 724.151244][ T2780] should_failslab+0x5/0x20 [ 724.151271][ T2780] __kmalloc+0x66/0x360 [ 724.172876][ T2780] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 724.179195][ T2780] asymmetric_key_hex_to_key_id+0x59/0xd0 [ 724.185001][ T2780] asymmetric_key_match_preparse+0x117/0x190 [ 724.190980][ T2780] request_key_and_link+0x113/0xca0 [ 724.196207][ T2780] ? restrict_link_reject+0x10/0x10 [ 724.201409][ T2780] ? strcmp+0x23/0x50 [ 724.205372][ T2780] __se_sys_request_key+0x1c4/0x280 [ 724.210550][ T2780] ? fput+0x2d/0x130 [ 724.214473][ T2780] __x64_sys_request_key+0x51/0x60 [ 724.219569][ T2780] do_syscall_64+0x34/0x50 [ 724.223979][ T2780] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 724.229860][ T2780] RIP: 0033:0x4665f9 [ 724.233736][ T2780] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 724.253329][ T2780] RSP: 002b:00007f0018c25188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 724.261725][ T2780] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 724.269678][ T2780] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 724.277631][ T2780] RBP: 00007f0018c251d0 R08: 0000000000000000 R09: 0000000000000000 [ 724.285584][ T2780] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 12:25:52 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) 12:25:52 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x500, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) [ 724.293537][ T2780] R13: 00007ffec517880f R14: 00007f0018c25300 R15: 0000000000022000 [ 724.301495][ T2787] CPU: 0 PID: 2787 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 724.309909][ T2787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 724.319957][ T2787] Call Trace: [ 724.323252][ T2787] dump_stack+0x137/0x19d [ 724.327591][ T2787] should_fail+0x23c/0x250 [ 724.332000][ T2787] should_fail_usercopy+0x16/0x20 [ 724.337107][ T2787] _copy_from_user+0x1c/0xd0 [ 724.341696][ T2787] strndup_user+0xb0/0x120 12:25:52 executing program 0 (fault-call:0 fault-nth:6): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:52 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:52 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) [ 724.346305][ T2787] __se_sys_request_key+0x104/0x280 [ 724.351489][ T2787] ? fput+0x2d/0x130 [ 724.355407][ T2787] __x64_sys_request_key+0x51/0x60 [ 724.360603][ T2787] do_syscall_64+0x34/0x50 [ 724.365034][ T2787] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 724.370938][ T2787] RIP: 0033:0x4665f9 [ 724.374829][ T2787] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 12:25:52 executing program 4 (fault-call:0 fault-nth:0): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 724.394498][ T2787] RSP: 002b:00007f7099b78188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 724.402906][ T2787] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 724.410874][ T2787] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 724.418845][ T2787] RBP: 00007f7099b781d0 R08: 0000000000000000 R09: 0000000000000000 [ 724.426896][ T2787] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 724.434944][ T2787] R13: 00007fffdc0f2e8f R14: 00007f7099b78300 R15: 0000000000022000 [ 724.436587][ T2796] FAULT_INJECTION: forcing a failure. [ 724.436587][ T2796] name failslab, interval 1, probability 0, space 0, times 0 [ 724.455563][ T2796] CPU: 1 PID: 2796 Comm: syz-executor.0 Not tainted 5.12.0-syzkaller #0 [ 724.463902][ T2796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 724.473999][ T2796] Call Trace: [ 724.477277][ T2796] dump_stack+0x137/0x19d [ 724.481607][ T2796] should_fail+0x23c/0x250 [ 724.486007][ T2796] ? key_alloc+0x2aa/0xbe0 [ 724.490433][ T2796] __should_failslab+0x81/0x90 [ 724.495363][ T2796] should_failslab+0x5/0x20 [ 724.499879][ T2796] kmem_cache_alloc+0x46/0x300 [ 724.504625][ T2796] key_alloc+0x2aa/0xbe0 [ 724.508851][ T2796] request_key_and_link+0x403/0xca0 [ 724.514031][ T2796] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 724.520271][ T2796] ? keyring_search_rcu+0x180/0x180 [ 724.525457][ T2796] __se_sys_request_key+0x1c4/0x280 [ 724.530637][ T2796] ? fput+0x2d/0x130 [ 724.534609][ T2796] __x64_sys_request_key+0x51/0x60 [ 724.539699][ T2796] do_syscall_64+0x34/0x50 [ 724.544188][ T2796] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 724.550070][ T2796] RIP: 0033:0x4665f9 [ 724.553949][ T2796] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 724.573603][ T2796] RSP: 002b:00007f0018c25188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 724.582005][ T2796] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 724.589961][ T2796] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 12:25:53 executing program 1 (fault-call:0 fault-nth:5): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 724.597914][ T2796] RBP: 00007f0018c251d0 R08: 0000000000000000 R09: 0000000000000000 [ 724.605875][ T2796] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 724.613830][ T2796] R13: 00007ffec517880f R14: 00007f0018c25300 R15: 0000000000022000 [ 724.750575][ T2779] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 724.759574][ T2779] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 724.771754][ T2779] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 724.779818][ T2779] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 [ 724.823167][ T2779] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 724.824451][ T2803] FAULT_INJECTION: forcing a failure. [ 724.824451][ T2803] name failslab, interval 1, probability 0, space 0, times 0 [ 724.831203][ T2779] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 724.843786][ T2803] CPU: 0 PID: 2803 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 724.854949][ T2779] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 724.863149][ T2803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 724.863160][ T2803] Call Trace: [ 724.863168][ T2803] dump_stack+0x137/0x19d [ 724.863190][ T2803] should_fail+0x23c/0x250 [ 724.871148][ T2779] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 [ 724.881189][ T2803] __should_failslab+0x81/0x90 [ 724.894191][ T2804] FAULT_INJECTION: forcing a failure. [ 724.894191][ T2804] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 724.904171][ T2803] ? asymmetric_key_hex_to_key_id+0x59/0xd0 [ 724.927858][ T2803] should_failslab+0x5/0x20 [ 724.932356][ T2803] __kmalloc+0x66/0x360 [ 724.936498][ T2803] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 724.942739][ T2803] asymmetric_key_hex_to_key_id+0x59/0xd0 [ 724.948460][ T2803] asymmetric_key_match_preparse+0x117/0x190 [ 724.954426][ T2803] request_key_and_link+0x113/0xca0 [ 724.959779][ T2803] ? restrict_link_reject+0x10/0x10 [ 724.965312][ T2803] ? strcmp+0x23/0x50 [ 724.969293][ T2803] __se_sys_request_key+0x1c4/0x280 [ 724.974497][ T2803] ? fput+0x2d/0x130 [ 724.978379][ T2803] __x64_sys_request_key+0x51/0x60 [ 724.983470][ T2803] do_syscall_64+0x34/0x50 [ 724.987873][ T2803] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 724.994128][ T2803] RIP: 0033:0x4665f9 [ 724.998020][ T2803] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 725.017611][ T2803] RSP: 002b:00007f7099b78188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 725.026006][ T2803] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 725.033958][ T2803] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 725.041910][ T2803] RBP: 00007f7099b781d0 R08: 0000000000000000 R09: 0000000000000000 [ 725.049860][ T2803] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 725.057811][ T2803] R13: 00007fffdc0f2e8f R14: 00007f7099b78300 R15: 0000000000022000 [ 725.065785][ T2804] CPU: 1 PID: 2804 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 725.074150][ T2804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 725.084200][ T2804] Call Trace: [ 725.087602][ T2804] dump_stack+0x137/0x19d [ 725.091976][ T2804] should_fail+0x23c/0x250 [ 725.096608][ T2804] should_fail_usercopy+0x16/0x20 [ 725.101622][ T2804] strncpy_from_user+0x21/0x250 [ 725.106459][ T2804] __se_sys_request_key+0x46/0x280 [ 725.111663][ T2804] ? fput+0x2d/0x130 [ 725.115784][ T2804] ? ksys_write+0x157/0x180 [ 725.120277][ T2804] __x64_sys_request_key+0x51/0x60 [ 725.125418][ T2804] do_syscall_64+0x34/0x50 [ 725.129977][ T2804] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 725.135854][ T2804] RIP: 0033:0x4665f9 [ 725.139727][ T2804] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 725.159393][ T2804] RSP: 002b:00007fdd9a492188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 12:25:53 executing program 5: r0 = getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)={0x0, r0}) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x2, &(0x7f00000005c0)={0x0}) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x7) sched_setattr(0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:25:53 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x2}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:53 executing program 0 (fault-call:0 fault-nth:7): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:53 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x700, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:53 executing program 1 (fault-call:0 fault-nth:6): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 725.167808][ T2804] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 725.175799][ T2804] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 725.183808][ T2804] RBP: 00007fdd9a4921d0 R08: 0000000000000000 R09: 0000000000000000 [ 725.191773][ T2804] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 725.199726][ T2804] R13: 00007ffd8a43ae3f R14: 00007fdd9a492300 R15: 0000000000022000 12:25:53 executing program 4 (fault-call:0 fault-nth:1): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 725.249521][ T2812] FAULT_INJECTION: forcing a failure. [ 725.249521][ T2812] name failslab, interval 1, probability 0, space 0, times 0 [ 725.262172][ T2812] CPU: 1 PID: 2812 Comm: syz-executor.0 Not tainted 5.12.0-syzkaller #0 [ 725.270494][ T2812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 725.278976][ T2818] FAULT_INJECTION: forcing a failure. [ 725.278976][ T2818] name failslab, interval 1, probability 0, space 0, times 0 [ 725.280539][ T2812] Call Trace: [ 725.280548][ T2812] dump_stack+0x137/0x19d [ 725.302288][ T2812] should_fail+0x23c/0x250 [ 725.306697][ T2812] __should_failslab+0x81/0x90 [ 725.311451][ T2812] ? key_alloc+0x2e2/0xbe0 [ 725.315893][ T2812] should_failslab+0x5/0x20 [ 725.320383][ T2812] __kmalloc_track_caller+0x64/0x360 [ 725.325647][ T2812] ? key_alloc+0x2aa/0xbe0 [ 725.330046][ T2812] kmemdup+0x21/0x50 [ 725.333925][ T2812] key_alloc+0x2e2/0xbe0 [ 725.338152][ T2812] request_key_and_link+0x403/0xca0 [ 725.343334][ T2812] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 725.349636][ T2812] ? keyring_search_rcu+0x180/0x180 [ 725.354837][ T2812] __se_sys_request_key+0x1c4/0x280 [ 725.360020][ T2812] ? fput+0x2d/0x130 [ 725.363899][ T2812] __x64_sys_request_key+0x51/0x60 [ 725.368991][ T2812] do_syscall_64+0x34/0x50 [ 725.373444][ T2812] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 725.379324][ T2812] RIP: 0033:0x4665f9 [ 725.383199][ T2812] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 725.402809][ T2812] RSP: 002b:00007f0018c25188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 725.411301][ T2812] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 725.419283][ T2812] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 725.427236][ T2812] RBP: 00007f0018c251d0 R08: 0000000000000000 R09: 0000000000000000 [ 725.435195][ T2812] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 725.443148][ T2812] R13: 00007ffec517880f R14: 00007f0018c25300 R15: 0000000000022000 [ 725.451106][ T2818] CPU: 0 PID: 2818 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 725.457440][ T2815] FAULT_INJECTION: forcing a failure. [ 725.457440][ T2815] name failslab, interval 1, probability 0, space 0, times 0 [ 725.459511][ T2818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 725.459524][ T2818] Call Trace: [ 725.459531][ T2818] dump_stack+0x137/0x19d [ 725.459550][ T2818] should_fail+0x23c/0x250 [ 725.459565][ T2818] __should_failslab+0x81/0x90 [ 725.498966][ T2818] ? __se_sys_request_key+0xd0/0x280 [ 725.504276][ T2818] should_failslab+0x5/0x20 [ 725.508844][ T2818] __kmalloc_track_caller+0x64/0x360 [ 725.514116][ T2818] ? strnlen_user+0x137/0x1c0 [ 725.518841][ T2818] strndup_user+0x73/0x120 [ 725.523245][ T2818] __se_sys_request_key+0xd0/0x280 [ 725.528340][ T2818] ? fput+0x2d/0x130 [ 725.532221][ T2818] __x64_sys_request_key+0x51/0x60 [ 725.537329][ T2818] do_syscall_64+0x34/0x50 [ 725.541796][ T2818] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 725.547757][ T2818] RIP: 0033:0x4665f9 [ 725.551643][ T2818] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 725.571233][ T2818] RSP: 002b:00007fdd9a492188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 725.579633][ T2818] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 725.587586][ T2818] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 12:25:54 executing program 4 (fault-call:0 fault-nth:2): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 725.595577][ T2818] RBP: 00007fdd9a4921d0 R08: 0000000000000000 R09: 0000000000000000 [ 725.603615][ T2818] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 725.611581][ T2818] R13: 00007ffd8a43ae3f R14: 00007fdd9a492300 R15: 0000000000022000 [ 725.619537][ T2815] CPU: 1 PID: 2815 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 725.628789][ T2815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 725.638874][ T2815] Call Trace: [ 725.642150][ T2815] dump_stack+0x137/0x19d [ 725.646571][ T2815] should_fail+0x23c/0x250 12:25:54 executing program 0 (fault-call:0 fault-nth:8): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 725.651073][ T2815] ? key_alloc+0x2aa/0xbe0 [ 725.655531][ T2815] __should_failslab+0x81/0x90 [ 725.660292][ T2815] should_failslab+0x5/0x20 [ 725.664803][ T2815] kmem_cache_alloc+0x46/0x300 [ 725.669585][ T2815] key_alloc+0x2aa/0xbe0 [ 725.673832][ T2815] request_key_and_link+0x403/0xca0 [ 725.675853][ T2823] FAULT_INJECTION: forcing a failure. [ 725.675853][ T2823] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 725.679029][ T2815] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 725.679060][ T2815] ? keyring_search_rcu+0x180/0x180 [ 725.703441][ T2815] __se_sys_request_key+0x1c4/0x280 [ 725.708631][ T2815] ? fput+0x2d/0x130 [ 725.712514][ T2815] __x64_sys_request_key+0x51/0x60 [ 725.717624][ T2815] do_syscall_64+0x34/0x50 [ 725.722054][ T2815] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 725.727995][ T2815] RIP: 0033:0x4665f9 [ 725.731880][ T2815] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 725.751477][ T2815] RSP: 002b:00007f7099b78188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 725.759885][ T2815] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 725.767846][ T2815] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 725.775806][ T2815] RBP: 00007f7099b781d0 R08: 0000000000000000 R09: 0000000000000000 [ 725.783767][ T2815] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 725.791734][ T2815] R13: 00007fffdc0f2e8f R14: 00007f7099b78300 R15: 0000000000022000 [ 725.799803][ T2823] CPU: 0 PID: 2823 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 725.808140][ T2823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 725.818188][ T2823] Call Trace: [ 725.821455][ T2823] dump_stack+0x137/0x19d [ 725.825784][ T2823] should_fail+0x23c/0x250 [ 725.830203][ T2823] should_fail_usercopy+0x16/0x20 [ 725.835230][ T2823] _copy_from_user+0x1c/0xd0 [ 725.839847][ T2823] strndup_user+0xb0/0x120 [ 725.841120][ T2825] FAULT_INJECTION: forcing a failure. [ 725.841120][ T2825] name failslab, interval 1, probability 0, space 0, times 0 [ 725.844263][ T2823] __se_sys_request_key+0xd0/0x280 [ 725.862016][ T2823] ? fput+0x2d/0x130 [ 725.865999][ T2823] __x64_sys_request_key+0x51/0x60 [ 725.871097][ T2823] do_syscall_64+0x34/0x50 [ 725.875503][ T2823] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 725.881386][ T2823] RIP: 0033:0x4665f9 [ 725.885262][ T2823] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 725.905025][ T2823] RSP: 002b:00007fdd9a492188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 725.913427][ T2823] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 725.921388][ T2823] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 725.929358][ T2823] RBP: 00007fdd9a4921d0 R08: 0000000000000000 R09: 0000000000000000 [ 725.937321][ T2823] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 12:25:54 executing program 1 (fault-call:0 fault-nth:7): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 725.945280][ T2823] R13: 00007ffd8a43ae3f R14: 00007fdd9a492300 R15: 0000000000022000 [ 725.953245][ T2825] CPU: 1 PID: 2825 Comm: syz-executor.0 Not tainted 5.12.0-syzkaller #0 [ 725.961581][ T2825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 725.971641][ T2825] Call Trace: [ 725.974916][ T2825] dump_stack+0x137/0x19d [ 725.979245][ T2825] should_fail+0x23c/0x250 [ 725.983657][ T2825] __should_failslab+0x81/0x90 [ 725.988419][ T2825] ? selinux_key_alloc+0x35/0xd0 [ 725.993425][ T2825] should_failslab+0x5/0x20 [ 725.997966][ T2825] kmem_cache_alloc_trace+0x49/0x320 [ 726.003279][ T2825] selinux_key_alloc+0x35/0xd0 [ 726.008025][ T2825] security_key_alloc+0x45/0x90 [ 726.012859][ T2825] key_alloc+0x694/0xbe0 [ 726.017101][ T2825] request_key_and_link+0x403/0xca0 [ 726.022284][ T2825] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 726.028548][ T2825] ? keyring_search_rcu+0x180/0x180 [ 726.033767][ T2825] __se_sys_request_key+0x1c4/0x280 [ 726.038946][ T2825] ? fput+0x2d/0x130 [ 726.042828][ T2825] __x64_sys_request_key+0x51/0x60 [ 726.047923][ T2825] do_syscall_64+0x34/0x50 [ 726.052327][ T2825] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 726.058210][ T2825] RIP: 0033:0x4665f9 [ 726.062159][ T2825] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 726.081787][ T2825] RSP: 002b:00007f0018c25188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 726.090182][ T2825] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 12:25:54 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x3}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 726.098135][ T2825] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 726.106104][ T2825] RBP: 00007f0018c251d0 R08: 0000000000000000 R09: 0000000000000000 [ 726.114073][ T2825] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 726.122031][ T2825] R13: 00007ffec517880f R14: 00007f0018c25300 R15: 0000000000022000 12:25:54 executing program 5: r0 = getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)={0x0, r0}) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x2, &(0x7f00000005c0)={0x0}) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x7) sched_setattr(0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:25:54 executing program 0 (fault-call:0 fault-nth:9): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 726.153080][ T2828] FAULT_INJECTION: forcing a failure. [ 726.153080][ T2828] name failslab, interval 1, probability 0, space 0, times 0 [ 726.165792][ T2828] CPU: 1 PID: 2828 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 726.174223][ T2828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 726.184284][ T2828] Call Trace: [ 726.187563][ T2828] dump_stack+0x137/0x19d [ 726.191898][ T2828] should_fail+0x23c/0x250 [ 726.196480][ T2828] __should_failslab+0x81/0x90 12:25:54 executing program 4 (fault-call:0 fault-nth:3): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 726.201273][ T2828] ? key_alloc+0x2e2/0xbe0 [ 726.205712][ T2828] should_failslab+0x5/0x20 [ 726.210302][ T2828] __kmalloc_track_caller+0x64/0x360 [ 726.215594][ T2828] ? key_alloc+0x2aa/0xbe0 [ 726.220043][ T2828] kmemdup+0x21/0x50 [ 726.223946][ T2828] key_alloc+0x2e2/0xbe0 [ 726.228205][ T2828] request_key_and_link+0x403/0xca0 [ 726.233487][ T2828] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 726.236380][ T2837] FAULT_INJECTION: forcing a failure. [ 726.236380][ T2837] name failslab, interval 1, probability 0, space 0, times 0 [ 726.239757][ T2828] ? keyring_search_rcu+0x180/0x180 [ 726.239787][ T2828] __se_sys_request_key+0x1c4/0x280 [ 726.262889][ T2828] ? fput+0x2d/0x130 [ 726.266779][ T2828] __x64_sys_request_key+0x51/0x60 [ 726.271877][ T2828] do_syscall_64+0x34/0x50 [ 726.276362][ T2828] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 726.282316][ T2828] RIP: 0033:0x4665f9 [ 726.286193][ T2828] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 726.305784][ T2828] RSP: 002b:00007f7099b78188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 726.314193][ T2828] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 726.322264][ T2828] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 726.330230][ T2828] RBP: 00007f7099b781d0 R08: 0000000000000000 R09: 0000000000000000 [ 726.338312][ T2828] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 726.346270][ T2828] R13: 00007fffdc0f2e8f R14: 00007f7099b78300 R15: 0000000000022000 [ 726.354246][ T2837] CPU: 0 PID: 2837 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 726.362585][ T2837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 726.372690][ T2837] Call Trace: [ 726.375961][ T2837] dump_stack+0x137/0x19d [ 726.380289][ T2837] should_fail+0x23c/0x250 [ 726.384691][ T2837] __should_failslab+0x81/0x90 [ 726.389443][ T2837] ? __se_sys_request_key+0x104/0x280 [ 726.394977][ T2837] should_failslab+0x5/0x20 [ 726.399478][ T2837] __kmalloc_track_caller+0x64/0x360 [ 726.404758][ T2837] ? strnlen_user+0x137/0x1c0 [ 726.409430][ T2837] strndup_user+0x73/0x120 [ 726.413836][ T2837] __se_sys_request_key+0x104/0x280 [ 726.419048][ T2837] ? fput+0x2d/0x130 [ 726.422931][ T2837] __x64_sys_request_key+0x51/0x60 [ 726.428026][ T2837] do_syscall_64+0x34/0x50 [ 726.432470][ T2837] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 726.438355][ T2837] RIP: 0033:0x4665f9 [ 726.442232][ T2837] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 726.461821][ T2837] RSP: 002b:00007fdd9a492188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 726.470265][ T2837] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 726.478219][ T2837] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 726.486171][ T2837] RBP: 00007fdd9a4921d0 R08: 0000000000000000 R09: 0000000000000000 [ 726.494222][ T2837] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 12:25:54 executing program 1 (fault-call:0 fault-nth:8): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 726.502172][ T2837] R13: 00007ffd8a43ae3f R14: 00007fdd9a492300 R15: 0000000000022000 [ 726.511942][ T2833] FAULT_INJECTION: forcing a failure. [ 726.511942][ T2833] name failslab, interval 1, probability 0, space 0, times 0 [ 726.524666][ T2833] CPU: 1 PID: 2833 Comm: syz-executor.0 Not tainted 5.12.0-syzkaller #0 [ 726.532988][ T2833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 726.543084][ T2833] Call Trace: [ 726.546357][ T2833] dump_stack+0x137/0x19d [ 726.550703][ T2833] should_fail+0x23c/0x250 [ 726.555111][ T2833] __should_failslab+0x81/0x90 [ 726.559866][ T2833] ? assoc_array_insert+0x70/0x1730 [ 726.565057][ T2833] should_failslab+0x5/0x20 [ 726.569639][ T2833] kmem_cache_alloc_trace+0x49/0x320 [ 726.574930][ T2833] assoc_array_insert+0x70/0x1730 [ 726.579949][ T2833] ? __down_write_common+0x45/0x890 [ 726.585218][ T2833] ? key_alloc+0x71d/0xbe0 [ 726.589685][ T2833] ? key_alloc+0xa40/0xbe0 [ 726.594160][ T2833] __key_link_begin+0x96/0x140 [ 726.598990][ T2833] request_key_and_link+0x488/0xca0 [ 726.604180][ T2833] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 726.610455][ T2833] ? keyring_search_rcu+0x180/0x180 [ 726.615690][ T2833] __se_sys_request_key+0x1c4/0x280 [ 726.620883][ T2833] ? fput+0x2d/0x130 [ 726.624780][ T2833] __x64_sys_request_key+0x51/0x60 [ 726.629884][ T2833] do_syscall_64+0x34/0x50 [ 726.634314][ T2833] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 726.640263][ T2833] RIP: 0033:0x4665f9 [ 726.644146][ T2833] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 726.663789][ T2833] RSP: 002b:00007f0018c25188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 726.672223][ T2833] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 726.680195][ T2833] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 726.685970][ T2830] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 726.688155][ T2833] RBP: 00007f0018c251d0 R08: 0000000000000000 R09: 0000000000000000 12:25:55 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0xeffd, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) [ 726.688170][ T2833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 726.688183][ T2833] R13: 00007ffec517880f R14: 00007f0018c25300 R15: 0000000000022000 [ 726.696166][ T2830] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 726.713345][ T2840] FAULT_INJECTION: forcing a failure. [ 726.713345][ T2840] name failslab, interval 1, probability 0, space 0, times 0 [ 726.743664][ T2840] CPU: 1 PID: 2840 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 726.751988][ T2840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 726.762048][ T2840] Call Trace: [ 726.765322][ T2840] dump_stack+0x137/0x19d [ 726.769681][ T2840] should_fail+0x23c/0x250 [ 726.774093][ T2840] __should_failslab+0x81/0x90 [ 726.778886][ T2840] ? selinux_key_alloc+0x35/0xd0 [ 726.780665][ T2830] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 726.783813][ T2840] should_failslab+0x5/0x20 [ 726.791817][ T2830] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 [ 726.796291][ T2840] kmem_cache_alloc_trace+0x49/0x320 [ 726.796317][ T2840] selinux_key_alloc+0x35/0xd0 [ 726.817314][ T2840] security_key_alloc+0x45/0x90 [ 726.822170][ T2840] key_alloc+0x694/0xbe0 [ 726.826456][ T2840] request_key_and_link+0x403/0xca0 [ 726.831695][ T2840] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 726.838076][ T2840] ? keyring_search_rcu+0x180/0x180 [ 726.843366][ T2840] __se_sys_request_key+0x1c4/0x280 [ 726.848664][ T2840] ? fput+0x2d/0x130 12:25:55 executing program 4 (fault-call:0 fault-nth:4): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 726.852553][ T2840] __x64_sys_request_key+0x51/0x60 [ 726.857650][ T2840] do_syscall_64+0x34/0x50 [ 726.862055][ T2840] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 726.867950][ T2840] RIP: 0033:0x4665f9 [ 726.871871][ T2840] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 726.891464][ T2840] RSP: 002b:00007f7099b78188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 726.899878][ T2840] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 726.907847][ T2840] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 726.915820][ T2840] RBP: 00007f7099b781d0 R08: 0000000000000000 R09: 0000000000000000 [ 726.923790][ T2840] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 726.931766][ T2840] R13: 00007fffdc0f2e8f R14: 00007f7099b78300 R15: 0000000000022000 [ 726.936012][ T2830] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 12:25:55 executing program 0 (fault-call:0 fault-nth:10): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:55 executing program 1 (fault-call:0 fault-nth:9): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:55 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x4}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 726.947777][ T2830] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 726.963299][ T2830] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 726.971395][ T2830] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:25:55 executing program 5: r0 = getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)={0x0, r0}) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x2, &(0x7f00000005c0)={0x0}) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x7) sched_setattr(0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 727.013485][ T2848] FAULT_INJECTION: forcing a failure. [ 727.013485][ T2848] name failslab, interval 1, probability 0, space 0, times 0 [ 727.026151][ T2848] CPU: 0 PID: 2848 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 727.032784][ T2852] FAULT_INJECTION: forcing a failure. [ 727.032784][ T2852] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 727.034481][ T2848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 727.034493][ T2848] Call Trace: [ 727.034500][ T2848] dump_stack+0x137/0x19d [ 727.065100][ T2848] should_fail+0x23c/0x250 [ 727.069592][ T2848] __should_failslab+0x81/0x90 [ 727.074421][ T2848] ? assoc_array_insert+0x70/0x1730 [ 727.079603][ T2848] should_failslab+0x5/0x20 [ 727.084107][ T2848] kmem_cache_alloc_trace+0x49/0x320 [ 727.089375][ T2848] assoc_array_insert+0x70/0x1730 [ 727.094380][ T2848] ? __down_write_common+0x45/0x890 [ 727.099591][ T2848] ? key_alloc+0xa40/0xbe0 [ 727.104029][ T2848] __key_link_begin+0x96/0x140 [ 727.108779][ T2848] request_key_and_link+0x488/0xca0 [ 727.113959][ T2848] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 727.120186][ T2848] ? keyring_search_rcu+0x180/0x180 [ 727.125374][ T2848] __se_sys_request_key+0x1c4/0x280 [ 727.130646][ T2848] ? fput+0x2d/0x130 [ 727.134528][ T2848] __x64_sys_request_key+0x51/0x60 [ 727.139620][ T2848] do_syscall_64+0x34/0x50 [ 727.144137][ T2848] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 727.150092][ T2848] RIP: 0033:0x4665f9 [ 727.153972][ T2848] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 727.173576][ T2848] RSP: 002b:00007f7099b78188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 727.181969][ T2848] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 727.189923][ T2848] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 727.197876][ T2848] RBP: 00007f7099b781d0 R08: 0000000000000000 R09: 0000000000000000 [ 727.205831][ T2848] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 727.213786][ T2848] R13: 00007fffdc0f2e8f R14: 00007f7099b78300 R15: 0000000000022000 [ 727.221742][ T2852] CPU: 1 PID: 2852 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 727.230102][ T2852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 727.240155][ T2852] Call Trace: [ 727.243428][ T2852] dump_stack+0x137/0x19d [ 727.247763][ T2852] should_fail+0x23c/0x250 [ 727.252177][ T2852] should_fail_usercopy+0x16/0x20 [ 727.257194][ T2852] _copy_from_user+0x1c/0xd0 [ 727.261844][ T2852] strndup_user+0xb0/0x120 [ 727.263947][ T2850] FAULT_INJECTION: forcing a failure. [ 727.263947][ T2850] name failslab, interval 1, probability 0, space 0, times 0 [ 727.266271][ T2852] __se_sys_request_key+0x104/0x280 [ 727.266293][ T2852] ? fput+0x2d/0x130 [ 727.289053][ T2852] __x64_sys_request_key+0x51/0x60 [ 727.294239][ T2852] do_syscall_64+0x34/0x50 [ 727.298649][ T2852] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 727.304617][ T2852] RIP: 0033:0x4665f9 [ 727.308497][ T2852] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 727.328087][ T2852] RSP: 002b:00007fdd9a492188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 727.336559][ T2852] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 727.344512][ T2852] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 727.352481][ T2852] RBP: 00007fdd9a4921d0 R08: 0000000000000000 R09: 0000000000000000 12:25:55 executing program 4 (fault-call:0 fault-nth:5): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 727.360552][ T2852] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 727.368505][ T2852] R13: 00007ffd8a43ae3f R14: 00007fdd9a492300 R15: 0000000000022000 [ 727.376464][ T2850] CPU: 0 PID: 2850 Comm: syz-executor.0 Not tainted 5.12.0-syzkaller #0 [ 727.384794][ T2850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 727.395021][ T2850] Call Trace: [ 727.398298][ T2850] dump_stack+0x137/0x19d [ 727.402634][ T2850] should_fail+0x23c/0x250 [ 727.407082][ T2850] __should_failslab+0x81/0x90 [ 727.409999][ T2859] FAULT_INJECTION: forcing a failure. [ 727.409999][ T2859] name failslab, interval 1, probability 0, space 0, times 0 [ 727.411940][ T2850] ? request_key_auth_new+0x7e/0x4f0 [ 727.411960][ T2850] should_failslab+0x5/0x20 [ 727.411982][ T2850] kmem_cache_alloc_trace+0x49/0x320 [ 727.439540][ T2850] ? call_rcu+0x250/0x660 [ 727.443858][ T2850] request_key_auth_new+0x7e/0x4f0 [ 727.449078][ T2850] ? up_write+0x25/0xc0 [ 727.453217][ T2850] ? assoc_array_apply_edit+0x64b/0x660 [ 727.458744][ T2850] ? refcount_dec_and_lock+0xea/0x190 [ 727.464147][ T2850] request_key_and_link+0x7a3/0xca0 [ 727.469379][ T2850] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 727.475630][ T2850] ? keyring_search_rcu+0x180/0x180 [ 727.480819][ T2850] __se_sys_request_key+0x1c4/0x280 [ 727.486062][ T2850] ? fput+0x2d/0x130 [ 727.489945][ T2850] __x64_sys_request_key+0x51/0x60 [ 727.495039][ T2850] do_syscall_64+0x34/0x50 [ 727.499439][ T2850] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 727.505337][ T2850] RIP: 0033:0x4665f9 [ 727.509212][ T2850] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 727.528802][ T2850] RSP: 002b:00007f0018c25188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 727.537369][ T2850] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 727.545353][ T2850] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 727.553307][ T2850] RBP: 00007f0018c251d0 R08: 0000000000000000 R09: 0000000000000000 [ 727.561260][ T2850] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 727.569300][ T2850] R13: 00007ffec517880f R14: 00007f0018c25300 R15: 0000000000022000 [ 727.577256][ T2859] CPU: 1 PID: 2859 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 727.585589][ T2859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 727.595673][ T2859] Call Trace: [ 727.598962][ T2859] dump_stack+0x137/0x19d [ 727.603290][ T2859] should_fail+0x23c/0x250 [ 727.607710][ T2859] __should_failslab+0x81/0x90 [ 727.612579][ T2859] ? asymmetric_key_hex_to_key_id+0x59/0xd0 [ 727.618480][ T2859] should_failslab+0x5/0x20 [ 727.621680][ T2862] FAULT_INJECTION: forcing a failure. [ 727.621680][ T2862] name failslab, interval 1, probability 0, space 0, times 0 [ 727.623004][ T2859] __kmalloc+0x66/0x360 [ 727.623027][ T2859] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 727.645930][ T2859] asymmetric_key_hex_to_key_id+0x59/0xd0 [ 727.651641][ T2859] asymmetric_key_match_preparse+0x117/0x190 [ 727.657629][ T2859] request_key_and_link+0x113/0xca0 [ 727.662809][ T2859] ? restrict_link_reject+0x10/0x10 [ 727.668038][ T2859] ? strcmp+0x23/0x50 [ 727.672000][ T2859] __se_sys_request_key+0x1c4/0x280 [ 727.677188][ T2859] ? fput+0x2d/0x130 [ 727.681130][ T2859] __x64_sys_request_key+0x51/0x60 [ 727.686224][ T2859] do_syscall_64+0x34/0x50 [ 727.690629][ T2859] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 727.696513][ T2859] RIP: 0033:0x4665f9 [ 727.700387][ T2859] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 727.719985][ T2859] RSP: 002b:00007fdd9a492188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 727.728388][ T2859] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 727.736345][ T2859] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 727.744302][ T2859] RBP: 00007fdd9a4921d0 R08: 0000000000000000 R09: 0000000000000000 [ 727.752257][ T2859] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 12:25:56 executing program 1 (fault-call:0 fault-nth:10): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:56 executing program 0 (fault-call:0 fault-nth:11): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:56 executing program 4 (fault-call:0 fault-nth:6): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 727.760228][ T2859] R13: 00007ffd8a43ae3f R14: 00007fdd9a492300 R15: 0000000000022000 [ 727.768188][ T2862] CPU: 0 PID: 2862 Comm: syz-executor.0 Not tainted 5.12.0-syzkaller #0 [ 727.776544][ T2862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 727.786592][ T2862] Call Trace: [ 727.789867][ T2862] dump_stack+0x137/0x19d [ 727.794273][ T2862] should_fail+0x23c/0x250 [ 727.798684][ T2862] __should_failslab+0x81/0x90 [ 727.803461][ T2862] ? request_key_auth_new+0x9f/0x4f0 [ 727.803742][ T2863] FAULT_INJECTION: forcing a failure. [ 727.803742][ T2863] name failslab, interval 1, probability 0, space 0, times 0 [ 727.808827][ T2862] should_failslab+0x5/0x20 [ 727.825899][ T2862] __kmalloc_track_caller+0x64/0x360 [ 727.831179][ T2862] ? kmem_cache_alloc_trace+0x1c1/0x320 [ 727.836783][ T2862] kmemdup+0x21/0x50 [ 727.840668][ T2862] request_key_auth_new+0x9f/0x4f0 [ 727.845796][ T2862] ? up_write+0x25/0xc0 [ 727.849947][ T2862] ? assoc_array_apply_edit+0x64b/0x660 [ 727.855527][ T2862] ? refcount_dec_and_lock+0xea/0x190 [ 727.860969][ T2862] request_key_and_link+0x7a3/0xca0 [ 727.866152][ T2862] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 727.872485][ T2862] ? keyring_search_rcu+0x180/0x180 [ 727.877773][ T2862] __se_sys_request_key+0x1c4/0x280 [ 727.882952][ T2862] ? fput+0x2d/0x130 [ 727.886836][ T2862] __x64_sys_request_key+0x51/0x60 [ 727.891928][ T2862] do_syscall_64+0x34/0x50 [ 727.896514][ T2862] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 727.902439][ T2862] RIP: 0033:0x4665f9 [ 727.906330][ T2862] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 727.926014][ T2862] RSP: 002b:00007f0018c25188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 727.934412][ T2862] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 727.942462][ T2862] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 727.950530][ T2862] RBP: 00007f0018c251d0 R08: 0000000000000000 R09: 0000000000000000 [ 727.958492][ T2862] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 727.966451][ T2862] R13: 00007ffec517880f R14: 00007f0018c25300 R15: 0000000000022000 [ 727.974483][ T2863] CPU: 1 PID: 2863 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 727.982817][ T2863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 727.992881][ T2863] Call Trace: [ 727.996152][ T2863] dump_stack+0x137/0x19d [ 728.000469][ T2863] should_fail+0x23c/0x250 [ 728.004870][ T2863] __should_failslab+0x81/0x90 [ 728.009704][ T2863] ? request_key_auth_new+0x7e/0x4f0 [ 728.014973][ T2863] should_failslab+0x5/0x20 [ 728.019459][ T2863] kmem_cache_alloc_trace+0x49/0x320 [ 728.024793][ T2863] ? call_rcu+0x250/0x660 [ 728.029109][ T2863] request_key_auth_new+0x7e/0x4f0 [ 728.034275][ T2863] ? up_write+0x25/0xc0 [ 728.038432][ T2863] ? assoc_array_apply_edit+0x64b/0x660 [ 728.044026][ T2863] ? refcount_dec_and_lock+0xea/0x190 [ 728.049382][ T2863] request_key_and_link+0x7a3/0xca0 [ 728.054563][ T2863] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 728.060789][ T2863] ? keyring_search_rcu+0x180/0x180 [ 728.065974][ T2863] __se_sys_request_key+0x1c4/0x280 [ 728.071234][ T2863] ? fput+0x2d/0x130 [ 728.075114][ T2863] __x64_sys_request_key+0x51/0x60 [ 728.080217][ T2863] do_syscall_64+0x34/0x50 [ 728.084796][ T2863] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 728.090675][ T2863] RIP: 0033:0x4665f9 [ 728.094560][ T2863] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 12:25:56 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x5}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:56 executing program 0 (fault-call:0 fault-nth:12): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 728.114165][ T2863] RSP: 002b:00007f7099b78188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 728.122561][ T2863] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 728.130638][ T2863] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 728.138613][ T2863] RBP: 00007f7099b781d0 R08: 0000000000000000 R09: 0000000000000000 [ 728.146567][ T2863] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 728.154520][ T2863] R13: 00007fffdc0f2e8f R14: 00007f7099b78300 R15: 0000000000022000 12:25:56 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0xfcfd, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:56 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x6}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:56 executing program 5: r0 = getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)={0x0, r0}) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x2, &(0x7f00000005c0)={0x0}) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x7) sched_setattr(0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:25:56 executing program 1 (fault-call:0 fault-nth:11): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 728.244977][ T2876] FAULT_INJECTION: forcing a failure. [ 728.244977][ T2876] name failslab, interval 1, probability 0, space 0, times 0 [ 728.253352][ T2880] FAULT_INJECTION: forcing a failure. [ 728.253352][ T2880] name failslab, interval 1, probability 0, space 0, times 0 [ 728.257628][ T2876] CPU: 1 PID: 2876 Comm: syz-executor.0 Not tainted 5.12.0-syzkaller #0 [ 728.278503][ T2876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 728.288545][ T2876] Call Trace: [ 728.291810][ T2876] dump_stack+0x137/0x19d [ 728.296123][ T2876] should_fail+0x23c/0x250 [ 728.300519][ T2876] ? key_alloc+0x2aa/0xbe0 [ 728.304923][ T2876] __should_failslab+0x81/0x90 [ 728.309675][ T2876] should_failslab+0x5/0x20 [ 728.314161][ T2876] kmem_cache_alloc+0x46/0x300 [ 728.318907][ T2876] key_alloc+0x2aa/0xbe0 [ 728.323244][ T2876] request_key_auth_new+0x38c/0x4f0 [ 728.328428][ T2876] ? assoc_array_apply_edit+0x590/0x660 [ 728.333957][ T2876] ? refcount_dec_and_lock+0xea/0x190 [ 728.339488][ T2876] request_key_and_link+0x7a3/0xca0 [ 728.344673][ T2876] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 728.351047][ T2876] ? keyring_search_rcu+0x180/0x180 [ 728.356234][ T2876] __se_sys_request_key+0x1c4/0x280 [ 728.361444][ T2876] ? fput+0x2d/0x130 [ 728.365349][ T2876] __x64_sys_request_key+0x51/0x60 [ 728.370460][ T2876] do_syscall_64+0x34/0x50 [ 728.374956][ T2876] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 728.380913][ T2876] RIP: 0033:0x4665f9 [ 728.384788][ T2876] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 728.404526][ T2876] RSP: 002b:00007f0018c25188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 728.413000][ T2876] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 728.420956][ T2876] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 728.428912][ T2876] RBP: 00007f0018c251d0 R08: 0000000000000000 R09: 0000000000000000 [ 728.436863][ T2876] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 728.444817][ T2876] R13: 00007ffec517880f R14: 00007f0018c25300 R15: 0000000000022000 [ 728.452771][ T2880] CPU: 0 PID: 2880 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 728.461701][ T2880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 728.471776][ T2880] Call Trace: [ 728.475043][ T2880] dump_stack+0x137/0x19d [ 728.479434][ T2880] should_fail+0x23c/0x250 [ 728.483835][ T2880] __should_failslab+0x81/0x90 [ 728.488602][ T2880] ? request_key_auth_new+0x9f/0x4f0 [ 728.493873][ T2880] should_failslab+0x5/0x20 [ 728.498363][ T2880] __kmalloc_track_caller+0x64/0x360 [ 728.503634][ T2880] ? kmem_cache_alloc_trace+0x1c1/0x320 [ 728.509163][ T2880] kmemdup+0x21/0x50 [ 728.513131][ T2880] request_key_auth_new+0x9f/0x4f0 [ 728.518226][ T2880] ? up_write+0x25/0xc0 [ 728.522434][ T2880] ? assoc_array_apply_edit+0x64b/0x660 [ 728.527993][ T2880] ? refcount_dec_and_lock+0xea/0x190 [ 728.533348][ T2880] request_key_and_link+0x7a3/0xca0 [ 728.538564][ T2880] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 728.544807][ T2880] ? keyring_search_rcu+0x180/0x180 [ 728.549992][ T2880] __se_sys_request_key+0x1c4/0x280 [ 728.555172][ T2880] ? fput+0x2d/0x130 [ 728.559084][ T2880] __x64_sys_request_key+0x51/0x60 [ 728.564176][ T2880] do_syscall_64+0x34/0x50 [ 728.568579][ T2880] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 728.576194][ T2880] RIP: 0033:0x4665f9 [ 728.580068][ T2880] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 728.599658][ T2880] RSP: 002b:00007f7099b78188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 728.608051][ T2880] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 728.616003][ T2880] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 728.623954][ T2880] RBP: 00007f7099b781d0 R08: 0000000000000000 R09: 0000000000000000 [ 728.631921][ T2880] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 12:25:57 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x7}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:57 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0xfdef, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:57 executing program 0 (fault-call:0 fault-nth:13): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 728.639875][ T2880] R13: 00007fffdc0f2e8f R14: 00007f7099b78300 R15: 0000000000022000 12:25:57 executing program 1 (fault-call:0 fault-nth:12): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 728.672309][ T2885] FAULT_INJECTION: forcing a failure. [ 728.672309][ T2885] name failslab, interval 1, probability 0, space 0, times 0 [ 728.685002][ T2885] CPU: 0 PID: 2885 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 728.693329][ T2885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 728.703480][ T2885] Call Trace: [ 728.706740][ T2885] dump_stack+0x137/0x19d [ 728.711052][ T2885] should_fail+0x23c/0x250 [ 728.715632][ T2885] ? key_alloc+0x2aa/0xbe0 [ 728.720040][ T2885] __should_failslab+0x81/0x90 [ 728.724805][ T2885] should_failslab+0x5/0x20 [ 728.729309][ T2885] kmem_cache_alloc+0x46/0x300 [ 728.734053][ T2885] key_alloc+0x2aa/0xbe0 [ 728.738280][ T2885] request_key_and_link+0x403/0xca0 [ 728.743536][ T2885] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 728.749757][ T2885] ? keyring_search_rcu+0x180/0x180 [ 728.754971][ T2885] __se_sys_request_key+0x1c4/0x280 [ 728.760145][ T2885] ? fput+0x2d/0x130 [ 728.764167][ T2885] __x64_sys_request_key+0x51/0x60 [ 728.769344][ T2885] do_syscall_64+0x34/0x50 [ 728.773748][ T2885] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 728.779654][ T2885] RIP: 0033:0x4665f9 [ 728.783524][ T2885] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 728.803134][ T2885] RSP: 002b:00007fdd9a492188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 728.811555][ T2885] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 12:25:57 executing program 4 (fault-call:0 fault-nth:7): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 728.819520][ T2885] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 728.827485][ T2885] RBP: 00007fdd9a4921d0 R08: 0000000000000000 R09: 0000000000000000 [ 728.835454][ T2885] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 728.843407][ T2885] R13: 00007ffd8a43ae3f R14: 00007fdd9a492300 R15: 0000000000022000 [ 728.968249][ T2889] FAULT_INJECTION: forcing a failure. [ 728.968249][ T2889] name failslab, interval 1, probability 0, space 0, times 0 [ 728.981182][ T2889] CPU: 0 PID: 2889 Comm: syz-executor.0 Not tainted 5.12.0-syzkaller #0 [ 728.989591][ T2889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 728.999756][ T2889] Call Trace: [ 729.003026][ T2889] dump_stack+0x137/0x19d [ 729.007454][ T2889] should_fail+0x23c/0x250 [ 729.011864][ T2889] __should_failslab+0x81/0x90 [ 729.016620][ T2889] ? key_alloc+0x2e2/0xbe0 [ 729.021101][ T2889] should_failslab+0x5/0x20 [ 729.025596][ T2889] __kmalloc_track_caller+0x64/0x360 [ 729.030877][ T2889] ? key_alloc+0x2aa/0xbe0 [ 729.035466][ T2889] kmemdup+0x21/0x50 [ 729.039351][ T2889] key_alloc+0x2e2/0xbe0 [ 729.043594][ T2889] request_key_auth_new+0x38c/0x4f0 [ 729.048786][ T2889] ? assoc_array_apply_edit+0x590/0x660 [ 729.054331][ T2889] ? refcount_dec_and_lock+0xea/0x190 [ 729.059694][ T2889] request_key_and_link+0x7a3/0xca0 [ 729.064895][ T2889] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 729.071133][ T2889] ? keyring_search_rcu+0x180/0x180 [ 729.076327][ T2889] __se_sys_request_key+0x1c4/0x280 [ 729.081570][ T2889] ? fput+0x2d/0x130 [ 729.085465][ T2889] __x64_sys_request_key+0x51/0x60 [ 729.090568][ T2889] do_syscall_64+0x34/0x50 [ 729.095007][ T2889] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 729.100924][ T2889] RIP: 0033:0x4665f9 [ 729.104806][ T2889] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 729.120251][ T2874] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 729.124411][ T2889] RSP: 002b:00007f0018c25188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 729.124434][ T2889] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 729.132414][ T2874] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 729.132823][ T2874] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 729.140887][ T2889] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 729.149008][ T2874] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 [ 729.159984][ T2889] RBP: 00007f0018c251d0 R08: 0000000000000000 R09: 0000000000000000 [ 729.159999][ T2889] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 729.203173][ T2889] R13: 00007ffec517880f R14: 00007f0018c25300 R15: 0000000000022000 [ 729.218446][ T2894] FAULT_INJECTION: forcing a failure. [ 729.218446][ T2894] name failslab, interval 1, probability 0, space 0, times 0 [ 729.231282][ T2894] CPU: 0 PID: 2894 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 729.236665][ T2874] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 729.239606][ T2894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 729.239619][ T2894] Call Trace: [ 729.239627][ T2894] dump_stack+0x137/0x19d [ 729.247597][ T2874] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 729.257637][ T2894] should_fail+0x23c/0x250 [ 729.257657][ T2894] ? key_alloc+0x2aa/0xbe0 [ 729.261765][ T2874] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 729.265224][ T2894] __should_failslab+0x81/0x90 [ 729.276255][ T2874] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 [ 729.280629][ T2894] should_failslab+0x5/0x20 [ 729.294958][ T2900] FAULT_INJECTION: forcing a failure. [ 729.294958][ T2900] name failslab, interval 1, probability 0, space 0, times 0 [ 729.297717][ T2894] kmem_cache_alloc+0x46/0x300 [ 729.330508][ T2894] key_alloc+0x2aa/0xbe0 [ 729.334777][ T2894] request_key_auth_new+0x38c/0x4f0 [ 729.339961][ T2894] ? assoc_array_apply_edit+0x590/0x660 [ 729.345513][ T2894] ? refcount_dec_and_lock+0xea/0x190 [ 729.350884][ T2894] request_key_and_link+0x7a3/0xca0 [ 729.356065][ T2894] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 729.362291][ T2894] ? keyring_search_rcu+0x180/0x180 [ 729.367552][ T2894] __se_sys_request_key+0x1c4/0x280 [ 729.372735][ T2894] ? fput+0x2d/0x130 [ 729.376645][ T2894] __x64_sys_request_key+0x51/0x60 [ 729.381750][ T2894] do_syscall_64+0x34/0x50 [ 729.386183][ T2894] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 729.392064][ T2894] RIP: 0033:0x4665f9 [ 729.395941][ T2894] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 12:25:57 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x8}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 729.415628][ T2894] RSP: 002b:00007f7099b78188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 729.424023][ T2894] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 729.431977][ T2894] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 729.439990][ T2894] RBP: 00007f7099b781d0 R08: 0000000000000000 R09: 0000000000000000 [ 729.447943][ T2894] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 729.455896][ T2894] R13: 00007fffdc0f2e8f R14: 00007f7099b78300 R15: 0000000000022000 12:25:57 executing program 1 (fault-call:0 fault-nth:13): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:57 executing program 0 (fault-call:0 fault-nth:14): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 729.463921][ T2900] CPU: 1 PID: 2900 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 729.472256][ T2900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 729.482395][ T2900] Call Trace: [ 729.485671][ T2900] dump_stack+0x137/0x19d [ 729.489994][ T2900] should_fail+0x23c/0x250 [ 729.494425][ T2900] __should_failslab+0x81/0x90 [ 729.499218][ T2900] ? key_alloc+0x2e2/0xbe0 [ 729.503645][ T2900] should_failslab+0x5/0x20 [ 729.508258][ T2900] __kmalloc_track_caller+0x64/0x360 [ 729.513569][ T2900] ? key_alloc+0x2aa/0xbe0 [ 729.517992][ T2900] kmemdup+0x21/0x50 [ 729.521883][ T2900] key_alloc+0x2e2/0xbe0 [ 729.526149][ T2900] request_key_and_link+0x403/0xca0 [ 729.531414][ T2900] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 729.537780][ T2900] ? keyring_search_rcu+0x180/0x180 [ 729.542985][ T2900] __se_sys_request_key+0x1c4/0x280 [ 729.548253][ T2900] ? fput+0x2d/0x130 [ 729.552148][ T2900] __x64_sys_request_key+0x51/0x60 [ 729.557246][ T2900] do_syscall_64+0x34/0x50 [ 729.561646][ T2900] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 729.567634][ T2900] RIP: 0033:0x4665f9 [ 729.571519][ T2900] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 729.591109][ T2900] RSP: 002b:00007fdd9a492188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 729.600177][ T2900] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 729.608147][ T2900] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 729.616131][ T2900] RBP: 00007fdd9a4921d0 R08: 0000000000000000 R09: 0000000000000000 [ 729.624146][ T2900] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 729.632099][ T2900] R13: 00007ffd8a43ae3f R14: 00007fdd9a492300 R15: 0000000000022000 [ 729.641533][ T2904] FAULT_INJECTION: forcing a failure. [ 729.641533][ T2904] name failslab, interval 1, probability 0, space 0, times 0 [ 729.645431][ T2905] FAULT_INJECTION: forcing a failure. [ 729.645431][ T2905] name failslab, interval 1, probability 0, space 0, times 0 [ 729.654206][ T2904] CPU: 0 PID: 2904 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 729.675060][ T2904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 729.685100][ T2904] Call Trace: [ 729.688362][ T2904] dump_stack+0x137/0x19d [ 729.692692][ T2904] should_fail+0x23c/0x250 [ 729.697104][ T2904] __should_failslab+0x81/0x90 [ 729.701850][ T2904] ? key_alloc+0x2e2/0xbe0 [ 729.706319][ T2904] should_failslab+0x5/0x20 [ 729.710880][ T2904] __kmalloc_track_caller+0x64/0x360 [ 729.716146][ T2904] ? key_alloc+0x2aa/0xbe0 [ 729.720672][ T2904] kmemdup+0x21/0x50 [ 729.724567][ T2904] key_alloc+0x2e2/0xbe0 [ 729.728793][ T2904] request_key_auth_new+0x38c/0x4f0 [ 729.734008][ T2904] ? refcount_dec_and_lock+0xea/0x190 [ 729.739391][ T2904] request_key_and_link+0x7a3/0xca0 [ 729.744592][ T2904] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 729.750885][ T2904] ? keyring_search_rcu+0x180/0x180 [ 729.756109][ T2904] __se_sys_request_key+0x1c4/0x280 [ 729.761302][ T2904] ? fput+0x2d/0x130 [ 729.765243][ T2904] __x64_sys_request_key+0x51/0x60 [ 729.770476][ T2904] do_syscall_64+0x34/0x50 [ 729.774888][ T2904] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 729.780846][ T2904] RIP: 0033:0x4665f9 [ 729.784739][ T2904] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 729.804348][ T2904] RSP: 002b:00007f7099b78188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 729.812749][ T2904] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 729.820757][ T2904] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 729.828711][ T2904] RBP: 00007f7099b781d0 R08: 0000000000000000 R09: 0000000000000000 [ 729.836663][ T2904] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 729.844621][ T2904] R13: 00007fffdc0f2e8f R14: 00007f7099b78300 R15: 0000000000022000 [ 729.852602][ T2905] CPU: 1 PID: 2905 Comm: syz-executor.0 Not tainted 5.12.0-syzkaller #0 [ 729.860956][ T2905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 12:25:58 executing program 5: r0 = getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)={0x0, r0}) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x2, &(0x7f00000005c0)={0x0}) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x7) sched_setattr(0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:25:58 executing program 1 (fault-call:0 fault-nth:14): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:58 executing program 4 (fault-call:0 fault-nth:8): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 729.871005][ T2905] Call Trace: [ 729.874277][ T2905] dump_stack+0x137/0x19d [ 729.878603][ T2905] should_fail+0x23c/0x250 [ 729.883019][ T2905] __should_failslab+0x81/0x90 [ 729.887787][ T2905] ? selinux_key_alloc+0x35/0xd0 [ 729.892721][ T2905] should_failslab+0x5/0x20 [ 729.897257][ T2905] kmem_cache_alloc_trace+0x49/0x320 [ 729.902546][ T2905] selinux_key_alloc+0x35/0xd0 [ 729.907313][ T2905] security_key_alloc+0x45/0x90 [ 729.912159][ T2905] key_alloc+0x694/0xbe0 [ 729.916464][ T2905] request_key_auth_new+0x38c/0x4f0 [ 729.921663][ T2905] ? assoc_array_apply_edit+0x590/0x660 [ 729.927225][ T2905] ? refcount_dec_and_lock+0xea/0x190 [ 729.932640][ T2905] request_key_and_link+0x7a3/0xca0 [ 729.937842][ T2905] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 729.940805][ T2913] FAULT_INJECTION: forcing a failure. [ 729.940805][ T2913] name failslab, interval 1, probability 0, space 0, times 0 [ 729.944203][ T2905] ? keyring_search_rcu+0x180/0x180 [ 729.944231][ T2905] __se_sys_request_key+0x1c4/0x280 [ 729.967260][ T2905] ? fput+0x2d/0x130 [ 729.971149][ T2905] __x64_sys_request_key+0x51/0x60 [ 729.976372][ T2905] do_syscall_64+0x34/0x50 [ 729.980982][ T2905] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 729.986888][ T2905] RIP: 0033:0x4665f9 [ 729.990823][ T2905] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 730.010452][ T2905] RSP: 002b:00007f0018c25188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 730.018879][ T2905] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 730.026832][ T2905] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 730.034784][ T2905] RBP: 00007f0018c251d0 R08: 0000000000000000 R09: 0000000000000000 [ 730.042753][ T2905] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 730.050707][ T2905] R13: 00007ffec517880f R14: 00007f0018c25300 R15: 0000000000022000 [ 730.058665][ T2913] CPU: 0 PID: 2913 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 730.067065][ T2913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 730.077119][ T2913] Call Trace: [ 730.080388][ T2913] dump_stack+0x137/0x19d [ 730.084718][ T2913] should_fail+0x23c/0x250 [ 730.089141][ T2913] __should_failslab+0x81/0x90 [ 730.093908][ T2913] ? selinux_key_alloc+0x35/0xd0 [ 730.098838][ T2913] should_failslab+0x5/0x20 [ 730.103343][ T2913] kmem_cache_alloc_trace+0x49/0x320 [ 730.108630][ T2913] selinux_key_alloc+0x35/0xd0 [ 730.113388][ T2913] security_key_alloc+0x45/0x90 [ 730.118229][ T2913] key_alloc+0x694/0xbe0 [ 730.122461][ T2913] request_key_and_link+0x403/0xca0 [ 730.127663][ T2913] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 730.133895][ T2913] ? keyring_search_rcu+0x180/0x180 [ 730.139079][ T2913] __se_sys_request_key+0x1c4/0x280 [ 730.144258][ T2913] ? fput+0x2d/0x130 [ 730.148180][ T2913] __x64_sys_request_key+0x51/0x60 [ 730.153311][ T2913] do_syscall_64+0x34/0x50 [ 730.157730][ T2913] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 730.163758][ T2913] RIP: 0033:0x4665f9 [ 730.167632][ T2913] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 730.187242][ T2913] RSP: 002b:00007fdd9a492188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 730.195636][ T2913] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 730.203592][ T2913] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 730.211625][ T2913] RBP: 00007fdd9a4921d0 R08: 0000000000000000 R09: 0000000000000000 12:25:58 executing program 0 (fault-call:0 fault-nth:15): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 730.219581][ T2913] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 730.227545][ T2913] R13: 00007ffd8a43ae3f R14: 00007fdd9a492300 R15: 0000000000022000 [ 730.236285][ T2915] FAULT_INJECTION: forcing a failure. [ 730.236285][ T2915] name failslab, interval 1, probability 0, space 0, times 0 [ 730.249017][ T2915] CPU: 1 PID: 2915 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 730.257342][ T2915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 730.267389][ T2915] Call Trace: [ 730.270717][ T2915] dump_stack+0x137/0x19d [ 730.275050][ T2915] should_fail+0x23c/0x250 [ 730.279466][ T2915] __should_failslab+0x81/0x90 [ 730.284224][ T2915] ? selinux_key_alloc+0x35/0xd0 [ 730.288741][ T2917] FAULT_INJECTION: forcing a failure. [ 730.288741][ T2917] name failslab, interval 1, probability 0, space 0, times 0 [ 730.289158][ T2915] should_failslab+0x5/0x20 [ 730.306244][ T2915] kmem_cache_alloc_trace+0x49/0x320 [ 730.311524][ T2915] selinux_key_alloc+0x35/0xd0 [ 730.316294][ T2915] security_key_alloc+0x45/0x90 [ 730.321132][ T2915] key_alloc+0x694/0xbe0 [ 730.325362][ T2915] request_key_auth_new+0x38c/0x4f0 [ 730.330560][ T2915] ? assoc_array_apply_edit+0x590/0x660 [ 730.336089][ T2915] ? refcount_dec_and_lock+0xea/0x190 [ 730.341443][ T2915] request_key_and_link+0x7a3/0xca0 [ 730.346624][ T2915] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 730.353348][ T2915] ? keyring_search_rcu+0x180/0x180 [ 730.358600][ T2915] __se_sys_request_key+0x1c4/0x280 [ 730.363792][ T2915] ? fput+0x2d/0x130 [ 730.367679][ T2915] __x64_sys_request_key+0x51/0x60 [ 730.372771][ T2915] do_syscall_64+0x34/0x50 [ 730.377204][ T2915] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 730.383109][ T2915] RIP: 0033:0x4665f9 [ 730.386986][ T2915] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 730.406576][ T2915] RSP: 002b:00007f7099b78188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 730.414970][ T2915] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 730.422923][ T2915] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 730.430878][ T2915] RBP: 00007f7099b781d0 R08: 0000000000000000 R09: 0000000000000000 [ 730.438831][ T2915] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 730.446827][ T2915] R13: 00007fffdc0f2e8f R14: 00007f7099b78300 R15: 0000000000022000 [ 730.454803][ T2917] CPU: 0 PID: 2917 Comm: syz-executor.0 Not tainted 5.12.0-syzkaller #0 [ 730.463167][ T2917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 730.473212][ T2917] Call Trace: [ 730.476479][ T2917] dump_stack+0x137/0x19d [ 730.480843][ T2917] should_fail+0x23c/0x250 [ 730.485244][ T2917] ? key_alloc+0x2aa/0xbe0 [ 730.489647][ T2917] __should_failslab+0x81/0x90 [ 730.494436][ T2917] should_failslab+0x5/0x20 [ 730.499037][ T2917] kmem_cache_alloc+0x46/0x300 [ 730.503798][ T2917] key_alloc+0x2aa/0xbe0 [ 730.508025][ T2917] keyring_alloc+0x40/0xa0 [ 730.512429][ T2917] call_sbin_request_key+0x13e/0x600 [ 730.517710][ T2917] ? request_key_auth_free_preparse+0x5/0x10 [ 730.523674][ T2917] ? request_key_auth_new+0x3c8/0x4f0 [ 730.529057][ T2917] ? assoc_array_apply_edit+0x590/0x660 [ 730.534590][ T2917] ? refcount_dec_and_lock+0xea/0x190 [ 730.539956][ T2917] request_key_and_link+0x7f2/0xca0 [ 730.545168][ T2917] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 730.551465][ T2917] ? keyring_search_rcu+0x180/0x180 [ 730.556683][ T2917] __se_sys_request_key+0x1c4/0x280 [ 730.561863][ T2917] ? fput+0x2d/0x130 [ 730.565749][ T2917] __x64_sys_request_key+0x51/0x60 [ 730.570864][ T2917] do_syscall_64+0x34/0x50 [ 730.575264][ T2917] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 730.581244][ T2917] RIP: 0033:0x4665f9 [ 730.585118][ T2917] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 730.604888][ T2917] RSP: 002b:00007f0018c25188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 730.613283][ T2917] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 12:25:59 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x9}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:59 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0xfdfc, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:59 executing program 0 (fault-call:0 fault-nth:16): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:59 executing program 1 (fault-call:0 fault-nth:15): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:59 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0xa}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:25:59 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0xfdfe, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:25:59 executing program 4 (fault-call:0 fault-nth:9): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 730.621249][ T2917] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 730.629278][ T2917] RBP: 00007f0018c251d0 R08: 0000000000000000 R09: 0000000000000000 [ 730.637246][ T2917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 730.645198][ T2917] R13: 00007ffec517880f R14: 00007f0018c25300 R15: 0000000000022000 [ 730.873535][ T2908] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 730.881546][ T2908] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 730.892722][ T2908] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 730.900731][ T2908] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 [ 730.969306][ T2929] FAULT_INJECTION: forcing a failure. [ 730.969306][ T2929] name failslab, interval 1, probability 0, space 0, times 0 [ 730.974434][ T2931] FAULT_INJECTION: forcing a failure. [ 730.974434][ T2931] name failslab, interval 1, probability 0, space 0, times 0 [ 730.981953][ T2929] CPU: 1 PID: 2929 Comm: syz-executor.0 Not tainted 5.12.0-syzkaller #0 [ 731.002829][ T2929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 731.012888][ T2929] Call Trace: [ 731.016157][ T2929] dump_stack+0x137/0x19d [ 731.020533][ T2929] should_fail+0x23c/0x250 [ 731.024934][ T2929] __should_failslab+0x81/0x90 [ 731.029714][ T2929] ? key_alloc+0x2e2/0xbe0 [ 731.034118][ T2929] should_failslab+0x5/0x20 [ 731.038609][ T2929] __kmalloc_track_caller+0x64/0x360 [ 731.043876][ T2929] ? key_alloc+0x2aa/0xbe0 [ 731.048277][ T2929] kmemdup+0x21/0x50 [ 731.052157][ T2929] key_alloc+0x2e2/0xbe0 [ 731.056383][ T2929] keyring_alloc+0x40/0xa0 [ 731.060784][ T2929] call_sbin_request_key+0x13e/0x600 [ 731.066054][ T2929] ? request_key_auth_free_preparse+0x5/0x10 [ 731.072017][ T2929] ? request_key_auth_new+0x3c8/0x4f0 [ 731.077422][ T2929] ? assoc_array_apply_edit+0x590/0x660 [ 731.082953][ T2929] ? refcount_dec_and_lock+0xea/0x190 [ 731.088316][ T2929] request_key_and_link+0x7f2/0xca0 [ 731.093597][ T2929] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 731.099825][ T2929] ? keyring_search_rcu+0x180/0x180 [ 731.105009][ T2929] __se_sys_request_key+0x1c4/0x280 [ 731.110190][ T2929] ? fput+0x2d/0x130 [ 731.114077][ T2929] __x64_sys_request_key+0x51/0x60 [ 731.119167][ T2929] do_syscall_64+0x34/0x50 [ 731.123567][ T2929] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 731.129448][ T2929] RIP: 0033:0x4665f9 [ 731.133377][ T2929] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 731.152967][ T2929] RSP: 002b:00007f0018c25188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 731.161536][ T2929] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 731.169491][ T2929] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 731.177449][ T2929] RBP: 00007f0018c251d0 R08: 0000000000000000 R09: 0000000000000000 [ 731.185470][ T2929] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 731.193495][ T2929] R13: 00007ffec517880f R14: 00007f0018c25300 R15: 0000000000022000 [ 731.201477][ T2931] CPU: 0 PID: 2931 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 731.209824][ T2931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 731.215349][ T2908] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 731.219879][ T2931] Call Trace: [ 731.219888][ T2931] dump_stack+0x137/0x19d [ 731.227883][ T2908] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 731.231251][ T2931] should_fail+0x23c/0x250 [ 731.237451][ T2908] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 731.246544][ T2931] ? key_alloc+0x2aa/0xbe0 12:25:59 executing program 0 (fault-call:0 fault-nth:17): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 731.250971][ T2908] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 [ 731.258924][ T2931] __should_failslab+0x81/0x90 [ 731.258948][ T2931] should_failslab+0x5/0x20 [ 731.258988][ T2931] kmem_cache_alloc+0x46/0x300 [ 731.288385][ T2931] key_alloc+0x2aa/0xbe0 [ 731.292714][ T2931] keyring_alloc+0x40/0xa0 [ 731.297139][ T2931] call_sbin_request_key+0x13e/0x600 [ 731.297704][ T2937] FAULT_INJECTION: forcing a failure. [ 731.297704][ T2937] name failslab, interval 1, probability 0, space 0, times 0 [ 731.302436][ T2931] ? request_key_auth_free_preparse+0x5/0x10 [ 731.302462][ T2931] ? request_key_auth_new+0x3c8/0x4f0 [ 731.302509][ T2931] ? assoc_array_apply_edit+0x590/0x660 [ 731.331889][ T2931] ? refcount_dec_and_lock+0xea/0x190 [ 731.337297][ T2931] request_key_and_link+0x7f2/0xca0 [ 731.342481][ T2931] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 731.348782][ T2931] ? keyring_search_rcu+0x180/0x180 [ 731.353992][ T2931] __se_sys_request_key+0x1c4/0x280 [ 731.359175][ T2931] ? fput+0x2d/0x130 [ 731.363066][ T2931] __x64_sys_request_key+0x51/0x60 [ 731.368159][ T2931] do_syscall_64+0x34/0x50 [ 731.372560][ T2931] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 731.378464][ T2931] RIP: 0033:0x4665f9 [ 731.382377][ T2931] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 731.401969][ T2931] RSP: 002b:00007f7099b78188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 731.410416][ T2931] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 731.418375][ T2931] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 731.426327][ T2931] RBP: 00007f7099b781d0 R08: 0000000000000000 R09: 0000000000000000 [ 731.434279][ T2931] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 731.442232][ T2931] R13: 00007fffdc0f2e8f R14: 00007f7099b78300 R15: 0000000000022000 [ 731.450189][ T2937] CPU: 1 PID: 2937 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 731.458524][ T2937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 731.468617][ T2937] Call Trace: [ 731.471930][ T2937] dump_stack+0x137/0x19d [ 731.476254][ T2937] should_fail+0x23c/0x250 [ 731.480667][ T2937] __should_failslab+0x81/0x90 [ 731.485512][ T2937] ? assoc_array_insert+0x70/0x1730 [ 731.490706][ T2937] should_failslab+0x5/0x20 [ 731.495266][ T2937] kmem_cache_alloc_trace+0x49/0x320 [ 731.500677][ T2937] assoc_array_insert+0x70/0x1730 [ 731.505699][ T2937] ? __down_write_common+0x45/0x890 [ 731.510974][ T2937] ? key_alloc+0xa40/0xbe0 [ 731.515394][ T2937] __key_link_begin+0x96/0x140 [ 731.520166][ T2937] request_key_and_link+0x488/0xca0 [ 731.525346][ T2937] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 731.531589][ T2937] ? keyring_search_rcu+0x180/0x180 [ 731.536818][ T2937] __se_sys_request_key+0x1c4/0x280 [ 731.541995][ T2937] ? fput+0x2d/0x130 [ 731.545919][ T2937] __x64_sys_request_key+0x51/0x60 [ 731.551070][ T2937] do_syscall_64+0x34/0x50 [ 731.555470][ T2937] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 731.561357][ T2937] RIP: 0033:0x4665f9 [ 731.565299][ T2937] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 731.584906][ T2937] RSP: 002b:00007fdd9a492188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 731.593311][ T2937] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 731.601267][ T2937] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 731.609233][ T2937] RBP: 00007fdd9a4921d0 R08: 0000000000000000 R09: 0000000000000000 [ 731.617258][ T2937] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 731.625216][ T2937] R13: 00007ffd8a43ae3f R14: 00007fdd9a492300 R15: 0000000000022000 [ 731.635170][ T2938] FAULT_INJECTION: forcing a failure. [ 731.635170][ T2938] name failslab, interval 1, probability 0, space 0, times 0 [ 731.647811][ T2938] CPU: 0 PID: 2938 Comm: syz-executor.0 Not tainted 5.12.0-syzkaller #0 [ 731.656144][ T2938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 731.666242][ T2938] Call Trace: 12:26:00 executing program 5: r0 = getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)={0x0, r0}) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x2, &(0x7f00000005c0)={0x0}) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x7) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:00 executing program 1 (fault-call:0 fault-nth:16): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:00 executing program 4 (fault-call:0 fault-nth:10): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:00 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0xb}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 731.669536][ T2938] dump_stack+0x137/0x19d [ 731.675367][ T2938] should_fail+0x23c/0x250 [ 731.679828][ T2938] __should_failslab+0x81/0x90 [ 731.684606][ T2938] ? selinux_key_alloc+0x35/0xd0 [ 731.689549][ T2938] should_failslab+0x5/0x20 [ 731.694065][ T2938] kmem_cache_alloc_trace+0x49/0x320 [ 731.694511][ T2943] FAULT_INJECTION: forcing a failure. [ 731.694511][ T2943] name failslab, interval 1, probability 0, space 0, times 0 [ 731.699433][ T2938] selinux_key_alloc+0x35/0xd0 [ 731.699475][ T2938] security_key_alloc+0x45/0x90 [ 731.721720][ T2938] key_alloc+0x694/0xbe0 [ 731.725963][ T2938] keyring_alloc+0x40/0xa0 [ 731.730372][ T2938] call_sbin_request_key+0x13e/0x600 [ 731.735642][ T2938] ? request_key_auth_free_preparse+0x5/0x10 [ 731.741611][ T2938] ? request_key_auth_new+0x3c8/0x4f0 [ 731.746968][ T2938] ? assoc_array_apply_edit+0x64b/0x660 [ 731.752498][ T2938] ? refcount_dec_and_lock+0xea/0x190 [ 731.757875][ T2938] request_key_and_link+0x7f2/0xca0 [ 731.763134][ T2938] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 731.769387][ T2938] ? keyring_search_rcu+0x180/0x180 [ 731.774614][ T2938] __se_sys_request_key+0x1c4/0x280 [ 731.779817][ T2938] ? fput+0x2d/0x130 [ 731.783752][ T2938] __x64_sys_request_key+0x51/0x60 [ 731.788849][ T2938] do_syscall_64+0x34/0x50 [ 731.793253][ T2938] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 731.799158][ T2938] RIP: 0033:0x4665f9 [ 731.803085][ T2938] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 731.822682][ T2938] RSP: 002b:00007f0018c25188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 731.831152][ T2938] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 731.839204][ T2938] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 731.847175][ T2938] RBP: 00007f0018c251d0 R08: 0000000000000000 R09: 0000000000000000 [ 731.855129][ T2938] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 731.863177][ T2938] R13: 00007ffec517880f R14: 00007f0018c25300 R15: 0000000000022000 [ 731.871197][ T2943] CPU: 1 PID: 2943 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 731.879531][ T2943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 731.889629][ T2943] Call Trace: [ 731.892906][ T2943] dump_stack+0x137/0x19d [ 731.897254][ T2943] should_fail+0x23c/0x250 [ 731.901678][ T2943] __should_failslab+0x81/0x90 [ 731.906495][ T2943] ? request_key_auth_new+0x7e/0x4f0 [ 731.911774][ T2943] should_failslab+0x5/0x20 [ 731.916270][ T2943] kmem_cache_alloc_trace+0x49/0x320 [ 731.921571][ T2943] ? call_rcu+0x250/0x660 [ 731.925913][ T2943] request_key_auth_new+0x7e/0x4f0 [ 731.931018][ T2943] ? up_write+0x25/0xc0 [ 731.935163][ T2943] ? assoc_array_apply_edit+0x64b/0x660 [ 731.940741][ T2943] ? refcount_dec_and_lock+0xea/0x190 [ 731.946207][ T2943] request_key_and_link+0x7a3/0xca0 [ 731.951395][ T2943] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 731.957636][ T2943] ? keyring_search_rcu+0x180/0x180 [ 731.962825][ T2943] __se_sys_request_key+0x1c4/0x280 [ 731.968102][ T2943] ? fput+0x2d/0x130 [ 731.972004][ T2943] __x64_sys_request_key+0x51/0x60 [ 731.977119][ T2943] do_syscall_64+0x34/0x50 [ 731.981538][ T2943] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 731.987419][ T2943] RIP: 0033:0x4665f9 [ 731.991293][ T2943] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 732.010962][ T2943] RSP: 002b:00007fdd9a492188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 732.019354][ T2943] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 732.027355][ T2943] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 732.035356][ T2943] RBP: 00007fdd9a4921d0 R08: 0000000000000000 R09: 0000000000000000 [ 732.043358][ T2943] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 732.051338][ T2943] R13: 00007ffd8a43ae3f R14: 00007fdd9a492300 R15: 0000000000022000 [ 732.073438][ T2950] FAULT_INJECTION: forcing a failure. [ 732.073438][ T2950] name failslab, interval 1, probability 0, space 0, times 0 [ 732.086106][ T2950] CPU: 0 PID: 2950 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 732.094431][ T2950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 732.104476][ T2950] Call Trace: [ 732.107745][ T2950] dump_stack+0x137/0x19d [ 732.112079][ T2950] should_fail+0x23c/0x250 [ 732.116595][ T2950] __should_failslab+0x81/0x90 [ 732.121344][ T2950] ? key_alloc+0x2e2/0xbe0 [ 732.125748][ T2950] should_failslab+0x5/0x20 [ 732.130234][ T2950] __kmalloc_track_caller+0x64/0x360 [ 732.135503][ T2950] ? key_alloc+0x2aa/0xbe0 [ 732.139987][ T2950] kmemdup+0x21/0x50 [ 732.143866][ T2950] key_alloc+0x2e2/0xbe0 [ 732.148094][ T2950] keyring_alloc+0x40/0xa0 [ 732.152513][ T2950] call_sbin_request_key+0x13e/0x600 [ 732.157860][ T2950] ? request_key_auth_free_preparse+0x5/0x10 [ 732.163823][ T2950] ? request_key_auth_new+0x3c8/0x4f0 [ 732.169192][ T2950] ? assoc_array_apply_edit+0x590/0x660 [ 732.174717][ T2950] ? refcount_dec_and_lock+0xea/0x190 [ 732.180071][ T2950] request_key_and_link+0x7f2/0xca0 [ 732.185251][ T2950] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 732.191476][ T2950] ? keyring_search_rcu+0x180/0x180 [ 732.196661][ T2950] __se_sys_request_key+0x1c4/0x280 [ 732.201919][ T2950] ? fput+0x2d/0x130 [ 732.205797][ T2950] __x64_sys_request_key+0x51/0x60 [ 732.210886][ T2950] do_syscall_64+0x34/0x50 [ 732.215365][ T2950] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 732.221292][ T2950] RIP: 0033:0x4665f9 [ 732.225169][ T2950] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 732.244813][ T2950] RSP: 002b:00007f7099b78188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 732.253209][ T2950] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 732.261178][ T2950] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 12:26:00 executing program 0 (fault-call:0 fault-nth:18): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:00 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0xfdff, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:00 executing program 1 (fault-call:0 fault-nth:17): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:00 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0xc}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:00 executing program 4 (fault-call:0 fault-nth:11): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 732.269130][ T2950] RBP: 00007f7099b781d0 R08: 0000000000000000 R09: 0000000000000000 [ 732.277081][ T2950] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 732.285032][ T2950] R13: 00007fffdc0f2e8f R14: 00007f7099b78300 R15: 0000000000022000 [ 732.420334][ T2941] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 732.428526][ T2941] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 732.439918][ T2941] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 732.447926][ T2941] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 [ 732.510537][ T2941] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 732.518616][ T2941] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 732.533105][ T2958] FAULT_INJECTION: forcing a failure. [ 732.533105][ T2958] name failslab, interval 1, probability 0, space 0, times 0 [ 732.533716][ T2961] FAULT_INJECTION: forcing a failure. [ 732.533716][ T2961] name failslab, interval 1, probability 0, space 0, times 0 [ 732.545784][ T2958] CPU: 1 PID: 2958 Comm: syz-executor.0 Not tainted 5.12.0-syzkaller #0 [ 732.566665][ T2958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 732.576761][ T2958] Call Trace: [ 732.580022][ T2958] dump_stack+0x137/0x19d [ 732.584354][ T2958] should_fail+0x23c/0x250 [ 732.588764][ T2958] __should_failslab+0x81/0x90 [ 732.593539][ T2958] ? assoc_array_insert+0x70/0x1730 [ 732.598718][ T2958] should_failslab+0x5/0x20 [ 732.603274][ T2958] kmem_cache_alloc_trace+0x49/0x320 [ 732.608540][ T2958] ? chacha_block_generic+0x25a/0x280 [ 732.613896][ T2958] assoc_array_insert+0x70/0x1730 [ 732.618949][ T2958] ? _raw_spin_unlock_irqrestore+0x27/0x40 [ 732.624802][ T2958] ? crng_backtrack_protect+0x280/0x290 [ 732.630518][ T2958] ? __down_write_common+0x45/0x890 [ 732.635750][ T2958] ? __list_add_valid+0x28/0x90 [ 732.640583][ T2958] ? keyring_instantiate+0x141/0x160 [ 732.646149][ T2958] ? __key_instantiate_and_link+0x26d/0x290 [ 732.652062][ T2958] __key_link_begin+0x96/0x140 [ 732.656813][ T2958] key_link+0xb7/0x3e0 [ 732.660903][ T2958] ? keyring_alloc+0x7e/0xa0 [ 732.665480][ T2958] call_sbin_request_key+0x1c1/0x600 [ 732.670772][ T2958] ? request_key_auth_new+0x3c8/0x4f0 [ 732.676130][ T2958] ? assoc_array_apply_edit+0x590/0x660 [ 732.681658][ T2958] ? refcount_dec_and_lock+0xea/0x190 [ 732.687056][ T2958] request_key_and_link+0x7f2/0xca0 [ 732.692433][ T2958] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 732.698723][ T2958] ? keyring_search_rcu+0x180/0x180 [ 732.703907][ T2958] __se_sys_request_key+0x1c4/0x280 [ 732.709086][ T2958] ? fput+0x2d/0x130 [ 732.713011][ T2958] __x64_sys_request_key+0x51/0x60 [ 732.718102][ T2958] do_syscall_64+0x34/0x50 [ 732.723200][ T2958] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 732.729087][ T2958] RIP: 0033:0x4665f9 [ 732.732980][ T2958] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 732.752574][ T2958] RSP: 002b:00007f0018c25188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 732.761070][ T2958] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 732.769054][ T2958] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 732.777190][ T2958] RBP: 00007f0018c251d0 R08: 0000000000000000 R09: 0000000000000000 [ 732.785155][ T2958] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 732.793110][ T2958] R13: 00007ffec517880f R14: 00007f0018c25300 R15: 0000000000022000 [ 732.801069][ T2961] CPU: 0 PID: 2961 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 732.809400][ T2961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 732.816695][ T2959] FAULT_INJECTION: forcing a failure. [ 732.816695][ T2959] name failslab, interval 1, probability 0, space 0, times 0 [ 732.819480][ T2961] Call Trace: [ 732.819488][ T2961] dump_stack+0x137/0x19d [ 732.839701][ T2961] should_fail+0x23c/0x250 [ 732.844104][ T2961] __should_failslab+0x81/0x90 [ 732.848856][ T2961] ? request_key_auth_new+0x9f/0x4f0 [ 732.854127][ T2961] should_failslab+0x5/0x20 [ 732.858614][ T2961] __kmalloc_track_caller+0x64/0x360 [ 732.863882][ T2961] ? kmem_cache_alloc_trace+0x1c1/0x320 [ 732.869409][ T2961] kmemdup+0x21/0x50 [ 732.873288][ T2961] request_key_auth_new+0x9f/0x4f0 [ 732.878389][ T2961] ? up_write+0x25/0xc0 [ 732.882531][ T2961] ? assoc_array_apply_edit+0x64b/0x660 [ 732.888171][ T2961] ? refcount_dec_and_lock+0xea/0x190 [ 732.893529][ T2961] request_key_and_link+0x7a3/0xca0 [ 732.898726][ T2961] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 732.904954][ T2961] ? keyring_search_rcu+0x180/0x180 [ 732.910139][ T2961] __se_sys_request_key+0x1c4/0x280 [ 732.915320][ T2961] ? fput+0x2d/0x130 [ 732.919201][ T2961] __x64_sys_request_key+0x51/0x60 [ 732.924292][ T2961] do_syscall_64+0x34/0x50 [ 732.928696][ T2961] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 732.934714][ T2961] RIP: 0033:0x4665f9 [ 732.938597][ T2961] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 732.958225][ T2961] RSP: 002b:00007fdd9a492188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 732.966626][ T2961] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 732.974666][ T2961] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 732.982657][ T2961] RBP: 00007fdd9a4921d0 R08: 0000000000000000 R09: 0000000000000000 [ 732.990754][ T2961] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 732.998708][ T2961] R13: 00007ffd8a43ae3f R14: 00007fdd9a492300 R15: 0000000000022000 [ 733.006748][ T2959] CPU: 1 PID: 2959 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 733.007756][ T2941] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 733.015112][ T2959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 733.015123][ T2959] Call Trace: [ 733.015131][ T2959] dump_stack+0x137/0x19d [ 733.023115][ T2941] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 [ 733.033126][ T2959] should_fail+0x23c/0x250 [ 733.033146][ T2959] __should_failslab+0x81/0x90 12:26:01 executing program 0 (fault-call:0 fault-nth:19): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:01 executing program 4 (fault-call:0 fault-nth:12): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 733.060838][ T2959] ? selinux_key_alloc+0x35/0xd0 [ 733.065792][ T2959] should_failslab+0x5/0x20 [ 733.070359][ T2959] kmem_cache_alloc_trace+0x49/0x320 [ 733.075709][ T2959] selinux_key_alloc+0x35/0xd0 [ 733.080661][ T2959] security_key_alloc+0x45/0x90 [ 733.085514][ T2959] key_alloc+0x694/0xbe0 [ 733.089759][ T2959] keyring_alloc+0x40/0xa0 [ 733.094183][ T2959] call_sbin_request_key+0x13e/0x600 [ 733.095597][ T2967] FAULT_INJECTION: forcing a failure. [ 733.095597][ T2967] name failslab, interval 1, probability 0, space 0, times 0 [ 733.099506][ T2959] ? request_key_auth_free_preparse+0x5/0x10 [ 733.118081][ T2959] ? request_key_auth_new+0x3c8/0x4f0 [ 733.123441][ T2959] ? assoc_array_apply_edit+0x590/0x660 [ 733.128974][ T2959] ? refcount_dec_and_lock+0xea/0x190 [ 733.134386][ T2959] request_key_and_link+0x7f2/0xca0 [ 733.139571][ T2959] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 733.145843][ T2959] ? keyring_search_rcu+0x180/0x180 [ 733.151069][ T2959] __se_sys_request_key+0x1c4/0x280 [ 733.156264][ T2959] ? fput+0x2d/0x130 [ 733.160146][ T2959] __x64_sys_request_key+0x51/0x60 [ 733.165236][ T2959] do_syscall_64+0x34/0x50 [ 733.169638][ T2959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 733.175614][ T2959] RIP: 0033:0x4665f9 [ 733.179489][ T2959] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 733.199078][ T2959] RSP: 002b:00007f7099b78188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 733.207472][ T2959] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 733.215430][ T2959] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 733.223383][ T2959] RBP: 00007f7099b781d0 R08: 0000000000000000 R09: 0000000000000000 [ 733.231354][ T2959] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 733.239316][ T2959] R13: 00007fffdc0f2e8f R14: 00007f7099b78300 R15: 0000000000022000 [ 733.247295][ T2967] CPU: 0 PID: 2967 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 733.255628][ T2967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 733.265683][ T2967] Call Trace: [ 733.268984][ T2967] dump_stack+0x137/0x19d [ 733.273307][ T2967] should_fail+0x23c/0x250 [ 733.277724][ T2967] ? key_alloc+0x2aa/0xbe0 [ 733.282140][ T2967] __should_failslab+0x81/0x90 [ 733.284728][ T2968] FAULT_INJECTION: forcing a failure. [ 733.284728][ T2968] name failslab, interval 1, probability 0, space 0, times 0 [ 733.287024][ T2967] should_failslab+0x5/0x20 [ 733.304085][ T2967] kmem_cache_alloc+0x46/0x300 [ 733.308838][ T2967] key_alloc+0x2aa/0xbe0 [ 733.313203][ T2967] request_key_auth_new+0x38c/0x4f0 [ 733.318389][ T2967] ? assoc_array_apply_edit+0x590/0x660 [ 733.323918][ T2967] ? refcount_dec_and_lock+0xea/0x190 [ 733.329274][ T2967] request_key_and_link+0x7a3/0xca0 [ 733.334456][ T2967] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 733.340684][ T2967] ? keyring_search_rcu+0x180/0x180 [ 733.345869][ T2967] __se_sys_request_key+0x1c4/0x280 [ 733.351048][ T2967] ? fput+0x2d/0x130 [ 733.354928][ T2967] __x64_sys_request_key+0x51/0x60 [ 733.360022][ T2967] do_syscall_64+0x34/0x50 [ 733.364424][ T2967] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 733.370353][ T2967] RIP: 0033:0x4665f9 [ 733.374305][ T2967] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 733.393936][ T2967] RSP: 002b:00007fdd9a492188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 733.402332][ T2967] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 12:26:01 executing program 1 (fault-call:0 fault-nth:18): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 733.410284][ T2967] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 733.418261][ T2967] RBP: 00007fdd9a4921d0 R08: 0000000000000000 R09: 0000000000000000 [ 733.426320][ T2967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 733.434276][ T2967] R13: 00007ffd8a43ae3f R14: 00007fdd9a492300 R15: 0000000000022000 [ 733.442231][ T2968] CPU: 1 PID: 2968 Comm: syz-executor.0 Not tainted 5.12.0-syzkaller #0 [ 733.450566][ T2968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 733.460631][ T2968] Call Trace: [ 733.461500][ T2970] FAULT_INJECTION: forcing a failure. [ 733.461500][ T2970] name failslab, interval 1, probability 0, space 0, times 0 [ 733.463904][ T2968] dump_stack+0x137/0x19d [ 733.480787][ T2968] should_fail+0x23c/0x250 [ 733.485216][ T2968] __should_failslab+0x81/0x90 [ 733.489975][ T2968] ? assoc_array_insert+0x2d2/0x1730 [ 733.495244][ T2968] should_failslab+0x5/0x20 [ 733.499733][ T2968] kmem_cache_alloc_trace+0x49/0x320 [ 733.505000][ T2968] assoc_array_insert+0x2d2/0x1730 [ 733.510091][ T2968] ? _raw_spin_unlock_irqrestore+0x27/0x40 [ 733.515939][ T2968] ? crng_backtrack_protect+0x280/0x290 [ 733.521471][ T2968] ? __down_write_common+0x45/0x890 [ 733.526721][ T2968] ? __list_add_valid+0x28/0x90 [ 733.531552][ T2968] ? keyring_instantiate+0x141/0x160 [ 733.536892][ T2968] ? __key_instantiate_and_link+0x26d/0x290 [ 733.542773][ T2968] __key_link_begin+0x96/0x140 [ 733.547604][ T2968] key_link+0xb7/0x3e0 [ 733.551658][ T2968] ? keyring_alloc+0x7e/0xa0 [ 733.556245][ T2968] call_sbin_request_key+0x1c1/0x600 [ 733.561512][ T2968] ? request_key_auth_new+0x3c8/0x4f0 [ 733.566867][ T2968] ? assoc_array_apply_edit+0x590/0x660 [ 733.572427][ T2968] ? refcount_dec_and_lock+0xea/0x190 [ 733.577782][ T2968] request_key_and_link+0x7f2/0xca0 [ 733.582967][ T2968] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 733.589253][ T2968] ? keyring_search_rcu+0x180/0x180 [ 733.594437][ T2968] __se_sys_request_key+0x1c4/0x280 [ 733.599616][ T2968] ? fput+0x2d/0x130 [ 733.603512][ T2968] __x64_sys_request_key+0x51/0x60 [ 733.608603][ T2968] do_syscall_64+0x34/0x50 [ 733.613074][ T2968] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 733.618952][ T2968] RIP: 0033:0x4665f9 [ 733.622827][ T2968] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 733.642417][ T2968] RSP: 002b:00007f0018c25188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 733.650835][ T2968] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 733.658844][ T2968] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 733.666928][ T2968] RBP: 00007f0018c251d0 R08: 0000000000000000 R09: 0000000000000000 [ 733.674880][ T2968] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 733.682832][ T2968] R13: 00007ffec517880f R14: 00007f0018c25300 R15: 0000000000022000 [ 733.690867][ T2970] CPU: 0 PID: 2970 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 733.699265][ T2970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 733.709330][ T2970] Call Trace: [ 733.712607][ T2970] dump_stack+0x137/0x19d [ 733.716932][ T2970] should_fail+0x23c/0x250 [ 733.721426][ T2970] __should_failslab+0x81/0x90 [ 733.726190][ T2970] ? assoc_array_insert+0x70/0x1730 [ 733.731398][ T2970] should_failslab+0x5/0x20 [ 733.735927][ T2970] kmem_cache_alloc_trace+0x49/0x320 [ 733.741209][ T2970] ? chacha_block_generic+0x25a/0x280 [ 733.746582][ T2970] assoc_array_insert+0x70/0x1730 [ 733.751605][ T2970] ? _raw_spin_unlock_irqrestore+0x27/0x40 [ 733.757419][ T2970] ? crng_backtrack_protect+0x280/0x290 [ 733.763566][ T2970] ? __down_write_common+0x45/0x890 [ 733.768852][ T2970] ? __list_add_valid+0x28/0x90 [ 733.773757][ T2970] ? keyring_instantiate+0x141/0x160 [ 733.779057][ T2970] ? __key_instantiate_and_link+0x26d/0x290 [ 733.784951][ T2970] __key_link_begin+0x96/0x140 [ 733.789723][ T2970] key_link+0xb7/0x3e0 [ 733.793835][ T2970] ? keyring_alloc+0x7e/0xa0 [ 733.798448][ T2970] call_sbin_request_key+0x1c1/0x600 [ 733.803780][ T2970] ? request_key_auth_new+0x3c8/0x4f0 [ 733.809156][ T2970] ? assoc_array_apply_edit+0x590/0x660 [ 733.814702][ T2970] ? refcount_dec_and_lock+0xea/0x190 [ 733.820084][ T2970] request_key_and_link+0x7f2/0xca0 [ 733.825340][ T2970] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 733.831609][ T2970] ? keyring_search_rcu+0x180/0x180 [ 733.836837][ T2970] __se_sys_request_key+0x1c4/0x280 [ 733.842030][ T2970] ? fput+0x2d/0x130 [ 733.846006][ T2970] __x64_sys_request_key+0x51/0x60 [ 733.851143][ T2970] do_syscall_64+0x34/0x50 [ 733.855566][ T2970] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 733.861500][ T2970] RIP: 0033:0x4665f9 [ 733.865389][ T2970] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 733.884997][ T2970] RSP: 002b:00007f7099b78188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 733.893412][ T2970] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 733.901437][ T2970] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 12:26:02 executing program 5: r0 = getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)={0x0, r0}) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x2, &(0x7f00000005c0)={0x0}) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:02 executing program 0 (fault-call:0 fault-nth:20): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:02 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0xd}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:02 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0xe}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:02 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0xf}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:02 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0xfe00, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:02 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x10}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 733.909409][ T2970] RBP: 00007f7099b781d0 R08: 0000000000000000 R09: 0000000000000000 [ 733.917379][ T2970] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 733.925352][ T2970] R13: 00007fffdc0f2e8f R14: 00007f7099b78300 R15: 0000000000022000 [ 733.975604][ T2989] FAULT_INJECTION: forcing a failure. [ 733.975604][ T2989] name failslab, interval 1, probability 0, space 0, times 0 [ 733.988286][ T2989] CPU: 0 PID: 2989 Comm: syz-executor.0 Not tainted 5.12.0-syzkaller #0 [ 733.996632][ T2989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 734.006710][ T2989] Call Trace: [ 734.009991][ T2989] dump_stack+0x137/0x19d [ 734.014369][ T2989] should_fail+0x23c/0x250 [ 734.019091][ T2989] __should_failslab+0x81/0x90 [ 734.023916][ T2989] ? call_usermodehelper_setup+0x81/0x160 [ 734.029639][ T2989] should_failslab+0x5/0x20 [ 734.034172][ T2989] kmem_cache_alloc_trace+0x49/0x320 [ 734.039473][ T2989] call_usermodehelper_setup+0x81/0x160 [ 734.045021][ T2989] ? umh_keys_init+0x30/0x30 [ 734.049612][ T2989] ? call_sbin_request_key+0x600/0x600 [ 734.055074][ T2989] call_sbin_request_key+0x427/0x600 [ 734.060388][ T2989] ? request_key_auth_new+0x3c8/0x4f0 [ 734.065770][ T2989] ? refcount_dec_and_lock+0xea/0x190 [ 734.071150][ T2989] request_key_and_link+0x7f2/0xca0 [ 734.076352][ T2989] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 734.082663][ T2989] ? keyring_search_rcu+0x180/0x180 [ 734.087877][ T2989] __se_sys_request_key+0x1c4/0x280 [ 734.093076][ T2989] ? fput+0x2d/0x130 [ 734.097028][ T2989] __x64_sys_request_key+0x51/0x60 [ 734.102141][ T2989] do_syscall_64+0x34/0x50 [ 734.106564][ T2989] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 734.112503][ T2989] RIP: 0033:0x4665f9 [ 734.116391][ T2989] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 734.136044][ T2989] RSP: 002b:00007f0018c25188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 734.144462][ T2989] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 734.152445][ T2989] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 734.160426][ T2989] RBP: 00007f0018c251d0 R08: 0000000000000000 R09: 0000000000000000 [ 734.168438][ T2989] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 12:26:02 executing program 1 (fault-call:0 fault-nth:19): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:02 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0xfefd, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:02 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x11}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 734.176402][ T2989] R13: 00007ffec517880f R14: 00007f0018c25300 R15: 0000000000022000 [ 734.218873][ T2997] FAULT_INJECTION: forcing a failure. [ 734.218873][ T2997] name failslab, interval 1, probability 0, space 0, times 0 [ 734.231511][ T2997] CPU: 1 PID: 2997 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 734.239892][ T2997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 734.249945][ T2997] Call Trace: [ 734.253223][ T2997] dump_stack+0x137/0x19d [ 734.257559][ T2997] should_fail+0x23c/0x250 [ 734.261981][ T2997] __should_failslab+0x81/0x90 [ 734.266746][ T2997] ? assoc_array_insert+0x2d2/0x1730 [ 734.272033][ T2997] should_failslab+0x5/0x20 [ 734.276527][ T2997] kmem_cache_alloc_trace+0x49/0x320 [ 734.281802][ T2997] assoc_array_insert+0x2d2/0x1730 [ 734.286898][ T2997] ? _raw_spin_unlock_irqrestore+0x27/0x40 [ 734.292836][ T2997] ? crng_backtrack_protect+0x280/0x290 [ 734.298591][ T2997] ? __down_write_common+0x45/0x890 [ 734.303774][ T2997] ? __list_add_valid+0x28/0x90 [ 734.308618][ T2997] ? keyring_instantiate+0x141/0x160 [ 734.313932][ T2997] ? __key_instantiate_and_link+0x26d/0x290 [ 734.319809][ T2997] __key_link_begin+0x96/0x140 [ 734.324557][ T2997] key_link+0xb7/0x3e0 [ 734.328622][ T2997] ? keyring_alloc+0x7e/0xa0 [ 734.333275][ T2997] call_sbin_request_key+0x1c1/0x600 [ 734.338571][ T2997] ? request_key_auth_new+0x3c8/0x4f0 [ 734.343924][ T2997] ? assoc_array_apply_edit+0x590/0x660 [ 734.349461][ T2997] ? refcount_dec_and_lock+0xea/0x190 [ 734.354845][ T2997] request_key_and_link+0x7f2/0xca0 [ 734.360040][ T2997] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 734.366346][ T2997] ? keyring_search_rcu+0x180/0x180 [ 734.371529][ T2997] __se_sys_request_key+0x1c4/0x280 [ 734.376708][ T2997] ? fput+0x2d/0x130 [ 734.380587][ T2997] __x64_sys_request_key+0x51/0x60 [ 734.385715][ T2997] do_syscall_64+0x34/0x50 [ 734.390112][ T2997] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 734.396086][ T2997] RIP: 0033:0x4665f9 [ 734.399961][ T2997] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 12:26:02 executing program 4 (fault-call:0 fault-nth:13): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:02 executing program 0 (fault-call:0 fault-nth:21): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 734.419593][ T2997] RSP: 002b:00007f7099b78188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 734.428001][ T2997] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 734.435952][ T2997] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 734.443957][ T2997] RBP: 00007f7099b781d0 R08: 0000000000000000 R09: 0000000000000000 [ 734.451910][ T2997] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 734.459865][ T2997] R13: 00007fffdc0f2e8f R14: 00007f7099b78300 R15: 0000000000022000 [ 734.579127][ T2973] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 734.587256][ T2973] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 734.598767][ T2973] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 734.606781][ T2973] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 [ 734.663568][ T3008] FAULT_INJECTION: forcing a failure. [ 734.663568][ T3008] name failslab, interval 1, probability 0, space 0, times 0 [ 734.666817][ T2973] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 734.676237][ T3008] CPU: 0 PID: 3008 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 734.684186][ T2973] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 734.692491][ T3008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 734.692503][ T3008] Call Trace: [ 734.692510][ T3008] dump_stack+0x137/0x19d [ 734.692533][ T3008] should_fail+0x23c/0x250 [ 734.704348][ T2973] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 734.713632][ T3008] __should_failslab+0x81/0x90 [ 734.716939][ T2973] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 [ 734.721247][ T3008] ? key_alloc+0x2e2/0xbe0 [ 734.730699][ T3009] FAULT_INJECTION: forcing a failure. [ 734.730699][ T3009] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 734.733650][ T3008] should_failslab+0x5/0x20 [ 734.771366][ T3008] __kmalloc_track_caller+0x64/0x360 [ 734.776743][ T3008] ? key_alloc+0x2aa/0xbe0 [ 734.781215][ T3008] kmemdup+0x21/0x50 [ 734.785107][ T3008] key_alloc+0x2e2/0xbe0 [ 734.789349][ T3008] request_key_auth_new+0x38c/0x4f0 [ 734.794534][ T3008] ? assoc_array_apply_edit+0x590/0x660 [ 734.800128][ T3008] ? refcount_dec_and_lock+0xea/0x190 [ 734.805490][ T3008] request_key_and_link+0x7a3/0xca0 [ 734.810674][ T3008] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 734.816965][ T3008] ? keyring_search_rcu+0x180/0x180 [ 734.822170][ T3008] __se_sys_request_key+0x1c4/0x280 [ 734.827351][ T3008] ? fput+0x2d/0x130 [ 734.831312][ T3008] __x64_sys_request_key+0x51/0x60 [ 734.836406][ T3008] do_syscall_64+0x34/0x50 [ 734.840829][ T3008] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 734.846722][ T3008] RIP: 0033:0x4665f9 [ 734.850608][ T3008] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 734.870204][ T3008] RSP: 002b:00007fdd9a492188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 734.878607][ T3008] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 734.886560][ T3008] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 734.894523][ T3008] RBP: 00007fdd9a4921d0 R08: 0000000000000000 R09: 0000000000000000 [ 734.902476][ T3008] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 734.911557][ T3008] R13: 00007ffd8a43ae3f R14: 00007fdd9a492300 R15: 0000000000022000 [ 734.919645][ T3009] CPU: 1 PID: 3009 Comm: syz-executor.0 Not tainted 5.12.0-syzkaller #0 [ 734.927981][ T3009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 734.938033][ T3009] Call Trace: [ 734.941402][ T3009] dump_stack+0x137/0x19d [ 734.945825][ T3009] should_fail+0x23c/0x250 [ 734.950227][ T3009] should_fail_usercopy+0x16/0x20 [ 734.955248][ T3009] _copy_to_user+0x1c/0x90 [ 734.959709][ T3009] simple_read_from_buffer+0xab/0x120 [ 734.965066][ T3009] proc_fail_nth_read+0xf6/0x140 [ 734.970017][ T3009] ? rw_verify_area+0x136/0x250 [ 734.974984][ T3009] ? proc_fault_inject_write+0x200/0x200 [ 734.980680][ T3009] vfs_read+0x154/0x5d0 [ 734.984851][ T3009] ? __fget_light+0x21b/0x260 [ 734.989649][ T3009] ? __cond_resched+0x11/0x40 [ 734.994347][ T3009] ksys_read+0xce/0x180 [ 734.998495][ T3009] __x64_sys_read+0x3e/0x50 [ 735.003060][ T3009] do_syscall_64+0x34/0x50 [ 735.007532][ T3009] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 735.013512][ T3009] RIP: 0033:0x41937c [ 735.017425][ T3009] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 735.037134][ T3009] RSP: 002b:00007f0018c25170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 735.045527][ T3009] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041937c [ 735.053491][ T3009] RDX: 000000000000000f RSI: 00007f0018c251e0 RDI: 0000000000000003 12:26:03 executing program 5: r0 = getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)={0x0, r0}) ptrace(0x10, r0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:03 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0xfffd, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:03 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x12}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:03 executing program 1 (fault-call:0 fault-nth:20): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:03 executing program 4 (fault-call:0 fault-nth:14): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:03 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 735.061457][ T3009] RBP: 00007f0018c251d0 R08: 0000000000000000 R09: 0000000000000000 [ 735.069527][ T3009] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 735.077567][ T3009] R13: 00007ffec517880f R14: 00007f0018c25300 R15: 0000000000022000 12:26:03 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x48}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 735.149544][ T3023] FAULT_INJECTION: forcing a failure. [ 735.149544][ T3023] name failslab, interval 1, probability 0, space 0, times 0 [ 735.162209][ T3023] CPU: 1 PID: 3023 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 735.162509][ T3027] FAULT_INJECTION: forcing a failure. [ 735.162509][ T3027] name failslab, interval 1, probability 0, space 0, times 0 [ 735.170879][ T3023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 735.170893][ T3023] Call Trace: [ 735.170900][ T3023] dump_stack+0x137/0x19d [ 735.170922][ T3023] should_fail+0x23c/0x250 [ 735.170938][ T3023] __should_failslab+0x81/0x90 [ 735.210241][ T3023] ? call_usermodehelper_setup+0x81/0x160 [ 735.216077][ T3023] should_failslab+0x5/0x20 [ 735.220618][ T3023] kmem_cache_alloc_trace+0x49/0x320 [ 735.225945][ T3023] call_usermodehelper_setup+0x81/0x160 [ 735.231499][ T3023] ? umh_keys_init+0x30/0x30 [ 735.236074][ T3023] ? call_sbin_request_key+0x600/0x600 [ 735.241525][ T3023] call_sbin_request_key+0x427/0x600 [ 735.246869][ T3023] ? request_key_auth_new+0x3c8/0x4f0 [ 735.252227][ T3023] ? refcount_dec_and_lock+0xea/0x190 [ 735.257582][ T3023] request_key_and_link+0x7f2/0xca0 [ 735.262832][ T3023] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 735.269095][ T3023] ? keyring_search_rcu+0x180/0x180 [ 735.274292][ T3023] __se_sys_request_key+0x1c4/0x280 [ 735.279528][ T3023] ? fput+0x2d/0x130 [ 735.283408][ T3023] __x64_sys_request_key+0x51/0x60 [ 735.288501][ T3023] do_syscall_64+0x34/0x50 [ 735.292902][ T3023] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 735.298782][ T3023] RIP: 0033:0x4665f9 [ 735.302658][ T3023] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 735.322317][ T3023] RSP: 002b:00007f7099b78188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 735.330729][ T3023] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 735.338721][ T3023] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 735.346688][ T3023] RBP: 00007f7099b781d0 R08: 0000000000000000 R09: 0000000000000000 [ 735.354646][ T3023] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 735.362603][ T3023] R13: 00007fffdc0f2e8f R14: 00007f7099b78300 R15: 0000000000022000 [ 735.370560][ T3027] CPU: 0 PID: 3027 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 735.378948][ T3027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 735.388998][ T3027] Call Trace: [ 735.392349][ T3027] dump_stack+0x137/0x19d [ 735.396670][ T3027] should_fail+0x23c/0x250 [ 735.401223][ T3027] __should_failslab+0x81/0x90 [ 735.405972][ T3027] ? selinux_key_alloc+0x35/0xd0 [ 735.410946][ T3027] should_failslab+0x5/0x20 [ 735.415530][ T3027] kmem_cache_alloc_trace+0x49/0x320 [ 735.420801][ T3027] selinux_key_alloc+0x35/0xd0 [ 735.425615][ T3027] security_key_alloc+0x45/0x90 [ 735.430448][ T3027] key_alloc+0x694/0xbe0 [ 735.434677][ T3027] request_key_auth_new+0x38c/0x4f0 [ 735.439860][ T3027] ? assoc_array_apply_edit+0x590/0x660 [ 735.445387][ T3027] ? refcount_dec_and_lock+0xea/0x190 [ 735.450746][ T3027] request_key_and_link+0x7a3/0xca0 [ 735.455944][ T3027] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 735.462171][ T3027] ? keyring_search_rcu+0x180/0x180 [ 735.467438][ T3027] __se_sys_request_key+0x1c4/0x280 [ 735.472619][ T3027] ? fput+0x2d/0x130 [ 735.476498][ T3027] __x64_sys_request_key+0x51/0x60 [ 735.481592][ T3027] do_syscall_64+0x34/0x50 [ 735.485995][ T3027] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 735.491939][ T3027] RIP: 0033:0x4665f9 [ 735.495865][ T3027] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 735.515482][ T3027] RSP: 002b:00007fdd9a492188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 735.523892][ T3027] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 735.531845][ T3027] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 735.539855][ T3027] RBP: 00007fdd9a4921d0 R08: 0000000000000000 R09: 0000000000000000 12:26:04 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:04 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x4c}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:04 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0xf0ff7f, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:04 executing program 4 (fault-call:0 fault-nth:15): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:04 executing program 1 (fault-call:0 fault-nth:21): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 735.547809][ T3027] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 735.555764][ T3027] R13: 00007ffd8a43ae3f R14: 00007fdd9a492300 R15: 0000000000022000 [ 735.736875][ T3042] FAULT_INJECTION: forcing a failure. [ 735.736875][ T3042] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 735.749993][ T3042] CPU: 0 PID: 3042 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 735.758673][ T3042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 735.768724][ T3042] Call Trace: [ 735.772001][ T3042] dump_stack+0x137/0x19d [ 735.776352][ T3042] should_fail+0x23c/0x250 [ 735.780778][ T3042] should_fail_usercopy+0x16/0x20 [ 735.785786][ T3042] _copy_to_user+0x1c/0x90 [ 735.790187][ T3042] simple_read_from_buffer+0xab/0x120 [ 735.795553][ T3042] proc_fail_nth_read+0xf6/0x140 [ 735.800473][ T3042] ? rw_verify_area+0x136/0x250 [ 735.805404][ T3042] ? proc_fault_inject_write+0x200/0x200 [ 735.811021][ T3042] vfs_read+0x154/0x5d0 [ 735.815199][ T3042] ? __fget_light+0x21b/0x260 [ 735.819866][ T3042] ? __cond_resched+0x11/0x40 [ 735.824525][ T3042] ksys_read+0xce/0x180 [ 735.828820][ T3042] __x64_sys_read+0x3e/0x50 [ 735.833305][ T3042] do_syscall_64+0x34/0x50 [ 735.837704][ T3042] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 735.843583][ T3042] RIP: 0033:0x41937c [ 735.847457][ T3042] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 735.867061][ T3042] RSP: 002b:00007f7099b78170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 735.875506][ T3042] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041937c [ 735.883467][ T3042] RDX: 000000000000000f RSI: 00007f7099b781e0 RDI: 0000000000000003 [ 735.891620][ T3042] RBP: 00007f7099b781d0 R08: 0000000000000000 R09: 0000000000000000 [ 735.899577][ T3042] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 735.907533][ T3042] R13: 00007fffdc0f2e8f R14: 00007f7099b78300 R15: 0000000000022000 [ 735.940472][ T3049] FAULT_INJECTION: forcing a failure. [ 735.940472][ T3049] name failslab, interval 1, probability 0, space 0, times 0 [ 735.953134][ T3049] CPU: 0 PID: 3049 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 735.961471][ T3049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 735.971522][ T3049] Call Trace: [ 735.974796][ T3049] dump_stack+0x137/0x19d [ 735.979171][ T3049] should_fail+0x23c/0x250 [ 735.983600][ T3049] ? key_alloc+0x2aa/0xbe0 [ 735.988063][ T3049] __should_failslab+0x81/0x90 [ 735.992823][ T3049] should_failslab+0x5/0x20 [ 735.997339][ T3049] kmem_cache_alloc+0x46/0x300 [ 736.002151][ T3049] key_alloc+0x2aa/0xbe0 [ 736.006434][ T3049] keyring_alloc+0x40/0xa0 [ 736.010937][ T3049] call_sbin_request_key+0x13e/0x600 [ 736.016231][ T3049] ? request_key_auth_free_preparse+0x5/0x10 [ 736.022197][ T3049] ? request_key_auth_new+0x3c8/0x4f0 [ 736.027565][ T3049] ? assoc_array_apply_edit+0x590/0x660 [ 736.033094][ T3049] ? refcount_dec_and_lock+0xea/0x190 [ 736.038448][ T3049] request_key_and_link+0x7f2/0xca0 [ 736.043680][ T3049] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 736.049980][ T3049] ? keyring_search_rcu+0x180/0x180 [ 736.055192][ T3049] __se_sys_request_key+0x1c4/0x280 [ 736.060389][ T3049] ? fput+0x2d/0x130 [ 736.064346][ T3049] __x64_sys_request_key+0x51/0x60 [ 736.069439][ T3049] do_syscall_64+0x34/0x50 [ 736.073852][ T3049] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 736.079801][ T3049] RIP: 0033:0x4665f9 [ 736.083672][ T3049] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 736.103426][ T3049] RSP: 002b:00007fdd9a492188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 736.111906][ T3049] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 736.119864][ T3049] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 736.127871][ T3049] RBP: 00007fdd9a4921d0 R08: 0000000000000000 R09: 0000000000000000 [ 736.135825][ T3049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 736.143809][ T3049] R13: 00007ffd8a43ae3f R14: 00007fdd9a492300 R15: 0000000000022000 [ 736.244742][ T3012] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 736.252746][ T3012] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 736.263862][ T3012] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 736.271942][ T3012] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:04 executing program 5: r0 = getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)={0x0, r0}) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:04 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x68}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:04 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x2}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:04 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0xfeffff, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:04 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:04 executing program 4 (fault-call:0 fault-nth:16): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 736.319599][ T3012] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 736.327615][ T3012] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 736.338726][ T3012] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 736.346763][ T3012] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:04 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:04 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x6c}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:04 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x2}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:04 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x3}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:04 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x74}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:04 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x3}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 736.490158][ T3079] FAULT_INJECTION: forcing a failure. [ 736.490158][ T3079] name failslab, interval 1, probability 0, space 0, times 0 [ 736.502940][ T3079] CPU: 1 PID: 3079 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 736.511409][ T3079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 736.521511][ T3079] Call Trace: [ 736.524801][ T3079] dump_stack+0x137/0x19d [ 736.529147][ T3079] should_fail+0x23c/0x250 [ 736.533588][ T3079] __should_failslab+0x81/0x90 [ 736.538348][ T3079] ? key_alloc+0x2e2/0xbe0 [ 736.542771][ T3079] should_failslab+0x5/0x20 [ 736.547404][ T3079] __kmalloc_track_caller+0x64/0x360 [ 736.552688][ T3079] ? key_alloc+0x2aa/0xbe0 [ 736.557165][ T3079] kmemdup+0x21/0x50 [ 736.561057][ T3079] key_alloc+0x2e2/0xbe0 [ 736.565356][ T3079] keyring_alloc+0x40/0xa0 [ 736.569859][ T3079] call_sbin_request_key+0x13e/0x600 [ 736.575189][ T3079] ? request_key_auth_free_preparse+0x5/0x10 [ 736.581160][ T3079] ? request_key_auth_new+0x3c8/0x4f0 [ 736.586548][ T3079] ? assoc_array_apply_edit+0x64b/0x660 [ 736.592080][ T3079] ? refcount_dec_and_lock+0xea/0x190 [ 736.597533][ T3079] request_key_and_link+0x7f2/0xca0 [ 736.602812][ T3079] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 736.609103][ T3079] ? keyring_search_rcu+0x180/0x180 [ 736.614315][ T3079] __se_sys_request_key+0x1c4/0x280 [ 736.619505][ T3079] ? fput+0x2d/0x130 [ 736.623389][ T3079] __x64_sys_request_key+0x51/0x60 [ 736.628486][ T3079] do_syscall_64+0x34/0x50 [ 736.632958][ T3079] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 736.638914][ T3079] RIP: 0033:0x4665f9 [ 736.642790][ T3079] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 736.662380][ T3079] RSP: 002b:00007fdd9a492188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 736.670855][ T3079] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 736.678809][ T3079] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 736.686761][ T3079] RBP: 00007fdd9a4921d0 R08: 0000000000000000 R09: 0000000000000000 [ 736.694784][ T3079] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 736.702735][ T3079] R13: 00007ffd8a43ae3f R14: 00007fdd9a492300 R15: 0000000000022000 [ 736.819732][ T3062] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 736.828255][ T3062] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 736.839798][ T3062] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 736.847825][ T3062] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:05 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x1000000, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:05 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x4}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:05 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x4}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:05 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x7a}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:05 executing program 5: getpid() r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:05 executing program 4 (fault-call:0 fault-nth:17): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:05 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x5}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 736.903025][ T3062] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 736.911123][ T3062] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 736.922636][ T3062] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 736.930680][ T3062] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:05 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x06rust\xe3c*sgrVex:De', 0x0) 12:26:05 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x5}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:05 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x2000000, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:05 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x6}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:05 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\brust\xe3c*sgrVex:De', 0x0) [ 737.036718][ T3123] FAULT_INJECTION: forcing a failure. [ 737.036718][ T3123] name failslab, interval 1, probability 0, space 0, times 0 [ 737.049704][ T3123] CPU: 1 PID: 3123 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 737.058026][ T3123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 737.068083][ T3123] Call Trace: [ 737.071350][ T3123] dump_stack+0x137/0x19d [ 737.075692][ T3123] should_fail+0x23c/0x250 [ 737.080112][ T3123] __should_failslab+0x81/0x90 [ 737.084891][ T3123] ? selinux_key_alloc+0x35/0xd0 [ 737.089810][ T3123] should_failslab+0x5/0x20 [ 737.094365][ T3123] kmem_cache_alloc_trace+0x49/0x320 [ 737.099634][ T3123] selinux_key_alloc+0x35/0xd0 [ 737.104410][ T3123] security_key_alloc+0x45/0x90 [ 737.109355][ T3123] key_alloc+0x694/0xbe0 [ 737.113587][ T3123] keyring_alloc+0x40/0xa0 [ 737.118072][ T3123] call_sbin_request_key+0x13e/0x600 [ 737.123420][ T3123] ? request_key_auth_free_preparse+0x5/0x10 [ 737.129402][ T3123] ? request_key_auth_new+0x3c8/0x4f0 [ 737.134755][ T3123] ? assoc_array_apply_edit+0x590/0x660 [ 737.140288][ T3123] ? refcount_dec_and_lock+0xea/0x190 [ 737.145669][ T3123] request_key_and_link+0x7f2/0xca0 [ 737.150848][ T3123] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 737.157126][ T3123] ? keyring_search_rcu+0x180/0x180 [ 737.162324][ T3123] __se_sys_request_key+0x1c4/0x280 [ 737.167512][ T3123] ? fput+0x2d/0x130 [ 737.171480][ T3123] __x64_sys_request_key+0x51/0x60 [ 737.176570][ T3123] do_syscall_64+0x34/0x50 [ 737.180974][ T3123] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 737.186850][ T3123] RIP: 0033:0x4665f9 [ 737.190746][ T3123] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 737.210416][ T3123] RSP: 002b:00007fdd9a492188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 737.218809][ T3123] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 737.226764][ T3123] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 12:26:05 executing program 4 (fault-call:0 fault-nth:18): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 737.234788][ T3123] RBP: 00007fdd9a4921d0 R08: 0000000000000000 R09: 0000000000000000 [ 737.242767][ T3123] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 737.250718][ T3123] R13: 00007ffd8a43ae3f R14: 00007fdd9a492300 R15: 0000000000022000 12:26:05 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x6}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:05 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x7}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:05 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\nrust\xe3c*sgrVex:De', 0x0) [ 737.390580][ T3140] FAULT_INJECTION: forcing a failure. [ 737.390580][ T3140] name failslab, interval 1, probability 0, space 0, times 0 [ 737.403247][ T3140] CPU: 0 PID: 3140 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 737.411588][ T3140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 737.421649][ T3140] Call Trace: [ 737.424923][ T3140] dump_stack+0x137/0x19d [ 737.429861][ T3140] should_fail+0x23c/0x250 [ 737.434404][ T3140] __should_failslab+0x81/0x90 [ 737.439168][ T3140] ? assoc_array_insert+0x70/0x1730 [ 737.444361][ T3140] should_failslab+0x5/0x20 [ 737.448871][ T3140] kmem_cache_alloc_trace+0x49/0x320 [ 737.454166][ T3140] ? chacha_block_generic+0x25a/0x280 [ 737.459538][ T3140] assoc_array_insert+0x70/0x1730 [ 737.464552][ T3140] ? _raw_spin_unlock_irqrestore+0x27/0x40 [ 737.470364][ T3140] ? crng_backtrack_protect+0x280/0x290 [ 737.475911][ T3140] ? __down_write_common+0x45/0x890 [ 737.481183][ T3140] ? __list_add_valid+0x28/0x90 [ 737.486027][ T3140] ? keyring_instantiate+0x141/0x160 [ 737.491311][ T3140] ? __key_instantiate_and_link+0x26d/0x290 [ 737.492761][ T3108] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 737.497235][ T3140] __key_link_begin+0x96/0x140 [ 737.505243][ T3108] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 737.509974][ T3140] key_link+0xb7/0x3e0 [ 737.510003][ T3140] ? keyring_alloc+0x7e/0xa0 [ 737.510022][ T3140] call_sbin_request_key+0x1c1/0x600 [ 737.510052][ T3140] ? request_key_auth_new+0x3c8/0x4f0 [ 737.510067][ T3140] ? assoc_array_apply_edit+0x590/0x660 [ 737.526629][ T3108] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 737.529689][ T3140] ? refcount_dec_and_lock+0xea/0x190 [ 737.534981][ T3108] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 [ 737.540330][ T3140] request_key_and_link+0x7f2/0xca0 [ 737.540352][ T3140] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 737.581578][ T3140] ? keyring_search_rcu+0x180/0x180 [ 737.586843][ T3140] __se_sys_request_key+0x1c4/0x280 [ 737.592126][ T3140] ? fput+0x2d/0x130 [ 737.596022][ T3140] __x64_sys_request_key+0x51/0x60 [ 737.601277][ T3140] do_syscall_64+0x34/0x50 [ 737.605809][ T3140] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 737.611715][ T3140] RIP: 0033:0x4665f9 [ 737.615604][ T3140] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 737.619162][ T3108] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 737.635205][ T3140] RSP: 002b:00007fdd9a492188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 737.635226][ T3140] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 737.635238][ T3140] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 737.635250][ T3140] RBP: 00007fdd9a4921d0 R08: 0000000000000000 R09: 0000000000000000 [ 737.643222][ T3108] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 12:26:06 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x8}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:06 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x0frust\xe3c*sgrVex:De', 0x0) 12:26:06 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x7}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:06 executing program 4 (fault-call:0 fault-nth:19): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:06 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:06 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x3000000, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) [ 737.651591][ T3140] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 737.651605][ T3140] R13: 00007ffd8a43ae3f R14: 00007fdd9a492300 R15: 0000000000022000 [ 737.669577][ T3108] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 737.710513][ T3108] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:06 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x9}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:06 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x8}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:06 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0xa}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:06 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x9}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:06 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x10rust\xe3c*sgrVex:De', 0x0) 12:26:06 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x4000000, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:06 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0xb}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 737.877933][ T3188] FAULT_INJECTION: forcing a failure. [ 737.877933][ T3188] name failslab, interval 1, probability 0, space 0, times 0 [ 737.890597][ T3188] CPU: 0 PID: 3188 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 737.898944][ T3188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 737.909009][ T3188] Call Trace: [ 737.912277][ T3188] dump_stack+0x137/0x19d [ 737.916593][ T3188] should_fail+0x23c/0x250 [ 737.921008][ T3188] __should_failslab+0x81/0x90 [ 737.925773][ T3188] ? assoc_array_insert+0x2d2/0x1730 [ 737.931088][ T3188] should_failslab+0x5/0x20 [ 737.935710][ T3188] kmem_cache_alloc_trace+0x49/0x320 [ 737.941005][ T3188] assoc_array_insert+0x2d2/0x1730 [ 737.946112][ T3188] ? _raw_spin_unlock_irqrestore+0x27/0x40 [ 737.951982][ T3188] ? crng_backtrack_protect+0x280/0x290 [ 737.957510][ T3188] ? __down_write_common+0x45/0x890 [ 737.962788][ T3188] ? __list_add_valid+0x28/0x90 [ 737.967619][ T3188] ? keyring_instantiate+0x141/0x160 [ 737.972891][ T3188] ? __key_instantiate_and_link+0x26d/0x290 [ 737.978767][ T3188] __key_link_begin+0x96/0x140 [ 737.983546][ T3188] key_link+0xb7/0x3e0 [ 737.987599][ T3188] ? keyring_alloc+0x7e/0xa0 [ 737.992306][ T3188] call_sbin_request_key+0x1c1/0x600 [ 737.997589][ T3188] ? sysvec_apic_timer_interrupt+0x3e/0x80 [ 738.003420][ T3188] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 738.009560][ T3188] request_key_and_link+0x7f2/0xca0 [ 738.014809][ T3188] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 738.021052][ T3188] ? keyring_search_rcu+0x180/0x180 [ 738.026249][ T3188] __se_sys_request_key+0x1c4/0x280 [ 738.031427][ T3188] ? fput+0x2d/0x130 [ 738.035309][ T3188] __x64_sys_request_key+0x51/0x60 [ 738.040403][ T3188] do_syscall_64+0x34/0x50 [ 738.044818][ T3188] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 738.050696][ T3188] RIP: 0033:0x4665f9 [ 738.054572][ T3188] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 12:26:06 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0xa}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 738.074305][ T3188] RSP: 002b:00007fdd9a492188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 738.082740][ T3188] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 738.090696][ T3188] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 738.098652][ T3188] RBP: 00007fdd9a4921d0 R08: 0000000000000000 R09: 0000000000000000 [ 738.107049][ T3188] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 738.115014][ T3188] R13: 00007ffd8a43ae3f R14: 00007fdd9a492300 R15: 0000000000022000 12:26:06 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0xc}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:06 executing program 4 (fault-call:0 fault-nth:20): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 738.340823][ T3166] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 738.348962][ T3166] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 738.360732][ T3166] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 738.368857][ T3166] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 [ 738.429437][ T3166] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 738.437475][ T3166] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 738.448894][ T3166] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 738.451864][ T3212] FAULT_INJECTION: forcing a failure. [ 738.451864][ T3212] name failslab, interval 1, probability 0, space 0, times 0 [ 738.456937][ T3166] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 [ 738.469534][ T3212] CPU: 0 PID: 3212 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 738.488957][ T3212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 738.499117][ T3212] Call Trace: [ 738.502378][ T3212] dump_stack+0x137/0x19d [ 738.506717][ T3212] should_fail+0x23c/0x250 [ 738.511132][ T3212] __should_failslab+0x81/0x90 [ 738.515882][ T3212] ? call_usermodehelper_setup+0x81/0x160 [ 738.521637][ T3212] should_failslab+0x5/0x20 [ 738.526145][ T3212] kmem_cache_alloc_trace+0x49/0x320 [ 738.531497][ T3212] call_usermodehelper_setup+0x81/0x160 [ 738.537042][ T3212] ? umh_keys_init+0x30/0x30 [ 738.541629][ T3212] ? call_sbin_request_key+0x600/0x600 [ 738.547066][ T3212] call_sbin_request_key+0x427/0x600 [ 738.552330][ T3212] ? request_key_auth_new+0x3c8/0x4f0 [ 738.557767][ T3212] ? refcount_dec_and_lock+0xea/0x190 [ 738.563362][ T3212] request_key_and_link+0x7f2/0xca0 [ 738.568554][ T3212] ? unregister_asymmetric_key_parser+0xc0/0xc0 [ 738.574780][ T3212] ? keyring_search_rcu+0x180/0x180 [ 738.579959][ T3212] __se_sys_request_key+0x1c4/0x280 [ 738.585137][ T3212] ? fput+0x2d/0x130 [ 738.589039][ T3212] __x64_sys_request_key+0x51/0x60 [ 738.594158][ T3212] do_syscall_64+0x34/0x50 [ 738.598604][ T3212] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 738.604499][ T3212] RIP: 0033:0x4665f9 [ 738.608371][ T3212] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 12:26:07 executing program 5: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:07 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x14rust\xe3c*sgrVex:De', 0x0) 12:26:07 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x5000000, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:07 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0xb}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:07 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0xd}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:07 executing program 4 (fault-call:0 fault-nth:21): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 738.628071][ T3212] RSP: 002b:00007fdd9a492188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 738.636480][ T3212] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 738.644463][ T3212] RDX: 0000000020001fee RSI: 0000000020001ffb RDI: 0000000020000040 [ 738.652416][ T3212] RBP: 00007fdd9a4921d0 R08: 0000000000000000 R09: 0000000000000000 [ 738.660399][ T3212] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 738.668347][ T3212] R13: 00007ffd8a43ae3f R14: 00007fdd9a492300 R15: 0000000000022000 12:26:07 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0xe}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:07 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x7000000, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:07 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0xc}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:07 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x1erust\xe3c*sgrVex:De', 0x0) 12:26:07 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x8000000, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:07 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\t%ust\xe3c*sgrVex:De', 0x0) [ 738.910395][ T3247] FAULT_INJECTION: forcing a failure. [ 738.910395][ T3247] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 738.923491][ T3247] CPU: 0 PID: 3247 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 738.931816][ T3247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 738.941863][ T3247] Call Trace: [ 738.945205][ T3247] dump_stack+0x137/0x19d [ 738.949572][ T3247] should_fail+0x23c/0x250 [ 738.953976][ T3247] should_fail_usercopy+0x16/0x20 [ 738.958987][ T3247] _copy_to_user+0x1c/0x90 [ 738.963390][ T3247] simple_read_from_buffer+0xab/0x120 [ 738.968756][ T3247] proc_fail_nth_read+0xf6/0x140 [ 738.973702][ T3247] ? rw_verify_area+0x136/0x250 [ 738.978557][ T3247] ? proc_fault_inject_write+0x200/0x200 [ 738.984321][ T3247] vfs_read+0x154/0x5d0 [ 738.988468][ T3247] ? __fget_light+0x21b/0x260 [ 738.993217][ T3247] ? __cond_resched+0x11/0x40 [ 738.997924][ T3247] ksys_read+0xce/0x180 [ 739.002076][ T3247] __x64_sys_read+0x3e/0x50 [ 739.006574][ T3247] do_syscall_64+0x34/0x50 [ 739.011047][ T3247] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 739.016933][ T3247] RIP: 0033:0x41937c [ 739.020809][ T3247] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 739.040468][ T3247] RSP: 002b:00007fdd9a492170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 739.048923][ T3247] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041937c [ 739.056922][ T3247] RDX: 000000000000000f RSI: 00007fdd9a4921e0 RDI: 0000000000000003 [ 739.064873][ T3247] RBP: 00007fdd9a4921d0 R08: 0000000000000000 R09: 0000000000000000 [ 739.072843][ T3247] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 739.080875][ T3247] R13: 00007ffd8a43ae3f R14: 00007fdd9a492300 R15: 0000000000022000 [ 739.182740][ T3219] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 739.190757][ T3219] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 739.201915][ T3219] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 739.210005][ T3219] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:07 executing program 5: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:07 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0xf}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:07 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0xd}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:07 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:07 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr#st\xe3c*sgrVex:De', 0x0) [ 739.268041][ T3219] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 739.276123][ T3219] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 739.287930][ T3219] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 739.295967][ T3219] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:07 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr%st\xe3c*sgrVex:De', 0x0) 12:26:07 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x10}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:07 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x7ffff000, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:07 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x11}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:07 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0xe}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:07 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr*st\xe3c*sgrVex:De', 0x0) 12:26:07 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 739.579157][ T3263] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 739.587178][ T3263] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 739.598228][ T3263] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 739.606268][ T3263] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:08 executing program 5: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:08 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x12}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:08 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0xf}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:08 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr+st\xe3c*sgrVex:De', 0x0) 12:26:08 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x2}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:08 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0xeffdffff, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) [ 739.652490][ T3263] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 739.660570][ T3263] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 739.671847][ T3263] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 739.679845][ T3263] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:08 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x48}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:08 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x10}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:08 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr-st\xe3c*sgrVex:De', 0x0) 12:26:08 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x4c}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:08 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x11}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:08 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x3}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 739.928155][ T3310] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 739.936378][ T3310] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 739.947786][ T3310] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 739.955805][ T3310] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:08 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:08 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0xfcfdffff, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:08 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr.st\xe3c*sgrVex:De', 0x0) 12:26:08 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x12}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:08 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x4}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:08 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x68}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 740.014621][ T3310] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 740.022660][ T3310] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 740.037522][ T3310] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 740.045541][ T3310] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:08 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x48}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:08 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr0st\xe3c*sgrVex:De', 0x0) 12:26:08 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:08 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x6c}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:08 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x4c}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:08 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:08 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trLst\xe3c*sgrVex:De', 0x0) 12:26:08 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0xfefdffff, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:08 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x68}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:08 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x74}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:08 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trXst\xe3c*sgrVex:De', 0x0) 12:26:08 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x5}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:08 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:08 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x7a}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:08 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x6c}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:08 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x04rust\xe3c*sgrVex:De', 0x0) 12:26:08 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trcst\xe3c*sgrVex:De', 0x0) 12:26:08 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x74}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:08 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0xfffdffff, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:08 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trdst\xe3c*sgrVex:De', 0x0) 12:26:08 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x7a}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:08 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x06rust\xe3c*sgrVex:De', 0x0) 12:26:08 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x6}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 740.527847][ T3418] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 740.535896][ T3418] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 740.546942][ T3418] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 740.554931][ T3418] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:09 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trhst\xe3c*sgrVex:De', 0x0) 12:26:09 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:09 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x04rust\xe3c*sgrVex:De', 0x0) 12:26:09 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\brust\xe3c*sgrVex:De', 0x0) 12:26:09 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x7}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 740.619462][ T3418] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 740.627492][ T3418] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 740.642382][ T3418] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 740.650412][ T3418] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:09 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0xfffffdef, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:09 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x06rust\xe3c*sgrVex:De', 0x0) 12:26:09 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trist\xe3c*sgrVex:De', 0x0) 12:26:09 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\nrust\xe3c*sgrVex:De', 0x0) 12:26:09 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trlst\xe3c*sgrVex:De', 0x0) 12:26:09 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\brust\xe3c*sgrVex:De', 0x0) 12:26:09 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x8}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:09 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trost\xe3c*sgrVex:De', 0x0) [ 740.968185][ T3472] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 740.976355][ T3472] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 740.987771][ T3472] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 740.995787][ T3472] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:09 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:09 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\nrust\xe3c*sgrVex:De', 0x0) 12:26:09 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x0frust\xe3c*sgrVex:De', 0x0) 12:26:09 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0xfffffdfc, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:09 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x9}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:09 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trpst\xe3c*sgrVex:De', 0x0) [ 741.044989][ T3472] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 741.053018][ T3472] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 741.064087][ T3472] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 741.072071][ T3472] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:09 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x0frust\xe3c*sgrVex:De', 0x0) 12:26:09 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x10rust\xe3c*sgrVex:De', 0x0) 12:26:09 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trsst\xe3c*sgrVex:De', 0x0) 12:26:09 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x14rust\xe3c*sgrVex:De', 0x0) 12:26:09 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0xa}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:09 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x10rust\xe3c*sgrVex:De', 0x0) [ 741.369195][ T3523] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 741.377367][ T3523] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 741.388747][ T3523] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 741.397034][ T3523] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:09 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:09 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0xfffffdfe, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:09 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0xb}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:09 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x1erust\xe3c*sgrVex:De', 0x0) 12:26:09 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trtst\xe3c*sgrVex:De', 0x0) 12:26:09 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x14rust\xe3c*sgrVex:De', 0x0) [ 741.452869][ T3523] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 741.460921][ T3523] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 741.472016][ T3523] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 741.479996][ T3523] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:10 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trxst\xe3c*sgrVex:De', 0x0) 12:26:10 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\t%ust\xe3c*sgrVex:De', 0x0) 12:26:10 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x1erust\xe3c*sgrVex:De', 0x0) 12:26:10 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0xc}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:10 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0xfffffdff, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:10 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\t%ust\xe3c*sgrVex:De', 0x0) [ 741.738948][ T3572] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 741.747088][ T3572] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 741.758685][ T3572] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 741.766719][ T3572] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:10 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:10 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trzst\xe3c*sgrVex:De', 0x0) 12:26:10 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr#st\xe3c*sgrVex:De', 0x0) 12:26:10 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0xd}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:10 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr#st\xe3c*sgrVex:De', 0x0) [ 741.819045][ T3572] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 741.827155][ T3572] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 741.838257][ T3572] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 741.846341][ T3572] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:10 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tru%t\xe3c*sgrVex:De', 0x0) 12:26:10 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr%st\xe3c*sgrVex:De', 0x0) 12:26:10 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr%st\xe3c*sgrVex:De', 0x0) 12:26:10 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0xfffffe00, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:10 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0xe}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:10 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr*st\xe3c*sgrVex:De', 0x0) 12:26:10 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr*st\xe3c*sgrVex:De', 0x0) [ 742.130337][ T3614] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 742.138505][ T3614] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 742.149830][ T3614] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 742.157903][ T3614] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:10 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:10 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*%grVex:De', 0x0) 12:26:10 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0xf}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:10 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0xffffffff, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:10 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr+st\xe3c*sgrVex:De', 0x0) 12:26:10 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr+st\xe3c*sgrVex:De', 0x0) [ 742.202155][ T3614] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 742.210178][ T3614] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 742.222163][ T3614] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 742.230175][ T3614] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:10 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr-st\xe3c*sgrVex:De', 0x0) 12:26:10 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr-st\xe3c*sgrVex:De', 0x0) 12:26:10 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sg%Vex:De', 0x0) 12:26:10 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:10 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x10}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:10 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrV%x:De', 0x0) [ 742.583263][ T3663] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 742.591301][ T3663] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 742.602560][ T3663] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 742.610559][ T3663] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:11 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:11 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x11}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:11 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr.st\xe3c*sgrVex:De', 0x0) 12:26:11 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr.st\xe3c*sgrVex:De', 0x0) 12:26:11 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:11 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVix:De', 0x0) [ 742.672705][ T3663] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 742.680756][ T3663] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 742.692319][ T3663] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 742.700375][ T3663] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:11 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr0st\xe3c*sgrVex:De', 0x0) 12:26:11 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVe#:De', 0x0) 12:26:11 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr0st\xe3c*sgrVex:De', 0x0) 12:26:11 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVe%:De', 0x0) 12:26:11 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trLst\xe3c*sgrVex:De', 0x0) 12:26:11 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x12}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 743.005080][ T3715] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 743.013246][ T3715] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 743.024381][ T3715] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 743.032409][ T3715] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:11 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVe*:De', 0x0) 12:26:11 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x3, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:11 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:11 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trLst\xe3c*sgrVex:De', 0x0) 12:26:11 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trXst\xe3c*sgrVex:De', 0x0) 12:26:11 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x48}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 743.079176][ T3715] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 743.087182][ T3715] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 743.098292][ T3715] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 743.106304][ T3715] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:11 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trXst\xe3c*sgrVex:De', 0x0) 12:26:11 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trcst\xe3c*sgrVex:De', 0x0) 12:26:11 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVe+:De', 0x0) 12:26:11 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trdst\xe3c*sgrVex:De', 0x0) 12:26:11 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trcst\xe3c*sgrVex:De', 0x0) 12:26:11 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x4, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:11 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVe-:De', 0x0) 12:26:11 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trhst\xe3c*sgrVex:De', 0x0) [ 743.377775][ T3761] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 743.385799][ T3761] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 743.396902][ T3761] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 743.404959][ T3761] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:11 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:11 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x4c}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:11 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trdst\xe3c*sgrVex:De', 0x0) 12:26:11 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVe.:De', 0x0) 12:26:11 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trist\xe3c*sgrVex:De', 0x0) [ 743.465078][ T3761] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 743.473117][ T3761] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 743.484456][ T3761] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 743.492547][ T3761] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:12 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trhst\xe3c*sgrVex:De', 0x0) 12:26:12 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVe0:De', 0x0) 12:26:12 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x68}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:12 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:12 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trlst\xe3c*sgrVex:De', 0x0) 12:26:12 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trost\xe3c*sgrVex:De', 0x0) 12:26:12 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVeL:De', 0x0) [ 743.787063][ T3809] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 743.795216][ T3809] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 743.806552][ T3809] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 743.814621][ T3809] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:12 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:12 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trist\xe3c*sgrVex:De', 0x0) 12:26:12 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x6c}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:12 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x7, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:12 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trpst\xe3c*sgrVex:De', 0x0) 12:26:12 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVeX:De', 0x0) [ 743.863354][ T3809] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 743.871410][ T3809] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 743.882886][ T3809] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 743.890993][ T3809] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:12 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:12 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trsst\xe3c*sgrVex:De', 0x0) 12:26:12 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVec:De', 0x0) 12:26:12 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trlst\xe3c*sgrVex:De', 0x0) 12:26:12 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x74}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:12 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVed:De', 0x0) [ 744.332168][ T3854] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 744.340304][ T3854] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 744.351647][ T3854] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 744.359669][ T3854] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:12 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:12 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trtst\xe3c*sgrVex:De', 0x0) 12:26:12 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trost\xe3c*sgrVex:De', 0x0) 12:26:12 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0xfe, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:12 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x7a}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:12 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVeh:De', 0x0) [ 744.401285][ T3854] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 744.409339][ T3854] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 744.420436][ T3854] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 744.428488][ T3854] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:12 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVei:De', 0x0) 12:26:12 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trxst\xe3c*sgrVex:De', 0x0) 12:26:12 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trpst\xe3c*sgrVex:De', 0x0) 12:26:12 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x04rust\xe3c*sgrVex:De', 0x0) 12:26:13 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x300, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:13 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVel:De', 0x0) [ 744.690486][ T3898] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 744.698534][ T3898] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 744.709594][ T3898] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 744.717575][ T3898] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:13 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:13 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trsst\xe3c*sgrVex:De', 0x0) 12:26:13 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trzst\xe3c*sgrVex:De', 0x0) 12:26:13 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x06rust\xe3c*sgrVex:De', 0x0) 12:26:13 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVeo:De', 0x0) [ 744.777123][ T3898] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 744.785141][ T3898] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 744.796291][ T3898] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 744.804266][ T3898] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:13 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVep:De', 0x0) 12:26:13 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tru%t\xe3c*sgrVex:De', 0x0) 12:26:13 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trtst\xe3c*sgrVex:De', 0x0) 12:26:13 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\brust\xe3c*sgrVex:De', 0x0) 12:26:13 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x500, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:13 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVes:De', 0x0) 12:26:13 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*%grVex:De', 0x0) [ 745.040363][ T3936] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 745.048644][ T3936] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 745.060275][ T3936] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 745.068299][ T3936] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:13 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:13 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trxst\xe3c*sgrVex:De', 0x0) 12:26:13 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\nrust\xe3c*sgrVex:De', 0x0) 12:26:13 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVet:De', 0x0) 12:26:13 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sg%Vex:De', 0x0) [ 745.138848][ T3936] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 745.147133][ T3936] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 745.162937][ T3936] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 745.171140][ T3936] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:13 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x700, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:13 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trzst\xe3c*sgrVex:De', 0x0) 12:26:13 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrV%x:De', 0x0) 12:26:13 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVeu:De', 0x0) 12:26:13 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVix:De', 0x0) 12:26:13 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0xeffd, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:13 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tru%t\xe3c*sgrVex:De', 0x0) [ 745.633190][ T3979] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 745.642041][ T3979] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 745.653439][ T3979] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 745.661497][ T3979] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:14 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*%grVex:De', 0x0) 12:26:14 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x0frust\xe3c*sgrVex:De', 0x0) 12:26:14 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVez:De', 0x0) 12:26:14 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVe#:De', 0x0) 12:26:14 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:14 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0xfcfd, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) [ 745.714486][ T3979] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 745.722886][ T3979] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 745.734559][ T3979] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 745.742738][ T3979] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:14 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVe%:De', 0x0) 12:26:14 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sg%Vex:De', 0x0) 12:26:14 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:D%', 0x0) 12:26:14 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVe*:De', 0x0) 12:26:14 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x10rust\xe3c*sgrVex:De', 0x0) 12:26:14 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0xfdef, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:14 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrV%x:De', 0x0) 12:26:14 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVe+:De', 0x0) 12:26:14 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:Di', 0x0) 12:26:14 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x14rust\xe3c*sgrVex:De', 0x0) [ 746.020546][ T4027] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 746.028722][ T4027] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 746.040153][ T4027] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 746.048386][ T4027] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 [ 746.099607][ T4027] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 746.107776][ T4027] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 746.121792][ T4027] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 746.129836][ T4027] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:14 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:14 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVe-:De', 0x0) 12:26:14 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVix:De', 0x0) 12:26:14 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) r0 = add_key(&(0x7f0000001140)='syzkaller\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)="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", 0x1000, 0xfffffffffffffffa) add_key$fscrypt_provisioning(&(0x7f00000010c0), &(0x7f0000001100)={'syz', 0x1}, 0xfffffffffffffffe, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0x6, r1, 0x0, 0x0, 0xfffffffffffffffc) keyctl$invalidate(0x15, r1) 12:26:14 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x1erust\xe3c*sgrVex:De', 0x0) 12:26:14 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0xfdfc, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:14 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVe#:De', 0x0) 12:26:14 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVe.:De', 0x0) 12:26:14 executing program 2: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)="f28906a17f05e5e6934690a8e30fa8987620591293a6f20fe122d1a54c2dcb76804a253f2e09b905ad3739ffb6fcb1375bfe73e16d9efb056a84607146056d0f5c4d9404a387db79ad893932af9233b66fcfe0dbd11649ff33f39f8a1717aaca00edb1f55a7012ca72003543b36161ace373c7349138117e6693e65a2c747b4aceda1fe894b1cbdea5c309f2521fe7f83f4fed38", 0x94, r0) 12:26:14 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVe0:De', 0x0) 12:26:14 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVe%:De', 0x0) 12:26:14 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\t%ust\xe3c*sgrVex:De', 0x0) [ 746.455972][ T4066] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 746.464226][ T4066] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 746.475322][ T4066] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 746.483306][ T4066] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:15 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVe*:De', 0x0) 12:26:15 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0xfdfe, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:15 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVeL:De', 0x0) 12:26:15 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:15 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r1, 0x0, 0xee00) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r2, 0x0, 0xee00) fchmod(r2, 0x0) fchmod(r2, 0x0) ioctl$BTRFS_IOC_SEND(r0, 0x40489426, &(0x7f0000000200)={{r1}, 0x2, &(0x7f00000001c0)=[0xffffffff, 0x40], 0x4, 0x1, [0x401, 0xb3d, 0x100000001, 0x5]}) r3 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:D\x00', 0x0) r4 = request_key(&(0x7f0000000100)='trusted\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='R\trust\xe3c*sgrVex:D\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)='\\-+\x00', r4) keyctl$invalidate(0x15, r3) r5 = gettid() tkill(r5, 0x34) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000300), 0x2001, 0x0) kcmp$KCMP_EPOLL_TFD(r5, 0xffffffffffffffff, 0x7, r0, &(0x7f00000002c0)={0xffffffffffffffff, r6, 0x2}) 12:26:15 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr#st\xe3c*sgrVex:De', 0x0) [ 746.530003][ T4066] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 746.538546][ T4066] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 746.549802][ T4066] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 746.557828][ T4066] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:15 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000200)={'fscrypt:', @desc2}, &(0x7f0000000240)={0x0, "2fd8b16bac13cd6b828c03d6565e6560a1c5927c2e4d4993ee035a5bfcbe5f6c1c4657462fd1d806dedf54f290bdbb8df727cec871e4a9031c17f9bef743995f", 0x28}, 0x48, 0xfffffffffffffffb) r1 = request_key(&(0x7f00000002c0)='id_resolver\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='WF\x00', r0) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc1}, &(0x7f00000000c0)={0x0, "c0000ba5ddbfe9fcc6533211cd3bdc7a27bff71be97ea179554b498bd66df287ba237c17b6df3d1696c5382964471220ac326fe6f910b855f6255acbb4846a2e", 0x11}, 0x48, r1) keyctl$KEYCTL_PKEY_QUERY(0x18, r2, 0x0, &(0x7f0000000140)='R\trust\xe3c*sgrVex:De', &(0x7f0000000180)) add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000300)={'fscrypt:', @desc1}, &(0x7f0000000340)={0x0, "d38508515ad7a6f202589126037bd3b89e3f848f0f2a7494192bfffa8ca8fc2bd69fced207121a2f8eea534574e4e207b53fba36ef5cfb9aa6c62a7da185f49d", 0x11}, 0x48, r1) 12:26:15 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVeX:De', 0x0) 12:26:15 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVe+:De', 0x0) 12:26:15 executing program 2: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='R\trust\xe3c*sgrVex:De', r0) 12:26:15 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:15 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x48c00, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r1, 0x0, 0xee00) fchmod(r1, 0x0) ioctl$FIONCLEX(r1, 0x5450) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x84, 0x0, 0x300, 0x70bd29, 0x25dfdbfb, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ipvlan1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'hsr0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'geneve1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x84}, 0x1, 0x0, 0x0, 0x48000}, 0x1) 12:26:15 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVec:De', 0x0) 12:26:15 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:15 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0xfdff, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:15 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVe-:De', 0x0) 12:26:15 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000001940)=[{{&(0x7f0000000240)=@hci, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)=""/120, 0x78}], 0x1}, 0x7f}, {{&(0x7f0000000380)=@hci, 0x80, &(0x7f0000000500)=[{&(0x7f0000000400)=""/250, 0xfa}], 0x1, &(0x7f0000000540)=""/212, 0xd4}, 0x14000000}, {{&(0x7f0000000640)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/255, 0xff}], 0x1, &(0x7f0000000800)=""/229, 0xe5}, 0x3}, {{&(0x7f0000000900)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private1}}}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000980)=""/75, 0x4b}, {&(0x7f0000000a00)=""/117, 0x75}, {&(0x7f0000000a80)=""/7, 0x7}, {&(0x7f0000000ac0)=""/136, 0x88}, {&(0x7f0000000b80)=""/71, 0x47}, {&(0x7f0000000c00)=""/163, 0xa3}, {&(0x7f0000000cc0)=""/171, 0xab}, {&(0x7f0000000d80)=""/249, 0xf9}], 0x8, &(0x7f0000000f00)=""/31, 0x1f}, 0xfffffffc}, {{0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000000f40)=""/124, 0x7c}, {&(0x7f0000000fc0)=""/1, 0x1}, {&(0x7f0000001000)=""/71, 0x47}, {&(0x7f0000001080)=""/171, 0xab}, {&(0x7f0000001140)=""/165, 0xa5}, {&(0x7f0000001200)=""/160, 0xa0}, {&(0x7f00000012c0)=""/40, 0x28}, {&(0x7f0000001300)=""/173, 0xad}], 0x8, &(0x7f0000002000)=""/4096, 0x1000}, 0x7}, {{&(0x7f0000001440)=@hci, 0x80, &(0x7f0000001700)=[{&(0x7f00000014c0)=""/3, 0x3}, {&(0x7f0000001500)=""/150, 0x96}, {&(0x7f00000015c0)=""/9, 0x9}, {&(0x7f0000001600)=""/26, 0x1a}, {&(0x7f0000001640)=""/131, 0x83}], 0x5}, 0x1}, {{0x0, 0x0, &(0x7f0000001840)=[{&(0x7f0000001780)=""/168, 0xa8}, {&(0x7f0000003000)=""/4096, 0x1000}], 0x2, &(0x7f0000001880)=""/158, 0x9e}, 0x7}], 0x7, 0x0, &(0x7f0000001b00)) r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000000000)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key(&(0x7f0000000140)='cifs.spnego\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="3c420f5f7cad3e39512c857068403b24b76cfd193aca24a2fdda72d690484bcff8ecc24b7307517ccd227bd4609d93bcffda7c5467139c6407c43c953212a88e1c3a4b071d525f66c4", 0x49, 0xfffffffffffffff8) request_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='asymmetric\x00', r0) 12:26:15 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr%st\xe3c*sgrVex:De', 0x0) 12:26:15 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:15 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVe.:De', 0x0) 12:26:15 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVed:De', 0x0) 12:26:15 executing program 2: unshare(0x40000) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0xc1, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000080)={0x0, 0x1, {0x19, 0x0, 0x17, 0x1f, 0x6, 0xfff, 0x6, 0x2e, 0x1}}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000000c0)={0xf, 0x4, 0x13, 0xf, 0xa, 0x0, 0x4, 0x140, 0x1}) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:15 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVeh:De', 0x0) 12:26:15 executing program 2: ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000000000)={0x1}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000080)) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:15 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0xfe00, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:15 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:15 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVe0:De', 0x0) 12:26:15 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVei:De', 0x0) 12:26:15 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:15 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr*st\xe3c*sgrVex:De', 0x0) 12:26:15 executing program 2: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) r1 = request_key(&(0x7f0000000100)='.request_key_auth\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)=':-\x00', r0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='asymmetric\x00', r1) 12:26:15 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVeL:De', 0x0) 12:26:15 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVel:De', 0x0) 12:26:15 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:15 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0xfefd, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:15 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:15 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVeo:De', 0x0) 12:26:15 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVeX:De', 0x0) 12:26:15 executing program 2: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r0) request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='\x00', r1) 12:26:15 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:15 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0xfffd, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:15 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVec:De', 0x0) 12:26:15 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr+st\xe3c*sgrVex:De', 0x0) 12:26:15 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVep:De', 0x0) 12:26:15 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) clone(0xe0000800, &(0x7f0000000080)="b9476ac974e2999d3ba982e86ee96d6708a974da9d44f839f72f0dd99c9f2a5bf970a336638c1110b79629ffbff16d8e1cd86e51e1532ae784bdfc3029bf78538e5983339346bbd3685018c7c100306641072b6b16e38b04a5d9b3f5a1b1e0a06d16da3e4e268da5752e3cb63ade96e23853aa75b0b7", &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)="121d47c9880adabbe230d6ab6c9c5ad1835b5457a41cda678127defea67862ef6008f1bf28d30d132b46b81d56065c547d4f8a20ec58a836508f19f32ca5d136df3d71b54ad02b6a1a166ce3f76b85414f31c8cecf62a154074bb026e76ee3e94cef8ed79ab2753469f9da91171080e130b8445ec2cb8348fa1d2ca6c634278b7443d562ef42fef594df8f1205d753a12442e741ae5151bddc52c9") openat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x20480, 0x0) 12:26:15 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:15 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0xffff, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:15 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVed:De', 0x0) 12:26:15 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVes:De', 0x0) 12:26:15 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:15 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVet:De', 0x0) 12:26:15 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVeh:De', 0x0) 12:26:15 executing program 2: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) keyctl$reject(0x13, r0, 0x3ff, 0xffffffffffffd8db, r0) 12:26:15 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:15 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVei:De', 0x0) 12:26:15 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:15 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVeu:De', 0x0) 12:26:15 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:15 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr-st\xe3c*sgrVex:De', 0x0) 12:26:15 executing program 2: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc1}, &(0x7f00000000c0)={0x0, "667568e481362a842710e804d09b27ea833d624f6fd75a7124ee7e19ea77989a98d3feb972fe14cc6e368a1beeec0e9bd8aa3d053d96d72335359e6cac7a8b0d", 0x21}, 0x48, 0xfffffffffffffffc) keyctl$search(0xa, r1, &(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x3}, r0) 12:26:15 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVel:De', 0x0) 12:26:15 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x2, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:15 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVeo:De', 0x0) 12:26:15 executing program 2: rename(&(0x7f0000000040)='\x00', &(0x7f0000000080)='./file0\x00') request_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:15 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVez:De', 0x0) 12:26:16 executing program 2: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000000000)='R\trust\xe3c*sgUY\xd1\x12\xe1\xfe\xe2\x8bx:D\x17\x00\x00\x00', 0x0) keyctl$invalidate(0x15, r0) keyctl$read(0xb, r0, &(0x7f0000000080)=""/98, 0x62) 12:26:16 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVep:De', 0x0) 12:26:16 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr.st\xe3c*sgrVex:De', 0x0) [ 747.717180][ T4272] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 747.725540][ T4272] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 747.737004][ T4272] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 747.746808][ T4272] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 [ 747.800489][ T4305] ================================================================== [ 747.808717][ T4305] BUG: KCSAN: data-race in exit_signals / mm_update_next_owner [ 747.816257][ T4305] [ 747.818572][ T4305] write to 0xffff88813532e0ec of 4 bytes by task 4304 on cpu 1: [ 747.826188][ T4305] exit_signals+0xe1/0x4a0 [ 747.830669][ T4305] do_exit+0x194/0x1560 [ 747.834911][ T4305] do_group_exit+0x19b/0x1a0 [ 747.839579][ T4305] __do_sys_exit_group+0xb/0x10 [ 747.844457][ T4305] __se_sys_exit_group+0x5/0x10 [ 747.849383][ T4305] __x64_sys_exit_group+0x16/0x20 [ 747.854439][ T4305] do_syscall_64+0x34/0x50 [ 747.858849][ T4305] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 747.864741][ T4305] [ 747.867052][ T4305] read to 0xffff88813532e0ec of 4 bytes by task 4305 on cpu 0: [ 747.874583][ T4305] mm_update_next_owner+0x1d9/0x520 [ 747.879811][ T4305] exit_mm+0x358/0x450 [ 747.883957][ T4305] do_exit+0x3ff/0x1560 [ 747.888105][ T4305] do_group_exit+0x19b/0x1a0 [ 747.892685][ T4305] __do_sys_exit_group+0xb/0x10 [ 747.897527][ T4305] __se_sys_exit_group+0x5/0x10 [ 747.902369][ T4305] __x64_sys_exit_group+0x16/0x20 [ 747.907386][ T4305] do_syscall_64+0x34/0x50 [ 747.911880][ T4305] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 747.917883][ T4305] [ 747.920200][ T4305] Reported by Kernel Concurrency Sanitizer on: [ 747.926550][ T4305] CPU: 0 PID: 4305 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 747.935097][ T4305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 12:26:16 executing program 5: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trist\xe3c*sgrVex:De', 0x0) 12:26:16 executing program 2: pselect6(0x40, &(0x7f0000000000)={0xdb1d, 0x10001, 0x7, 0x2, 0x6, 0x7fff, 0x1000, 0x200}, &(0x7f0000000080)={0xfff, 0x400, 0x80, 0x6, 0xffffffffffffffdf, 0x6, 0xffffffffffff0001, 0x7fffffff}, &(0x7f00000000c0)={0xe2d, 0x8, 0x1, 0x3, 0xea0, 0x81, 0x6, 0x4cef77b4}, &(0x7f0000000100)={0x0, 0x989680}, &(0x7f0000000180)={&(0x7f0000000140)={[0x1]}, 0x8}) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:16 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:D%', 0x0) 12:26:16 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x3, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:16 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVes:De', 0x0) 12:26:16 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr0st\xe3c*sgrVex:De', 0x0) [ 747.945378][ T4305] ================================================================== [ 747.954383][ T4272] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 747.962545][ T4272] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 747.975501][ T4272] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 747.983635][ T4272] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:16 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVet:De', 0x0) 12:26:16 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:Di', 0x0) 12:26:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0xbd904000) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:16 executing program 5: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVe.:De', 0x0) 12:26:16 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVeu:De', 0x0) 12:26:16 executing program 0: ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000000)) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:16 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x4, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:16 executing program 5: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x48}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:16 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVez:De', 0x0) 12:26:16 executing program 2: fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)='system_u:object_r:mail_spool_t:s0\x00', 0x22, 0x0) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) r0 = request_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)=']^-\x00', 0x0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)='\x00', r0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0x6, r1, 0x0, 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000002c0)='\x00', r1) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r4, 0x0) r6 = geteuid() r7 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c80)={{{@in=@private, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000d80)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r2, &(0x7f0000001980)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x800001}, 0xc, &(0x7f0000001840)=[{&(0x7f0000000480)={0x384, 0x17, 0x200, 0x70bd2c, 0x25dfdbfb, "", [@nested={0x121, 0x2b, 0x0, 0x1, [@generic="4cc1b125790bbc79c1081cdd2a346ab97c12dda2dcab45ec04e59f9b07cee7df6460f650ff4d07a6701c669cabbb86ad975779eae3494b08219faeceb414461a06e0f6a5e360b34c9258f67bac40c83855b9e529ed8cd374992e5a677e4fc9ace6b5e5dfc4cbafd5c21dc8d71c4f15fbc767a740bb0be229d749329e566f60d04549573b9f12d661a75ccc12d08ca67fdc235516acd23f705c671f40a4809d1be45828eb091fb7e1ab4ebd98d902e9915dc45930fcd133420395802ca63f50575564ad", @generic="81617a7414e689b412c2d51f8845b4fb7f2c6f91bef3b87b55244853959494a4a898536197c67bd9ea73db1d60405fd8ffb0d845499938a27bf9c063ac7040af4890aace0e1fe6d96c96f11ff2fc61cf111c", @typed={0x8, 0x1, 0x0, 0x0, @ipv4=@broadcast}]}, @nested={0x1d4, 0x3d, 0x0, 0x1, [@typed={0xb, 0x27, 0x0, 0x0, @str='\xcd!.)\xc4-\x00'}, @generic="907762184989a28f97d4cea07811f4d3d06349e867796ca22770d8a16ee93ea577163ae40542f74aa5b7d843ea5306c3ca6e98e592e59907bf045019734d22a1a8dff86ce7cffd51b9475cd6bc32d93fd2a7ecb9c0597cf16d65503c8afe577c77aa076b8fd107244c32a7e12bde27382c2397f89a05af429ff5a6e04bc8a67465df8cb3aaf77c58cec7cd80cbb36634e67b5728690857abbca1f2803b3f7844434c79fc69dea4bd2b715a6c2ea23d5464865f0eb6d5f4a32a19aeb952f6667ef7364be564b284dc8d46fc68f9deed111a61", @typed={0x8, 0x62, 0x0, 0x0, @ipv4=@broadcast}, @generic="a930", @generic="ccf881127431e264fc110c81a2382cb7de96ece85f467cb6d6b4e497", @typed={0x8, 0x4b, 0x0, 0x0, @fd}, @generic="6c39b179e66415da726c6b17cf47ddcc99787025a9155a5b0c13c2f66bb3d94ec38f9b228ef275a6719822ad2cadec79fd64e7b0ccbfe07b97238c38352025b636e335e9a930cb089a39263c826d4032d74c2a1bec5fc075454fc757818b986fcc8deeb3c454b6716acb7907586a4af899db94b8b7ac70034077af195a29d3a0aee473a0c03b10ce54271fd8c685edafd4a8aa12381deac701dc257be5fb3b68175b6d2b9f71a6d2d4902d9e5e0d2a5951011001", @typed={0x8, 0x37, 0x0, 0x0, @u32=0x8000}, @typed={0x8, 0x41, 0x0, 0x0, @uid=r4}]}, @generic="0d575912250a28ad9549affd9bf890634fd79c31eff14bc4f69abe031e7935204bca01aa0ab516ecab2dcaa0dfa5ac7f58916acb6b8b28bc190a8422453eb90502d5dcaa00e3528be3ec644de0c6a7a8e0e7793a74100b600323e676984b30328a964d28649270f3fa3bd5c1d7afbc8b0583adfa9e039c6be4218db5"]}, 0x384}, {&(0x7f0000000840)={0x278, 0x1e, 0x800, 0x70bd2a, 0x25dfdbfd, "", [@nested={0x1c9, 0x92, 0x0, 0x1, [@generic="4d18e239e497e8587b8de80abb30d2997ae27540e0e03243775a1524e53410909962710948b44ded20889bbe3d9809c7a9d2f66c88c8a40d4fca4ff7e15ccae228d5ba1f916af77480576b3253c6ab4f5a33fa283683d9213b6c00b050d7a480deeaffd46c24bb3861fb07d67a85fc4f796eaf0ca30084f23e22a912092992986de88110dbff7088fb077b1db3c3df981ccf7842209931ab07e1b341b892be1c2e3367bec23a789b610bb187144a0d8d65df6498658e9c7a97a53d95c946bfb62ae6bf449baa6e8cc69a996422842c620482dd9690bed7c78b1c", @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@ipv4={'\x00', '\xff\xff', @loopback}}, @typed={0x8, 0x42, 0x0, 0x0, @pid=r3}, @generic="02b1dcb9d96b706fe49ac2c7e655e53c6e7219b80d0eb1701d", @generic="9ea1151b9c7d624d72764fa74040d194d005dfb23861ca3fe65cec16897202edc039149e7073e133ee06e9a6e3b099093ae5694d6938eb94cb142f3cded21302bb1dae5a1a00fd09c6d01014abc289f48f48e0c72450521ff7a0785774021af7", @generic="ffdcaa010eaf4c9023ba1444dc027300c64210d327f92c60d977159ce92c17eddd9113ea2ae00bc5b14fa7c02c65d088a3229b56de4931de1908e0266f18b51274ae476229950afbf41431fb36b0", @typed={0x8, 0x4b, 0x0, 0x0, @u32=0x20}]}, @nested={0x9b, 0x13, 0x0, 0x1, [@generic="135c1e36144cc1abb5f07f9891b311f436b3c480461a6f79b53b02d3db88d18d3ce9277505099efa0531c2275a5749df784434f167c99ab6f4caee02643b0df93d2a32515dda1afe95da46fc9808925fe605fa4215248392e7627acc054019184e7c60d3a5f903d39cebb6735753c7a2320121430f58fc3af70ea5ac7d9d93ef3afa33418021e634fae0d3198ef1b9", @typed={0x8, 0x90, 0x0, 0x0, @fd=r2}]}]}, 0x278}, {&(0x7f0000000ac0)={0x188, 0x11, 0x200, 0x70bd2a, 0x25dfdbff, "", [@generic="0c7502274c410a50cf5c0f46568e404439b4938edd76e986641e17aecc5568b8b30efd3ec393a39983ffb8597327c4ef3e0499284565acb1f1334da591dca55d284d2d1a666704d19ff3524e", @nested={0x12b, 0x8a, 0x0, 0x1, [@typed={0x4, 0x36}, @generic="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", @generic="e6c6f1bceee44914e06c363e32abba", @typed={0xc, 0x84, 0x0, 0x0, @u64=0x6}, @generic="4040a0d5987089f9477f"]}]}, 0x188}, {&(0x7f0000000dc0)={0x680, 0x1e, 0x10, 0x70bd26, 0x25dfdbfc, "", [@nested={0x1af, 0x19, 0x0, 0x1, [@typed={0xf8, 0x7d, 0x0, 0x0, @binary="121c077a493d21f9ec77bce41d5ed3805b8cf6599eefa580d1ce5e01bbc80dacb2cd8af7451c2ea720bf7d282464000c35cd62048e3d7d371a1bbc6aee12776cd41158997a86512b591083850becbd199ce1f6264a529fd5c2ab5c980ca4aacd43d426cd49a1a6cd6bf030bbc38f27f4aff20de718291bf63d80e1850169209e35c5b67418d328bceab7f5f4da2155d28fafa298344335bff3e0119e402f501c06e98308e5386d62252acd94065d589d282efd74be12579cfd22ddaaf9d1d6443eec58fa8cef752fb4291f2eac4fc5f18f5157e5d17d7bf698d62761e5e6374bd6a3bda516cdfc340f17726f1d61c38c713cf74f"}, @generic="6aa47c1519ccc724457d5da5dedbe4df2df87756b1eb29f28c3f9645baa5b8c4ad1ac11bd9aec34081245964fdac3b00a28c8a624ab70093a2117db426dc9a661ac4561ba1906651978e3bc87c939f02891b1e8cdbb4fb0b26a452a9d812f4733fdef44f3b50d2cb4d946ef00a6f9eea20280db0c31971351f00e6cd3dd464", @typed={0xc, 0x93, 0x0, 0x0, @u64=0x10000}, @typed={0xc, 0x5d, 0x0, 0x0, @u64=0xa89}, @typed={0xc, 0x53, 0x0, 0x0, @u64=0x3}, @typed={0x8, 0x33, 0x0, 0x0, @uid=r4}, @typed={0x6, 0x30, 0x0, 0x0, @str='*\x00'}]}, @nested={0x4, 0x2a}, @generic="16a7b21dc4bf983166d234b9726d15415ade3424d372372eb43ec92133994db5a8d728d0066c693d0d2e9d1c0260eb471812b8f4cff56a322d142fb5449f00442c4e3c5288191b8194896d76cc5eab1ff552a5bcdd568a283c174a3ca10343e877df619bb0adfd56882f770a5aa30d1bbaa12c81eed003856fe173a2c58ab0575c3cc8cf96dcc825ec831470dc3dfdebdcf01b5d75e6fc2d651d14755e93e159be2cb69ce0aa6a3bafb53d8c597ed326a7921d864a9f1c66997f08178810cce62722f26fc62884e21007", @nested={0x3ef, 0x6e, 0x0, 0x1, [@generic="861501d3162f8fa40a417ba382305110404c30f1d15af04788e55d0d405a7815b6a3b52d50ee5e1d7695f15b0f23acccd2eb0258c717ae0b45f8ce24ad43a0179e4097de9d3aa947b736d14d0270acecc696661e5576f8af7aad6d0ef3c463c9fca3ccd12c7f19f468d8a984204d4f04aa8f254d1ac7612a138687292cd6c0986186a286e3d11a3c5616312d1a4eda0d1536031d206ee8658cf82d62d5f27ab32e0e52ef39d10693105317abe15d421cb49c195b8937cb1978167793d75ded7f5080c0abdcdf89753e3bd35e09880dab1943f010c5aea6b0d9ce47033142f876", @typed={0x72, 0x8f, 0x0, 0x0, @binary="d18255c6c0b943571b0bfb4fabdb775e4241927518510012c65ccc78a651d6047e5b312f5badadc3e96504b0f74533b51e83daa3a8116580b047ad8ada9661ff7421da5e542f01e6a2ff8e6d249273a0dc7f17d5d863b5f1972304e0b36927fe34021e43270e4a056696b17fb5c4"}, @generic="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", @generic="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", @typed={0x8, 0x6, 0x0, 0x0, @uid=r6}, @typed={0x8, 0x74, 0x0, 0x0, @uid=r8}, @generic="970fd45332f785a27afe3614250dba24da2c340ac1fda304cc8b49ac4bd49d5a2862a9f7bb1de7d4ea6f870b4dacca522fbb9bf54d594a3767679950a76578e3b8df8219a16b8e8e0a5174c7370040c6a33a5af3ea3981509663ae5deb3dc9b0acb9e63af394636b487e9ccfd52f8af2329dd4d7c97f8bb9abe6be2731acc5d2eee97f", @typed={0x5, 0x63, 0x0, 0x0, @str='\x00'}, @typed={0x8, 0x4a, 0x0, 0x0, @uid=r9}]}]}, 0x680}, {&(0x7f0000001440)={0xb4, 0x34, 0x1, 0x70bd25, 0x25dfdbfc, "", [@generic="dedfea26dd7aee85898e1c372f12196648371b8f582b7df6168e52cb71917348219f45db2bcba3863d9f4b0cf7223bf3c229aaf4c886e34dd9a8f9312ba374974c3e1bc790c5b324", @generic="3ab2c2cb04368ccc56e34a2c4ca732b3c55dd8b0c02d2632383877f466bcd9894ad2434f0eaf8b96e437f6bc4f35", @typed={0x14, 0x1c, 0x0, 0x0, @ipv6=@mcast2}, @typed={0x16, 0x83, 0x0, 0x0, @str='R\trust\xe3c*sgrVex:De'}]}, 0xb4}, {&(0x7f0000001500)={0x30c, 0x32, 0x400, 0x70bd2d, 0x25dfdbfb, "", [@nested={0x6b, 0x95, 0x0, 0x1, [@generic="b1529ca21bb6d70b076472c9d44e80ab069c3c064c3777640ba8fb83b2d666c274e41b26771ce843b6c5f3cdb0879e38859f8824730761c66f95b471d8b4e117fa7ddda7ba468dd090ec7c3e5ada330f380234aa8b96adbdcbddcab4ee95a5731ee5be0cb3083c"]}, @typed={0x8, 0x3d, 0x0, 0x0, @pid=r3}, @generic="4b4a235c6e443b8720d9395ef920b90c0641fd0b75a676caf2d3129c4836f052bb455bbb35e41450fe21900b1a9697a47f2bdd869b7f096ccf5d429ff93b34282e804e33197b47ca10812cc747df71c0c75bc1546443ace401fbcfad99ffdf4bd4c62a7aef7dff2ff5eaed32faa2ab16ca6748c7269739ea31746f8911e03ea8a3f4b213fbda19eddf7b00d9d1", @typed={0x8, 0x5e, 0x0, 0x0, @uid=r4}, @nested={0x105, 0x5c, 0x0, 0x1, [@generic="ebfca7a6db76539acb96301258e36b5db0561fcd33b45914781fcdfcf4aec2bad08c4e6db970a5539c9cbfaddc81640ac6beacc7d7c13d78fd7615b1157d9ea13812d54fd1cafcc27c4d2f3f545c8ea3a02ed44185863e3e3d93ce6dd5631b29d9c7c22e593717eaaa1286421b929a01ebe52c24e8f094fc5480f049cc5b4f569b", @typed={0x80, 0xa, 0x0, 0x0, @binary="ac0ae0c51e71b9b2672290aa6fa94f971c7628eb572b42fba05f95a4b87b5ef3ea54080c057688e42af7d1c37f2a0a5f5bcae3816192805e39aa4bd7279db28fd2536b43f19980ff9d8ca0a70afdba5c542f4c582f8a964bf29769222120654c5b24397bfe1984774fa67c906f484024d36ae3a07787de9ead0ef35e"}]}, @generic="d00e252ab27ab00a71a9e96637b8aa4b6d41079e7a32a9c36234ad474b64d687635a751ee26e27eb1c6ab479be6b56fe3510d380bcc12ad4dcd825fa99c51854fb190697beca7303ec67c4f3e5b216a88f9ab01a3aaf17f174e5685240c2e3205592be45b456458546967a1dc7458d8293eaf0c6bb49eae9266467b1195b0aa32fd8329797bea0d1badcf0c85e96216e41577e87e45044c002ce3672aac1720eb39a863728806edd17757eacf75a4a0a11ec2e5bf4eaa5d51b734050ad8629dd1cc864728aa86d6732b7492776d397217835ff090a5cfee9aaf7f5917d5dcca663a41292bca7eb4f"]}, 0x30c}], 0x6, &(0x7f0000001940)=[@cred={{0x1c, 0x1, 0x2, {r3, r10, r5}}}], 0x20, 0x20000005}, 0x14000000) statx(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x400, 0x2, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(0xffffffffffffffff, r4, r11) 12:26:16 executing program 0: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000000)={r0, 0x50, 0xd1}, &(0x7f0000000280)=ANY=[@ANYBLOB="656e633d6f61657020686173683d6e68706f6c793133303500000000fecda15696c28ef870f100"/88], &(0x7f0000000100)="ec00ab13e274155727caf6f2f3cae17c9f5dc5a6a9f85f1cc0375e1452d48d1df5bbd2d31d5b51db0d5960aaedeb43f96f21d7c37872b513ecc84e6c51c51e9c764038e4bcccc52371de3ffc7f9f9b96", &(0x7f0000000180)="15e8efdf4e6f7c007a652167f70cf5b74d122b89326dad3d15433c772dc29e2f5762e8d66275c719415bec10d77280bd48d911ebf8f6417bedd7a9052e477b99521f2cdcf8e6eb9607a6225d968d98e613e7089513d5e89e80ebaae2d7f85388c98e3f80a2a028384a0fe1891621244ed757e3f84c0d4fc1028f258898905cf2d6d0c5411c438fadc9b9198a252434ebf8df9551adcb9545c25fd4cdcc6cdd97e298c5554c5d650e895fc2763e473dd6b326a41150cc9235cdce5933a843463d980a3c9ea93bc2ca98880f83503ec69d5e") 12:26:16 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trLst\xe3c*sgrVex:De', 0x0) 12:26:16 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:16 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:D%', 0x0) 12:26:16 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x5, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:16 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:Di', 0x0) 12:26:16 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) r0 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f00000009c0)={'syz', 0x0}, 0x0, 0x0) keyctl$invalidate(0x15, r0) add_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)="09b7", 0x2, r0) 12:26:16 executing program 0: mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0x6, r0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$invalidate(0x15, r0) r1 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f00000009c0)={'syz', 0x0}, 0x0, 0x0) keyctl$invalidate(0x15, r1) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0xc) request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='}\'!\x00', r1) 12:26:16 executing program 2: r0 = request_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)="19e4be496992c5504da646697d07f2b5f8323151c9a8af40ea08601dae2ea3bdbd983acfdf425472d3c2d94beaaa05f038e5bd5aa0ed0a5600e194a5a1310a634a626d8a0c946e4816cc669fdcc23457667d6b78add11620ce419cbb744aef9a96011847914dfca3c9f054943dbbe0bed88ad16832f6cfb127ba9a0efcb51f707fcefe4a3001038cced06141372a0b85ec4035ea0849d4700f2119", 0x9b, 0xfffffffffffffff8) keyctl$search(0xa, r0, &(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz', 0x0}, r0) r2 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='syzkaller\x00', 0xfffffffffffffffe) keyctl$search(0xa, r1, &(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0)={'syz', 0x0}, r2) 12:26:16 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000040)=@nfc={0x27, 0x1, 0x1, 0x4}, 0x80) 12:26:16 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x2}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:16 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trXst\xe3c*sgrVex:De', 0x0) 12:26:16 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x7, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) [ 748.424893][ T4369] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 748.433499][ T4369] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 748.444621][ T4369] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 748.452809][ T4369] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:16 executing program 1: request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='R\trust\xe3c?\x00grVex:De', 0x0) 12:26:17 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:17 executing program 0: r0 = shmget$private(0x0, 0x4000, 0x400, &(0x7f0000ffa000/0x4000)=nil) shmget$private(0x0, 0x12000, 0x20, &(0x7f0000fee000/0x12000)=nil) shmat(r0, &(0x7f0000ff7000/0x4000)=nil, 0x4000) r1 = shmget$private(0x0, 0x2000, 0x1000, &(0x7f0000fee000/0x2000)=nil) shmat(r1, &(0x7f0000ff2000/0xc000)=nil, 0x1000) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:17 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trcst\xe3c*sgrVex:De', 0x0) 12:26:17 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 748.508691][ T4369] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 748.517190][ T4369] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 748.531594][ T4369] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 748.539875][ T4369] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:17 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x8, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:17 executing program 1: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r1 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f00000009c0)={'syz', 0x0}, 0x0, 0x0) keyctl$invalidate(0x15, r1) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, r1) 12:26:17 executing program 0: request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:17 executing program 2: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) keyctl$invalidate(0x15, r0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r2 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f00000009c0)={'syz', 0x0}, 0x0, 0x0) keyctl$invalidate(0x15, r2) keyctl$search(0xa, 0x0, &(0x7f0000000000)='logon\x00', &(0x7f0000000100)={'syz', 0x1}, r2) keyctl$search(0x6, r1, 0x0, 0x0, 0xfffffffffffffffc) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0x6, r3, 0x0, 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r3, 0xe4e) keyctl$describe(0x6, r1, &(0x7f0000000080)=""/83, 0x53) 12:26:17 executing program 1: request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000000040)='\xc9\xb4\xfb&\x00\x00\x00\x00\x00qr\x02i\xcf\xb9\t3\xde\x9cZn\xf4\xff\xec\x13r^\x15y\x83\x1f\xd9\xe9\xaed\xe5\xeb\xba\x9f\x84:\xa9\xe9rLc\xd5)*~7?\xcf7_\xe9\x94d\xb0\xf8]X\xa0\xcc\xb8\xac\x0fH\x00\xdaGVZ\xd3\xec\xd5\x85\x17\xfb\xbd\xa8\xcf\xd5\x9f\xe7\xa9\"\xffF\xbd\x92\x8c$\x9a\xeb\x0f\xbcK\xea\x82\a\xfdoIK\x92!\x8a\x9fI\xf49t\x9d\xd8d\xda \xf9u8\xb8\xc9\xe65\xef\x18B\x8c\x83\xf7;\x83f\xea\xd9bT\x9f\r\xc8:\rW6I>$#\xad\xab\x1dQgi\xa8\xa4x\xca\xbek\xdc^\x8c(\xbcC\xbf.8\x89\x98\xa0\xd7\x82\x8a\xd4\x92\x1c\x96f\xb41do\x1d\\\xc7#\xab\xfe\x8e\x8c^', 0x0) 12:26:17 executing program 0: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0x6, r2, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, r2) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0x6, r3, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000240)='syzkaller\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="4bdd0995a249c1b9449b04a99f28520760dfe7c4ab926992e09eafe86602100371790ac75526c702c976c8", 0x2b, r3) request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='R\trust\xe3c*sgrVex:De', r1) request_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)='\\,#\'[-+\x00', 0xfffffffffffffff8) 12:26:17 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trdst\xe3c*sgrVex:De', 0x0) 12:26:17 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) r0 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f00000009c0)={'syz', 0x0}, 0x0, 0x0) r1 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f00000009c0)={'syz', 0x0}, 0x0, 0x0) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) keyctl$revoke(0x3, r0) r2 = request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='}\x00', 0xfffffffffffffffe) keyctl$invalidate(0x15, r2) r3 = request_key(&(0x7f0000000100)='blacklist\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)='R\trust\xe3c*sgrVex:De', 0xfffffffffffffffd) keyctl$setperm(0x5, r3, 0x4000000) [ 748.844388][ T4412] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 748.852709][ T4412] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 748.863950][ T4412] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 748.872041][ T4412] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:17 executing program 5: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x2}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:17 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfe, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:17 executing program 1: shmctl$SHM_STAT(0xffffffffffffffff, 0xd, &(0x7f0000000000)=""/124) r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) mmap$IORING_OFF_CQ_RING(&(0x7f000001f000/0x1000)=nil, 0x1000, 0x2000000, 0x13, 0xffffffffffffffff, 0x8000000) r1 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r1, &(0x7f0000000000/0x13000)=nil, 0x4000) r2 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$SHM_UNLOCK(r2, 0xc) shmctl$SHM_UNLOCK(r1, 0xc) shmctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/106) 12:26:17 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trhst\xe3c*sgrVex:De', 0x0) 12:26:17 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x38, r1, 0x10, 0x70bd27, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x7}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x28}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x25}]}, 0x38}, 0x1, 0x0, 0x0, 0x10}, 0x40) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x2, 0x2, 0x4, 0x18, "98a9e84822c95a57763138c15ecd0fbaffc5f1"}) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:17 executing program 2: r0 = request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000000)={'syz', 0x2}, &(0x7f00000000c0)='R\v\at\xe3\xd6\x10o\x9d\xa2\b\xc7\x9fd|\x91\xc5\xfdy\x83\xa9\x00\x00\x00\x06\x8d\x87\x1a\x00\x00\x00\x00\x00\x00\x00\x00\xfa5-\xf4\xec\x1c\xd4\xe8\xd5\x84\xd4)\n\xe20\xd9\xf0\x1c\xef7\xf0\xf2\xe9\xf6j\xf0^u\vX\\\xf6b\xfb\xe5nv!\xe3\xe7@\"\xcc\xee|\xdd\x16\xe8\xc7b}\xff\xca\xe7Wg\x043p\xc3x\x11\xa0_7-q\x8f\xea\x9dn\x7f\xe6I\x172\xd3\x90\xfd', 0xfffffffffffffffa) r1 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f00000009c0)={'syz', 0x0}, 0x0, 0x0) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000240)='encrypted\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000a00)="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", 0x1000, r0) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)='\x00', r2) keyctl$search(0xa, r0, &(0x7f0000000040)='logon\x00', &(0x7f0000000140)={'syz', 0x2}, r1) [ 748.935818][ T4412] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 748.944017][ T4412] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 748.957860][ T4412] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 748.966005][ T4412] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:17 executing program 1: request_key(&(0x7f0000000040)='rxrpc\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000000080)='RDe\x10,\x00\xf0\xff\xff\xff\xdf\xff\xff\xd20\xbdT\xdc\xd3\x00r\xf4K\xac\xdfm=\xc0\b\x00\x00\x00MJ\x89\x15\xc3\xeeO18,\x9f\xb0\x05\xc2\xf9\xc5\xc4\xfaMQ\xadJ\xabO_\xfe\x1a|\xf3\xb0.[?\xa4\xf6\xe7\x95\xe5H\x9c\x90eA,\x98\x84/%\x1b\x8e\x1es5;p\xea\"\nF\x1d\xec\xc5\xfd\x00\x00\x00\x00\x00\x00', 0xfffffffffffffff8) 12:26:17 executing program 5: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr.st\xe3c*sgrVex:De', 0x0) 12:26:17 executing program 1: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000000180)='o\trust\xe3c*sgp\xcd\x1c3\xb6K\x9a\xaa\xf4\x88\xff\xde\x04\xc4rVex\x86De\xd0\xb2_c&\x19\xd5\xf8\x96x\xcf%\xed\x05\x00\xae\xadw\xa7\xab\xdc\x97Y\xdak\xdc\xa43\x9bk\x138x\xf8\xe3\xf2\xd2\x86\xf6\xb6)\x06\xd4#\xb3\xbb%\xdd\xb1\xa8_\x92=p\xe1\xb3\xf7w\xe0\x8a\x8f\xd1\xaa\xd0\xc6cf\xc0\x1c8\xf2=} H\xab\xcdMSc\xd3\xe7\xe7\x1b9Q\x80A\xc1\x1d(\xab\xc9\xbb\xa8\xa6\xb3\xf3\x7f\x8c\x8dbl\xfa\xe5\xbc\x83G$\x1a\xcbh\xb3R\b\xf7\xa6\x94\xe1\xe8\xf3\xb5\b\x80\x8fTQYL\xf2\x8e\xae\x0e\x86P\xd0\x04{;r;\xddn\x91)rJ\xf1\xc9W\x94\x8d\xb7Y!\\\x1ax\x1ej,\xe9j\xdcx\r,\xe1\xd0n\x90)\xb8', 0x0) 12:26:17 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000000)='R\trust\xe3c*sgrVex:De', 0xfffffffffffffffc) 12:26:17 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x300, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:17 executing program 1: request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000000000)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:17 executing program 5: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:17 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x500, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:17 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0xc000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000600), 0xffffffffffffffff) syz_genetlink_get_family_id$wireguard(&(0x7f0000000540), r0) sendmsg$ETHTOOL_MSG_EEE_SET(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000640)={0x18, r2, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_EEE_HEADER={0x4}]}, 0x18}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000003c0)={'vcan0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) r5 = socket$packet(0x11, 0x3, 0x300) r6 = socket(0x11, 0x2, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) rmdir(&(0x7f0000000500)='./file0\x00') sendto$packet(r5, &(0x7f0000001340)="97cd82f513b7e9323bba9b2988f7", 0x1000e, 0x0, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1b4, r2, 0x100, 0x70bd26, 0x25dfdbff, {}, [@HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x1}, 0x10) sendmsg$IPCTNL_MSG_CT_GET_STATS(r0, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x5, 0x1, 0x801, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x4040001) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:18 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trist\xe3c*sgrVex:De', 0x0) 12:26:18 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x700, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:18 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0x6, r0, 0x0, 0x0, 0xfffffffffffffffc) r1 = request_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, r0) keyctl$invalidate(0x15, r1) request_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', r1) keyctl$setperm(0x5, 0x0, 0x8000500) 12:26:18 executing program 1: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0x5, r0) r1 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f00000009c0)={'syz', 0x0}, 0x0, 0x0) keyctl$invalidate(0x15, r1) request_key(&(0x7f0000000400)='trusted\x00', &(0x7f0000000440)={'syz', 0x2}, &(0x7f0000000480)='encrypted\x00', r1) keyctl$revoke(0x3, r1) add_key(&(0x7f0000000300)='rxrpc\x00', &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, r1) r2 = request_key(&(0x7f0000000240)='encrypted\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000002c0)='asymmetric\x00', r0) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$search(0xa, r0, &(0x7f0000000380)='rxrpc\x00', &(0x7f00000003c0)={'syz', 0x0}, r0) request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='keyring\x00', 0xfffffffffffffff9) add_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000580)="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", 0x21d, r0) [ 749.532337][ T4498] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 749.540592][ T4498] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 749.552957][ T4498] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 749.561003][ T4498] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:18 executing program 0: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='R\trust\xe3c*sgrVex:De', 0xffffffffffffffff) 12:26:18 executing program 5: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 749.615108][ T4498] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 749.623431][ T4498] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 749.637348][ T4498] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 749.645909][ T4498] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:18 executing program 1: open$dir(&(0x7f00000001c0)='./file0\x00', 0x100, 0x78) r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='syz', r0) request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)='asymmetric\x00', r0) 12:26:18 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x1) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}, 0x18) setsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:18 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xeffd, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) ioctl$BTRFS_IOC_GET_FEATURES(r0, 0x80189439, &(0x7f0000000000)) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) keyctl$reject(0x13, r1, 0x9, 0x1, r1) 12:26:18 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x1a0682) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f00000001c0)={0x80, 0x1, 'client1\x00', 0xffffffff80000006, "d62e980da99179cf", "20e48560999fd132b6a5426180a8c27a00fcfffff0003336f794d20352346f8f"}) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x2}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:18 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfcfd, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:18 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trlst\xe3c*sgrVex:De', 0x0) 12:26:18 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfdef, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:18 executing program 0: request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='R\trust\xe3\x0f\xea\xe66`\xc4\x01l\xcc\x88\xd9\x0f\x9d\xce\vc*s\xcdv\x9e\xb5d\x19\xcb\xf6:\x1c\x92Q:\xb8\x00iC\xceo\xa7X\x8e-\x95@zcP\x17\xcc\x7fR\x9b\x7f\x8eQ+c\xef\xbd\f\xfd\xec\xd5\xa7zo\xe9\xf5\x8b\xf0\xcb\x05\x19\xc2,\xcd\x97\x14\xca\xdc\xb8\xc1~0YG\xb1\xe7\x90\x1c\x18\xa09\xfa\x948\xa5sy\xf7vT\x1a\xce\n\x8f\x9f\x93\xbc\"\a\\B\x1f\xedkH3\xff+o\x835\x1e\xbb\x9f\x95\xe3i\xdb\x80\xb67\x18q#r\xa0{\x98z\xc9J\xf9\x8b4\xee\nR\xae\xc3\xd65\x81\x0fOu\xa3h\xc7\x0fb3?\x88\xc0$\xf7\xd6=\xfc8\xf0p\x12\xdb|\xad\x10)\xfc\xce\ru\xc6A\xe0\xd5\xcc\\\x8a\x7f\x8b', 0xfffffffffffffffe) 12:26:18 executing program 1: r0 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f00000009c0)={'syz', 0x0}, 0x0, 0x0) keyctl$invalidate(0x15, r0) r1 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc3}, &(0x7f0000000240)={0x0, "b3897bddbe8e8e94079c6978299cc7fbee57ba7a681ab27cc622e6e551ccb51ae95b0aa06c5f3e34ef4ad2f3dc55c507caa745220cefe0058392bb2c3b3c86ba", 0x13}, 0x48, r0) r2 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, r1) r3 = add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @auto=[0x33, 0x63, 0x66, 0x39, 0x33, 0x32, 0x64, 0x66, 0x30, 0x31, 0x0, 0x32, 0x38, 0x37, 0x33, 0x63]}, &(0x7f0000000580)={0x0, "ad39727c0cefabfba7025896d0d3dee7af2c2f6e3212e91299aaf70d5f8e8c916849855f8a7f1fdb4dfca5fb9f23995c4eeebd5acdaaaec3dfa6cf7a587d1061", 0x1d}, 0x48, r2) keyctl$read(0xb, r3, &(0x7f0000000a00)=""/4096, 0x1000) keyctl$link(0x8, r2, r0) r4 = getegid() keyctl$chown(0x4, r0, 0xffffffffffffffff, r4) r5 = add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f00000003c0)={'fscrypt:', @desc4}, &(0x7f0000000400)={0x0, "2c84102506cba7787a84bf03f8be7867aeb449f3bb677a5ef22f074da82297512e5e28fc4198985603694631adc950e4a76213e153ee7451bd6f9ee69a98b5dc", 0x14}, 0x48, r1) request_key(&(0x7f0000000140)='cifs.spnego\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='syz', r5) r6 = add_key$keyring(&(0x7f0000000180), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$search(0x6, r6, 0x0, 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='@\tDJ\xd5:\xf2\xd3\x8f\xf3P+\x95\xd7-\xce\xf2\xcdp\x1eq\b\x87\xa9\x8d\xe45\xd1\xf3R*\xfai\xc3\xdc\xaf\xccK\xf2\xf8&\x11\x00\x02\x15c\x0e\xa9\xb25\xbf\x98\x8f\xfck\'\xc0\x12\x1aaq\xc9\x19+;\xbbd\xd9rI\xa4\xd9K\xd7\x95\x92\xe2\xc4vy\xae\x1d\xe5\'\xd7\v\xf0\x19\xa2\x88\x8d\x88B\xc8\xeaL\xab\xdcD\xbaud\xa6\xbf\xba\xc53\xf0H\x8fq\x9f\x8eq[;x\x15\xf4\xcd+\xfaa\xc0T(i\xe1%c\x1e\xbd\xc9\xe6Ei\x8e\xa1_\\\xd2\x8bh\xe2\xa2o\x95\x85\xf1B~\tA\x05\xc7\xabM\x1dG~|\xf7v\xcbdQ\xe5R\b\xb1', 0xfffffffffffffffe) [ 750.124636][ T4537] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 750.133170][ T4537] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 750.145405][ T4537] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 750.153854][ T4537] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) request_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='*]!\\\x00', r0) 12:26:18 executing program 5: request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='R\trust\xe3\x0f\xea\xe66`\xc4\x01l\xcc\x88\xd9\x0f\x9d\xce\vc*s\xcdv\x9e\xb5d\x19\xcb\xf6:\x1c\x92Q:\xb8\x00iC\xceo\xa7X\x8e-\x95@zcP\x17\xcc\x7fR\x9b\x7f\x8eQ+c\xef\xbd\f\xfd\xec\xd5\xa7zo\xe9\xf5\x8b\xf0\xcb\x05\x19\xc2,\xcd\x97\x14\xca\xdc\xb8\xc1~0YG\xb1\xe7\x90\x1c\x18\xa09\xfa\x948\xa5sy\xf7vT\x1a\xce\n\x8f\x9f\x93\xbc\"\a\\B\x1f\xedkH3\xff+o\x835\x1e\xbb\x9f\x95\xe3i\xdb\x80\xb67\x18q#r\xa0{\x98z\xc9J\xf9\x8b4\xee\nR\xae\xc3\xd65\x81\x0fOu\xa3h\xc7\x0fb3?\x88\xc0$\xf7\xd6=\xfc8\xf0p\x12\xdb|\xad\x10)\xfc\xce\ru\xc6A\xe0\xd5\xcc\\\x8a\x7f\x8b', 0xfffffffffffffffe) 12:26:18 executing program 0: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000000)='id_legacy\x00', &(0x7f0000000080)={'syz', 0x1}, r0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0x6, r1, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={r1, 0x8f, 0xa1}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha256-asm\x00'}}, &(0x7f0000000180)="ef8d6470b5164e8ee1d49b806cc86343c27d8baa78dfecf42c6bb35a18e7f7c54d7e2389739cef230d2c4282b30d1199fa84b6c8261618c2097565e8117dc854bc5c8b42e6f7e116c18f6b3f7c9eceb13d46254a66b2cfa64156a1b80b035873a0e4d2b649bf2fe5201229b60d53944a35bd28124f94d60882c95bcf134eec4815ea4128c2be0522e5f24a3586a162", &(0x7f0000000240)=""/161) [ 750.244122][ T4537] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 750.252424][ T4537] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 750.265171][ T4537] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 750.273187][ T4537] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:18 executing program 5: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:18 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfdfc, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:18 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc3}, &(0x7f0000000140)={0x0, "50823f1d00000000212ff1d344a11afdc3876c2eb731be3d65b421a41df42c4e566e93e5e7d1950d67f6fa6f8d56bfba4ff8086edb241de337b3da2ed780a122", 0x10}, 0x48, 0xfffffffffffffffc) keyctl$reject(0x13, r0, 0x80, 0x886, 0xfffffffffffffff8) 12:26:18 executing program 0: request_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f0000001ffb)={'syz', 0x2}, &(0x7f0000000080)='R\x9dpust\xe3cKsgrV>m\xfc\x80e7\xf0\x85\xbf\xb3\x15fb\xea7\xac\xac\v\xd8)\xd7x\x92vU;|\x0f\xed\xaezCY]\xe6\xba\xc3/hI\x02', 0x0) 12:26:18 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfdfe, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:19 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trost\xe3c*sgrVex:De', 0x0) 12:26:19 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_PHY(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x800, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8000) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) request_key(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='!\'\x00', 0xfffffffffffffffb) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)={0x14, r4, 0xc9647caf603edff5, 0x0, 0x0, {0x26}}, 0x14}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GET(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x50, r4, 0x70c, 0x70bd2a, 0x25dfdbfc, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}]}, 0x50}, 0x1, 0x0, 0x0, 0x40084}, 0x0) r5 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f00000009c0)={'syz', 0x0}, 0x0, 0x0) keyctl$invalidate(0x15, r5) add_key(&(0x7f0000000400)='pkcs7_test\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r5) r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r6, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x98, r4, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x98}, 0x1, 0x0, 0x0, 0x804}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GET(r3, &(0x7f0000000600)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000a45de8100fbdbdf253d002000"], 0x14}, 0x1, 0x0, 0x0, 0x24000006}, 0x8003) 12:26:19 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) r0 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f00000009c0)={'syz', 0x0}, 0x0, 0x0) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='#\x00', r0) 12:26:19 executing program 0: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) request_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='\x00', r0) 12:26:19 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfdff, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) [ 750.702622][ T4599] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 750.711896][ T4599] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 750.723381][ T4599] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 750.731515][ T4599] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:19 executing program 0: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='\x00', 0xfffffffffffffffd) 12:26:19 executing program 1: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x0}, &(0x7f0000000140)='R\tr\x81\xff8\x94\x16RDst\xe3c*sgrVex:De', 0x0) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "86ef94e428cba10cea9d9759460bcb159378f25e206a24df17cced9dfab7d56456dc6f9b9cfbc100000000000000e25d9350f400", 0x10012}, 0x48, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000200)="44f9296c6db858072c2a5bc1445d6df52449d82cbab617d6ef38102157d29bd8", 0x20, r0) [ 750.798105][ T4599] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 750.806308][ T4599] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 750.822722][ T4599] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 750.831049][ T4599] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:19 executing program 5: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:19 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trpst\xe3c*sgrVex:De', 0x0) 12:26:19 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="66530700ae897094e7b1058000000000000005c41bd34e677de3f3de728d33b0994dd7cb4e0e71558d07b83c7b0a8783f20ec92ce07a6e5a0f045044f97d0e989ce35a3288bf0015b34f49d788bbe94f5f3647d3778ca204a19e1e2cbf9622bfbb84c4147574456173150b0000000000", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) request_key(&(0x7f0000000100)='trusted\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='-\x00', 0xfffffffffffffffd) r1 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f00000009c0)={'syz', 0x0}, 0x0, 0x0) keyctl$invalidate(0x15, r1) request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='-\x00', r1) 12:26:19 executing program 1: r0 = request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000000000)='R\trust\xe3]\xd8bS9c*sgrVex:D\x9a', 0x0) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, r0) add_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100), 0x0, r1) 12:26:19 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfe00, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:19 executing program 0: r0 = add_key(&(0x7f0000000140)='logon\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="92a0952dc6d37be46b0c4a98f329d1933dfa20458a79c1e0e66082f1fc81e2fae192435cbebaffd7238668a6f45957b26e62f1ce55d79111bb67036d7f0a19018fbeb344548a0f7d9ab0aafe11879779c08959baa99888e04dc2deda2e15afcc485606350bfa730b1c5393ab3898d91e8743cc02319ac4f8bd397e81ac07c8285dcef89868c57e56252faaac79f5dc70ee13f9ec5a545192abe2fc2336480d69b9271e15c76231eb6325d2b90f35764d56bcc4c9e3372f548416d197e322fe3d56181abca5d66498860cfa94628dbff9026cf3bc58eced3a69e91b9461b33b9d282f338864ba2312d53893a3efd35e05dc65c1741ff00a01c0", 0xf9, 0xfffffffffffffffb) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000000100)='t\xb3\xee\xef\xd4g\rr}%:D\xfb\xd5\xcd$\f\xae&Y/\xc4\xef\x9de', r0) r1 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f00000009c0)={'syz', 0x0}, 0x0, 0x0) keyctl$invalidate(0x15, r1) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='syz', r1) 12:26:19 executing program 1: setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000080)={@in={{0x2, 0x4e23, @empty}}, 0x0, 0x0, 0x35, 0x0, "acd1bf25ab9ce14eb222f8c71950dd19cf0d9300a5c30c5b098d0f9bcdfb89a7ad6de523fdafde338a7e3fb0fde3159748f93ad54551a82f015e4b936a8657723ae3a24e18bd9872ff729ef283828f1f"}, 0xd8) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:19 executing program 2: r0 = getpgid(0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r2, 0x0) getgroups(0x1, &(0x7f00000001c0)=[0xee01]) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000180)=[{&(0x7f0000000080)="66a9a4224655ddfecc3440530e06a1e0429435fec23befe76e0f35d070c153a80bbfaf6455feffc9413e6c94623c5ebe5cd8c9372fc4271cddc74168dc431efef623284aa7a864a9bbaef284ed6e1d82ff7eba15bc8753cdd58fd70dd8809e945f9180bfad114c5007acb3561c3e9161ddc14449ca20b0681ca2ab1ae4ae3672f542df52483f1c0d2782de9bf8949282023f82fd4f96d5ea35c4468fd68d917857838710f04e79fae28ed5fddc", 0xad}, {&(0x7f0000000140)="db02b78143c02889b7713c00d16a9a5f982bf2663dc3477fcc2878fd8a7c30f2c1761316475e5b2d0bb38d99f771266b72c2f48b92b8", 0x36}], 0x2, &(0x7f0000000200)=[@cred={{0x1c, 0x1, 0x2, {r0, r2, r3}}}], 0x20, 0x8010}, 0x0) 12:26:19 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trsst\xe3c*sgrVex:De', 0x0) 12:26:19 executing program 2: add_key$user(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="cb028d4a96e63b4bb9f04f651c2053e4cbc0a5e540522bd5a337c491a1c1b5d551f766f513f5b53e16b877873b6675a411b25ba6c725e702cf13545103f5f2d8bfd4de49dff13dfeb9ea7c6badae9653a0aa0ae62541f46eab8313f7f322d58a9320d41d7ca816a1c7cd57c49bf68d1877f81b3d86a430e360e21250159dbcc6410f8b5bc960749e9d906d60ffc353493bf57762005799e9", 0x98, 0x0) r0 = request_key(&(0x7f0000000040)='rxrpc\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)='\':/\x00', 0xfffffffffffffffe) r1 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc2}, &(0x7f0000000280)={0x0, "b14d86b728aa2b1f739f0b99725d4d10440f400a8f3c1ffeb85ea5d264e2e80b133a94d82d569b766447b54fef577e02f4cbbe7f0fc6212c38c00b742c8bb886", 0x18}, 0x48, 0x0) r2 = request_key(&(0x7f0000000500)='rxrpc\x00', &(0x7f0000000540)={'syz', 0x3}, &(0x7f0000000580)='*\x00', r1) keyctl$KEYCTL_MOVE(0x1e, r0, r2, r1, 0x1) r3 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f00000009c0)={'syz', 0x0}, 0x0, 0x0) keyctl$invalidate(0x15, r3) add_key$user(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)="a239df47dcdde9b3df456d1c5d18d4c412f85308575313b8d09a4ce30eb382a62ea58e8aa332e9d7466bdc0837358a7ad783a5f8483bb03b7926059b5a91446f0b886642b78101f4d8400ec1fb5750d6bef7ba0f5a5482a39d7799da7865bb8d411c4176ff824dbf5be5fa82ecd6ae1f6b684940cc947946c8bc574c71eb9f1bc0cc42f119679ac2ad58dc3d49a5b69b3d664b896730377baa49d0babdd918143cd233d4378d7298caed85ac7335da1bbe97042337fcca556421f1dcffc71477800301ff6594b36196d5352ce4d344c8206a5b4521f4d5f226c630854b7d5e0cff6e00f8bb896aa9aa1b33", 0xeb, r3) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r1) 12:26:19 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfefd, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:19 executing program 1: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) r1 = request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='syz', r0) keyctl$link(0x8, r1, r0) [ 751.223824][ T4655] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 751.232616][ T4655] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 751.246327][ T4655] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 751.254313][ T4655] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:19 executing program 5: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc3}, &(0x7f0000000140)={0x0, "50823f1d00000000212ff1d344a11afdc3876c2eb731be3d65b421a41df42c4e566e93e5e7d1950d67f6fa6f8d56bfba4ff8086edb241de337b3da2ed780a122", 0x10}, 0x48, 0xfffffffffffffffc) keyctl$reject(0x13, r0, 0x80, 0x886, 0xfffffffffffffff8) 12:26:19 executing program 0: r0 = request_key(&(0x7f0000000040)='pkcs7_test\x00', &(0x7f0000001ffb)={'syz', 0x2}, &(0x7f0000001fee)='R\t\xaf\x8d\v\xe2\x00[\xbb\x1e\xe3\x0erust\xe3c', 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, r1, &(0x7f00000000c0)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, r0) keyctl$reject(0x13, 0x0, 0x8, 0x80, r2) keyctl$invalidate(0x15, r0) keyctl$clear(0x7, r0) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000002c0)='rxrpc\x00', &(0x7f0000000300)) r3 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f00000009c0)={'syz', 0x0}, 0x0, 0x0) keyctl$invalidate(0x15, r3) add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r3) keyctl$search(0xa, 0x0, &(0x7f0000000140)='rxrpc\x00', &(0x7f0000000180)={'syz', 0x2}, r0) 12:26:19 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trtst\xe3c*sgrVex:De', 0x0) 12:26:19 executing program 2: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) keyctl$describe(0x6, r0, &(0x7f0000000080)=""/4096, 0x1000) 12:26:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) preadv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/45, 0x2d}, {&(0x7f0000000040)=""/159, 0x9f}, {&(0x7f0000000100)=""/245, 0xf5}, {&(0x7f0000000200)}, {&(0x7f0000000240)=""/85, 0x55}, {&(0x7f00000002c0)=""/221, 0xdd}, {&(0x7f00000003c0)=""/102, 0x66}, {&(0x7f0000000440)=""/6, 0x6}, {&(0x7f0000000480)=""/207, 0xcf}, {&(0x7f0000000580)=""/108, 0x6c}], 0xa, 0x5, 0x2a) [ 751.315708][ T4655] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 751.323936][ T4655] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 751.335692][ T4655] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 751.344257][ T4655] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:19 executing program 0: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) request_key(&(0x7f0000000180)='rxrpc_s\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='*&-\x00', 0xffffffffffffffff) 12:26:19 executing program 1: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x0}, &(0x7f0000001fee)='\xe3c*-\xefv\xda\x9a\xe3\xbd\x8ae', 0x0) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='@)%\x00', 0xfffffffffffffff9) 12:26:19 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffd, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:19 executing program 5: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:19 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000340)='./bus\x00', r2, 0x0) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)=0x0) fchmod(0xffffffffffffffff, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r4, 0x0, 0xee00) fchmod(r4, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r5, 0x0, 0xee00) fchmod(r5, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f00000002c0)=@kern={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000ac0)=[{&(0x7f0000000300)={0x1c, 0x2c, 0x400, 0x70bd27, 0x25dfdbfd, "", [@nested={0xc, 0xf, 0x0, 0x1, [@typed={0x8, 0x6f, 0x0, 0x0, @str='\xf4-\xdb\x00'}]}]}, 0x1c}, {&(0x7f00000004c0)={0x5d0, 0x3a, 0x1, 0x70bd2b, 0x25dfdbfb, "", [@typed={0x8, 0x1e, 0x0, 0x0, @uid}, @generic="e60aeea35239776a25fcfbf96bc00d5fbb1f0315bf7fa78ec5bd2b1ae2641ce9881fcd04a8c9c715f9fb391e11d9dfa3b73e63dbc0ba141d6a0099d0b641cce2ebacf0abfd323258b8fbd69eefcd4b73960d00a606acbac2dbe2dcb4e7aba7d16bcd90af161f69f9106b112c31978bf2ebbfe96cd16299fe7c4720eba8e6b5b3851741b930535bbc733dc090f026b1fec209cad93b343ef9bcddc3761cf144ca5f3a", @typed={0xc, 0x39, 0x0, 0x0, @u64=0x7}, @nested={0x185, 0x26, 0x0, 0x1, [@generic="b288dfc2a2ec542f6c536b592a6bb6322b09f97100725b2360d8121d865a83e1739fe620953e81bd23cda884e866", @typed={0xd3, 0x56, 0x0, 0x0, @binary="2ed0be056bf0d4da9cf061d026165d210eac66e26afcd112c4b638eb0fab314a577ab0d6cada707c93859f51108968c41113335bc815ed53017eb5adaa2470bcbf9e0816ef7c05517cd412e946c631ee4cb0c9dcf6c207d79767b8cee917dfceb7fc40ad301451405c82dac04dc9e4472c3858b50056a45218728df99cdb4c527a70bdf514202828289417a4acea13692c469a3db477b937301859690f9c87f8ed492f18b2fe9d8b9a633be16389cea32e7e8f0373ffbfe9c9155b6418e1a1043a88d3c785de568e6cfa26bb0609be"}, @generic="95db87b2af0735a6e17767299f7deb1e0ec87f9036774e9cb77b4f06243acdcc8ebfe319e27d6b71381a9d6d906713908e112f18df5f46bb9ababaf3d1f589384669606689b2bd70f65b524d22e819fe451b20319e3cf7e9d7d03041840c69ad8a23f53e8298f3eba626090a9fff6e41a3e7bd6eed24be124ae87fad57d250"]}, @generic="80dee7bb5ed8024d7a457fddccf57beaa030390f13dac823bc4d0cec3455561b01824e12870f620e9c749e89767257c03c550e96d785718b4a9c99cc5f8c04e84e2bc117ebac3ae387671f9f23aae22e4b8cc1c7975d96dc167a8c490b9e31a110f5a33f6caa57162937d5decc4f99e035c55d284db3306c205fb971", @typed={0x4}, @generic="1c41e20363f11a1e37f819c62feae1189259cc6ab64759943ec622157f982cc85f5389ef60f93276ba3dcfe0c73f603293efdefb2ff1740b01f9eb3460b8eace4923097507eddc4ac6ab778e9f4b2a4f14913110971b4ab0e34dc7de8f4b21290a16d4c119b00e74ce8ef2054ae0443bd22070ca1fceb619164f6b5d3d410ef92c8c544ca7f444dc6c84682fe44150ef91abb4d5b0db6a5a6b5578f987287d69c7dbf56d120bb6d69823956a", @typed={0x8, 0x35, 0x0, 0x0, @ipv4=@local}, @nested={0x24b, 0x3c, 0x0, 0x1, [@generic="f2f305375c03bf7e2a2677bb119afc35a3a0964f59d789478fdd8a67210c625dbf888699e3afcb2a8e7a31e4c227dad1a0aa7bc724ed62357fe299c5d412e209abccec7d25888aef5f813cdd359b4b12ff78120c812732782d886cb3f694adce3f16fcc3bd5626887e57169275afed07429a36b143109666a596ef9f8d15990239af76b0552bffb4f6937280f92a3e1ce965447366", @typed={0x84, 0x53, 0x0, 0x0, @binary="ad4e9699b6088895ab1d0a0542ec933f3252cbabe25ff60696d9f27453b280b786ba88710de845f49684ab6f5fb63f11bc9d50962a8e6d812d2a5c70212fe7abbf87ac9b9bef61e2a7114b73a74a73e858b932c0e0372204ac0770494b6515cb803161feffeef7c9dc58a93a1058e2f5b85050cb0884d6483f5cf61bf3a5b2ca"}, @typed={0x8, 0x42, 0x0, 0x0, @uid}, @typed={0x14, 0xa, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @generic="fb01df6e9ead223ea42196792660acf0aa8f832c1e0c81270dda97d6a9e898a2bec238269e55078a500eacc154dae78dfc674ba6af72aa744b308f4e671d637050d743d6e9deead652858a8e64fd8f14c7b9a3b0b363fc8e3036079d3c8d2c584d8dc7a602abb5bfc806e3d55fd91d072dd7e66a59cbdbf43964c885e9b13fbd45f60b856331aeafa8", @generic="6af81da6ad8052f492692c47ff99e81642a11c0dcc57797102523f7fc6093790e962cef02ec93b56897b0b8d99672e014fd33d6de4f043436abc303499374b784d6b4c340bea52d5c764a589eafd2dbd5070b4bb898f4c87c7a77b62a6a09e23d0d76c9d4d149d8b0dd6f0359a6746dfbb7e12e4adf5907cdd9512e6f568ba0e5465f4a7a29a1fbbcf"]}]}, 0x5d0}], 0x2, &(0x7f0000000b00)=[@rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [r4, r0, r5, r6]}}], 0x60, 0x1}, 0x4000010) fchownat(r0, &(0x7f00000001c0)='./file0\x00', r2, r3, 0x800) r7 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) r8 = add_key(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="edc55391b731eb4e8b660196905dfbc1fbe615e1e8fa6a33b04dde3f59023818daa032", 0x23, r7) add_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)="23474d0b084c7fc2504a1447f3a855445680610acd7c8570e9b0f6b3ba166ca28b0cd3b231c6c960ff84240d", 0x2c, r8) 12:26:19 executing program 0: socket$inet6(0xa, 0x80000, 0x7ff) request_key(&(0x7f0000000140)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x2}, &(0x7f0000000100)='R\trust\xe3c*sgrVex:De', 0x0) request_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='\'\x00', 0xfffffffffffffffa) 12:26:19 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trxst\xe3c*sgrVex:De', 0x0) 12:26:19 executing program 5: r0 = getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)={0x0, r0}) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x2, &(0x7f00000005c0)={0x0}) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x7) sched_setattr(0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:19 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/timer\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:19 executing program 1: msgget$private(0x0, 0x1) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0xffffff1c, 0x0, 0x0) msgsnd(r0, &(0x7f0000000080)=ANY=[], 0x2000, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000380)={{0x0, 0xee01, 0xee00, 0x0, 0xee00}}) msgsnd(r0, &(0x7f0000000100)={0x1, "dfbd54b1be4757ba6e6f6568e41956d1e946ca419bfb546bb7f3404668ec5fd6cc"}, 0x29, 0x800) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:,\x00', 0x0) request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='/:\'\x00', 0xfffffffffffffffb) 12:26:19 executing program 0: ioctl$F2FS_IOC_WRITE_CHECKPOINT(0xffffffffffffffff, 0xf507, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:20 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) add_key$user(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)="45bb2c6a66792314fd9826ea10aa05673df3f39e3bf3b9483410f63de6987a2235282c3effb6f9359566f57dc553d6d9033ece2c815458f2c5724f79297ac3a386a7d1c1cff1ccd88fde8ed505e2f8b3368406e43caa0d6c7e5c52901b040a592fbcbccce8e36540fe162a4aa7626cdb9a3c72fd8ff091", 0x77, 0xfffffffffffffffc) r0 = add_key$fscrypt_provisioning(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)={0x1, 0x0, @auto=[0x32, 0x2c]}, 0xa, 0xfffffffffffffffb) keyctl$update(0x2, r0, &(0x7f00000002c0)="18d0a2b6d58e5e38a7032067dff406da51459a35bdb1d43d7b7f97d75fd8679891f7d99b12e7f3894b4902450c4e6401e97c2e8ed00fb40891c2379bbde0b55a13ac10221c0e4582df9369fce74acc422d9122cf6923c6d5ececea96298c84ad485295e0157fa5a0095d17aa8771822e8f1cbe7eae344e6a91db3ee574510a172d2be6c1736b6ed3d41f69f1fb32b6c27fbebb908555ac4bc94eec6a35e404e6ff", 0xa1) r1 = request_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='syz', 0xfffffffffffffffd) keyctl$update(0x2, r1, 0x0, 0x0) r2 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f00000009c0)={'syz', 0x0}, 0x0, 0x0) keyctl$invalidate(0x15, r2) add_key(&(0x7f0000000380)='id_legacy\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)="9738e5db91a5e9ee35107a1e064581e72160ae3ed991ede15629aacff1ee66f3e80e4814b3782960cbdb94f01a3bd8272712754e060284a3d3cb0917f9db9585925b221b2f84a7b11c024d7d5dcbef714f97026b1c398db139f5e1558b8d1e12f024f7936224eab20b8f9efe5c3869a9c4de079ab17946998e479de1929dba15dd03ab06f37acd1512e781e54770473863018eaa3545b15e2cea8c0094e5dc7814", 0xa1, r2) 12:26:20 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xffff, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:26:20 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trzst\xe3c*sgrVex:De', 0x0) 12:26:20 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x2, 0x0, 0x0, 0x2}]) 12:26:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fchown(r0, 0x0, 0xee00) fchmod(r0, 0x0) accept(r0, &(0x7f0000000080)=@alg, &(0x7f0000000000)=0x80) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:20 executing program 0: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) r1 = add_key(&(0x7f00000000c0)='ceph\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)="23ea2959d1fbe6bc30a62bcb39c2f9393639dda45bb4874049ecdc052af06d103127709d4b36919e6d9c56b1b58c94f2b25a3827400d0333025cd0cf78f39bb79b6ff190804d17a6bbeba0793efce1941c8f3bf939ec21914b7260e0ebcc2f0e4972163a8123d0b39b140efaf4a393ba99188cf9aacee011dcfc539fac940fe4829bef5872318997027e8a98ffba13a10dd0495b", 0x94, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r1) r3 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f00000009c0)={'syz', 0x0}, 0x0, 0x0) keyctl$invalidate(0x15, r3) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, r3) request_key(&(0x7f0000000280)='encrypted\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000300)='keyring\x00', r2) add_key(&(0x7f0000000340)='blacklist\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r1) 12:26:20 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tru%t\xe3c*sgrVex:De', 0x0) [ 751.804011][ T4753] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 751.812779][ T4753] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 751.824566][ T4753] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 751.832713][ T4753] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:20 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) request_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='syz', 0xffffffffffffffff) 12:26:20 executing program 5: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x3}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) fchown(r0, 0x0, 0xee00) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendto$packet(r2, &(0x7f0000001340)="97cd82f513b7e9323bba9b2988f7", 0x1000e, 0x0, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @broadcast}, 0x14) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, @xdp={0x2c, 0xa, r4, 0x1e}, @sco={0x1f, @none}, @nl=@proc={0x10, 0x0, 0x25dfdbff, 0x200}, 0x6840, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000000080)='hsr0\x00', 0x1ff, 0xe51b, 0xffff}) fchmod(r0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r0, 0x942e, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x5, 0xffff6a4d, 0x7, 0x5, 0xfff}) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) [ 751.898358][ T4753] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 751.906627][ T4753] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003ba08e19 [ 751.920169][ T4753] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 751.928702][ T4753] ref_ctr decrement failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fe2cd7f5 12:26:20 executing program 5: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x2}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:20 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*%grVex:De', 0x0) 12:26:20 executing program 2: ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, &(0x7f0000000080)) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "e755ff20ed82464782d48beead9d3d2207d509f481006868e353a01fe3cadbf4897539f093bdeef6236534482c9bb7110f1794c4e1dd7c6592075a6b27a68549", 0x29}, 0x48, 0x0) request_key(&(0x7f00000000c0)='trusted\x00', &(0x7f0000001ffb)={'syz', 0x0}, &(0x7f0000000040)='R \xf3\a\x89\xecz\xb7\xb7\x06\xc8\xcc\xb8\xe12st\xe3c*sgrVex:De', r0) 12:26:20 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg(r0, &(0x7f0000000d80)={&(0x7f0000000540)=@l2tp={0x2, 0x0, @loopback, 0x3}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000005c0)="7710a0304e85d59255cea4321dd6c8e75d4d624fe956e4c3e8788af74e64793cf732b9195ea056a8a17c01863044c3bc0aa7e9d7051730c65d67f087727348ce2934ebaf36fe69d69e61475140db65d56ec131236b149b23a708fa3286cdd8bb75192ae800d32d26431c4b54d5b50cfad1b3d5eeae2b9226ff9af4e955cb59e3621a810a1bf31cf3aabd343c363d86c0c4dfdd881da88901a3c0c76fcd61d747fbc5954b2c9759ca2962b54c7dde2fb156dc4874cdaa8a134b376cd294a25219c305c448347940adf194251c231d499b4d7a4ea68e96939fe7cad72ea91cdfe9b281ec96ec8b730a86863733c2f24f67b75602c55c5f", 0xf6}, {&(0x7f00000006c0)="a006747816d740ba41481b774bf635ab914a7356d099dd5995bca84eea84bbb7f5d966b38a450ce4b47bb4c60b416c0cbe80aa5eccba321cba06ff57097ee585bc49a39a652dee003ef298bce9718fd5ef27d5be608b1f61d669c6522b5d29f00f55d4da1f582606b4b8425e58f20cacfc191c58df5395097a6576cbfbc2570d3f86c5783800a98ea15f4823901be4223961032d0eda5e6d5c79779f0be40f7f2af57b8f4a404127fb52528acf50254e7dbbe6b7da0c", 0xb6}, {&(0x7f0000000780)="54bf790d4fda0428fce84ee58c15830b29bbb949a6d88fcb8e9c121c84df12390a24fa031681ced05279cee164a155bce9b40f72b0ea70d111a2704417335469752ddd5477d3e0539503ee42f58491e567531bcc77314345fee7f6e091570aad6c39c723247c385dbd465c90ae3cf060ef543d565a29daaa8a7a0d6090777f9d15e3e0bcdd81ac6ab29ddd4a6f061849662e48c9ca4c5e9ad50aa83caf72652fc11ce69192e1963c294d3df05702300107b84b27", 0xb4}, {&(0x7f0000000840)="944273aaa207b5736904a298421bdb8536f36880d11b4ac8c294c31621a464d40fc6b60a3bf50a50787964605356794b12c0d47776dc0492580baf7608e18370c77c3557f51faf03581fbd6726f2f72d49af41b38f9582a6fd9d5592a73493f64f7dd19e5adf5ec859fad8e74b70a57284b4e3676cffe6f99443261717f6c13e030d89b754a229803344065c987353ab3841df03488b13f8eab5a1c4361ea135969f13e21ef44b61d95a35fea5dfc269af17938a48f9555dcff5a0b307d116115d79e063a62bfcb63e077debd1f542f4b2d83396ed4a42f96b33016e54c76307e39e758f2db2275c1a0fc28d07f880ed640e4e20807c6a", 0xf7}, {&(0x7f0000000940)="3867dcc73e72e0af7f1ed7ceb198eca956a2d0e375a8d1faf6fdf0aeec6aef1dcaaed9af289a06e152343a033805cfc2eccd950629201db3611c372af5494311364dd1e32b6973e87f3503", 0x4b}, {&(0x7f00000009c0)="fc1f5edbd432d192c69b5655af1b2564bc9a7d165a339ff44765082107259efc0b73685155fe41d27c14f50a9e036eff27a21d68033092dfd488e2f142ca6d42730be331fc2676ec347e9cd3f896c924d286cfd6adbdc2d0671ef8ba10d45ec74daa2faf131122c9327eedf86e3378578a95137fa47e6f8df74b2aaf0e270b8e68f3f0a4c988a0e764d747c2c84781b8a0f316ef9bbb661405544978ae209fac6e991055e627a8b69de78db785b2430dc46e2a8f05393bc6eb4c052eb1d8871720e7125c8c59ff9b2f270c0fcd13bf118740e7acfdf9be1f334c", 0xda}, {&(0x7f0000000ac0)="682d897fd2fe878b5b5b934ca3bf9ca4411c816bfd0ab598e164c3f6275c9dcba98f240b5ff7c8dfb27a6892c126708c06c63fe2b46a8598872a66d53a46f85d658f8e685e33c03135b8d6e8b0e6da3d51ee6191cf8a89f5b9d35199321e3100a954e7798b0271bf7d7ca5a0a8ff59cd465dc54e2281ec137f973e686ad592f3a899224390eef5c8a5eb0b80a8d1", 0x8e}], 0x7, &(0x7f0000000c00)=[{0x58, 0x84, 0xfffffff7, "d7cdfcd151627d5ff04af0f442dab396aff421a0d28e0b079b8bc7a3f4ed8e9c64f1c8b5fda750af63ef679e55e5589104c11989620f5d4774875c3e56b0caabacd1131d67fa6cd0"}, {0x18, 0x115, 0x3, "35570dc19a192e"}, {0xe0, 0x1, 0x3, "fe18052cb8a240ed71f866e2f5a1d06199bc8041524eef623f31c133ed4ecb9e36912e8b11ae19cec9d24448dd19365e3c7043c7d48f1e255a1811dffd3f3d9fb2e838573b690e30fc61cb3836a649cf7eac330c0c6f5acfbeb83ae521de7557bd237d9d1f8f1edaf005fa4f555bf5f397f8afd9d354eae6ef8e1fde03ef0b2159e4acfd561ee5125edabebf85ad180c55bdc1a749286899327188cad8acee8f86cfccf492d5257984873c0ebb4c46cc23736fcb80908229c57d24ccf5611c3794abb5c0082e1278fb22"}], 0x150}, 0x1) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x700, 0x8000, 0xb16, 0x8000, {{0xf, 0x4, 0x1, 0x3, 0x3c, 0x68, 0x0, 0x1, 0x2f, 0x0, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x24}, {[@rr={0x7, 0x7, 0xf7, [@broadcast]}, @noop, @generic={0x94, 0xf, "1b95d27e73474072cf22bd2dd9"}, @end, @generic={0x86, 0xd, "e48dc6f422665994391dda"}]}}}}}) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000dc0)=@updpolicy={0x11f8, 0x19, 0x4, 0x70bd25, 0x25dfdbfc, {{@in6=@local, @in=@multicast2, 0x4e20, 0x3f, 0x4e22, 0x4, 0x2, 0x0, 0x40, 0x0, 0x0, 0xffffffffffffffff}, {0x1, 0x1, 0x349, 0x6, 0x40, 0xfffffffffffffffd, 0x6, 0x10000}, {0x3000000000000000, 0x6b0, 0x74f1, 0x9}, 0x2, 0x6e6bbc, 0x3, 0x0, 0x1, 0x3}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x5}, @algo_comp={0x1048, 0x3, {{'lzjh\x00'}, 0x8000, "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"}}, @mark={0xc, 0x15, {0x35075d, 0x9}}, @sa={0xe4, 0x6, {{@in=@broadcast, @in=@remote, 0x4e21, 0x4000, 0x4e21, 0x3, 0xa, 0x1a0, 0x80, 0x88, r2, 0xee01}, {@in6=@mcast1, 0x4d2, 0x2b}, @in=@loopback, {0x6, 0x9, 0x5, 0x5, 0xfffffffffffffff9, 0x40, 0x2, 0x5}, {0x20, 0xfffffffffffffeff, 0x8, 0x5}, {0x5, 0x7, 0x7fffffff}, 0x70bd27, 0x3504, 0xa, 0x3, 0x6, 0x50}}]}, 0x11f8}, 0x1, 0x0, 0x0, 0x41}, 0x480) request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:20 executing program 0: r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) request_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='&[]\x00', r0) 12:26:21 executing program 3: io_setup(0x58, &(0x7f0000000080)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x3, 0x0, 0x0, 0x2}]) 12:26:21 executing program 0: request_key(&(0x7f0000000080)='rxrpc_s\x00', &(0x7f0000000000)={'syz', 0x3}, &(0x7f0000001fee)='A\tr\x88\xdd\xa9', 0x0) 12:26:21 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) request_key(&(0x7f0000000000)='.dead\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='R\trust\xe3c*sgrVex:De', 0xfffffffffffffff9) 12:26:21 executing program 1: request_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0xfffffffffffffffd) 12:26:21 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg(r0, &(0x7f0000000d80)={&(0x7f0000000540)=@l2tp={0x2, 0x0, @loopback, 0x3}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000005c0)="7710a0304e85d59255cea4321dd6c8e75d4d624fe956e4c3e8788af74e64793cf732b9195ea056a8a17c01863044c3bc0aa7e9d7051730c65d67f087727348ce2934ebaf36fe69d69e61475140db65d56ec131236b149b23a708fa3286cdd8bb75192ae800d32d26431c4b54d5b50cfad1b3d5eeae2b9226ff9af4e955cb59e3621a810a1bf31cf3aabd343c363d86c0c4dfdd881da88901a3c0c76fcd61d747fbc5954b2c9759ca2962b54c7dde2fb156dc4874cdaa8a134b376cd294a25219c305c448347940adf194251c231d499b4d7a4ea68e96939fe7cad72ea91cdfe9b281ec96ec8b730a86863733c2f24f67b75602c55c5f", 0xf6}, {&(0x7f00000006c0)="a006747816d740ba41481b774bf635ab914a7356d099dd5995bca84eea84bbb7f5d966b38a450ce4b47bb4c60b416c0cbe80aa5eccba321cba06ff57097ee585bc49a39a652dee003ef298bce9718fd5ef27d5be608b1f61d669c6522b5d29f00f55d4da1f582606b4b8425e58f20cacfc191c58df5395097a6576cbfbc2570d3f86c5783800a98ea15f4823901be4223961032d0eda5e6d5c79779f0be40f7f2af57b8f4a404127fb52528acf50254e7dbbe6b7da0c", 0xb6}, {&(0x7f0000000780)="54bf790d4fda0428fce84ee58c15830b29bbb949a6d88fcb8e9c121c84df12390a24fa031681ced05279cee164a155bce9b40f72b0ea70d111a2704417335469752ddd5477d3e0539503ee42f58491e567531bcc77314345fee7f6e091570aad6c39c723247c385dbd465c90ae3cf060ef543d565a29daaa8a7a0d6090777f9d15e3e0bcdd81ac6ab29ddd4a6f061849662e48c9ca4c5e9ad50aa83caf72652fc11ce69192e1963c294d3df05702300107b84b27", 0xb4}, {&(0x7f0000000840)="944273aaa207b5736904a298421bdb8536f36880d11b4ac8c294c31621a464d40fc6b60a3bf50a50787964605356794b12c0d47776dc0492580baf7608e18370c77c3557f51faf03581fbd6726f2f72d49af41b38f9582a6fd9d5592a73493f64f7dd19e5adf5ec859fad8e74b70a57284b4e3676cffe6f99443261717f6c13e030d89b754a229803344065c987353ab3841df03488b13f8eab5a1c4361ea135969f13e21ef44b61d95a35fea5dfc269af17938a48f9555dcff5a0b307d116115d79e063a62bfcb63e077debd1f542f4b2d83396ed4a42f96b33016e54c76307e39e758f2db2275c1a0fc28d07f880ed640e4e20807c6a", 0xf7}, {&(0x7f0000000940)="3867dcc73e72e0af7f1ed7ceb198eca956a2d0e375a8d1faf6fdf0aeec6aef1dcaaed9af289a06e152343a033805cfc2eccd950629201db3611c372af5494311364dd1e32b6973e87f3503", 0x4b}, {&(0x7f00000009c0)="fc1f5edbd432d192c69b5655af1b2564bc9a7d165a339ff44765082107259efc0b73685155fe41d27c14f50a9e036eff27a21d68033092dfd488e2f142ca6d42730be331fc2676ec347e9cd3f896c924d286cfd6adbdc2d0671ef8ba10d45ec74daa2faf131122c9327eedf86e3378578a95137fa47e6f8df74b2aaf0e270b8e68f3f0a4c988a0e764d747c2c84781b8a0f316ef9bbb661405544978ae209fac6e991055e627a8b69de78db785b2430dc46e2a8f05393bc6eb4c052eb1d8871720e7125c8c59ff9b2f270c0fcd13bf118740e7acfdf9be1f334c", 0xda}, {&(0x7f0000000ac0)="682d897fd2fe878b5b5b934ca3bf9ca4411c816bfd0ab598e164c3f6275c9dcba98f240b5ff7c8dfb27a6892c126708c06c63fe2b46a8598872a66d53a46f85d658f8e685e33c03135b8d6e8b0e6da3d51ee6191cf8a89f5b9d35199321e3100a954e7798b0271bf7d7ca5a0a8ff59cd465dc54e2281ec137f973e686ad592f3a899224390eef5c8a5eb0b80a8d1", 0x8e}], 0x7, &(0x7f0000000c00)=[{0x58, 0x84, 0xfffffff7, "d7cdfcd151627d5ff04af0f442dab396aff421a0d28e0b079b8bc7a3f4ed8e9c64f1c8b5fda750af63ef679e55e5589104c11989620f5d4774875c3e56b0caabacd1131d67fa6cd0"}, {0x18, 0x115, 0x3, "35570dc19a192e"}, {0xe0, 0x1, 0x3, "fe18052cb8a240ed71f866e2f5a1d06199bc8041524eef623f31c133ed4ecb9e36912e8b11ae19cec9d24448dd19365e3c7043c7d48f1e255a1811dffd3f3d9fb2e838573b690e30fc61cb3836a649cf7eac330c0c6f5acfbeb83ae521de7557bd237d9d1f8f1edaf005fa4f555bf5f397f8afd9d354eae6ef8e1fde03ef0b2159e4acfd561ee5125edabebf85ad180c55bdc1a749286899327188cad8acee8f86cfccf492d5257984873c0ebb4c46cc23736fcb80908229c57d24ccf5611c3794abb5c0082e1278fb22"}], 0x150}, 0x1) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x700, 0x8000, 0xb16, 0x8000, {{0xf, 0x4, 0x1, 0x3, 0x3c, 0x68, 0x0, 0x1, 0x2f, 0x0, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x24}, {[@rr={0x7, 0x7, 0xf7, [@broadcast]}, @noop, @generic={0x94, 0xf, "1b95d27e73474072cf22bd2dd9"}, @end, @generic={0x86, 0xd, "e48dc6f422665994391dda"}]}}}}}) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000dc0)=@updpolicy={0x11f8, 0x19, 0x4, 0x70bd25, 0x25dfdbfc, {{@in6=@local, @in=@multicast2, 0x4e20, 0x3f, 0x4e22, 0x4, 0x2, 0x0, 0x40, 0x0, 0x0, 0xffffffffffffffff}, {0x1, 0x1, 0x349, 0x6, 0x40, 0xfffffffffffffffd, 0x6, 0x10000}, {0x3000000000000000, 0x6b0, 0x74f1, 0x9}, 0x2, 0x6e6bbc, 0x3, 0x0, 0x1, 0x3}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x5}, @algo_comp={0x1048, 0x3, {{'lzjh\x00'}, 0x8000, "2c4de9c71e63ea5becd16fa347714e2af0eb8ad0fadf175ebacdcb7d13804ec3eeb73d277243edfa8ac65c4c6add1e250e2101f488736e6ee70c5a525d39fdfec061c71afc98d004810ffba98808a0822b708f19ad4b7aaefa3e572de51d75f1f486afea1f689cdfd92aed7fe8d8a72afdbd5ae9dbf9c141c20e8f3aa36cecc0d89f9810a940606ebb8cb974e05fef70d391c881989159c8aea50bfd41dcbde02f8eddbff3f41dc89976ed601c299ecfb833f6920e66c19f2bfa344a2c00bcbb80c1d224650f55b40c4b376a3c5fbdbf1e94aae66c7e426637cd5b13bb36874b84d089232606a15a71223812b42d4892d6e99fe81a36d7f80c37e11b82a43f37fc43a595605b28b4518d569f5ebd68a15be56207bf9abcdd10152b80c2b144c3423ffe7445096627937b347f179b2e7e4c0b9eef11707a912846251e36407936173d989ac4bafbfb3af6d861eeee2b021414ca7b53112071dbcb99b4389389faede1f3d36151e366c19a9912f6424f2e137724ebfa4a5fcbbae89373fad3ce25712bacdd842393b042955f33f23d3f403e604adbe701cc31d33e37c11d776b9f85ba146882ba9c921ab65bbfeafd1806607dc512bd10eab791a657755e3124f307196b8399282d9d94a2115d5e4a4439aba6eee340bb4f819611d461a4d245df185cf62048568d8a40a29922117fb4e7a725fc58a38c108d904e166f25da2929762ad8e4485300ecce91f86deb74364f4bd646a043e113fc6bf2a6091b97a5210442745033f5cab3014f04948165e459ff605c741f7bab90e5abeeff8291cd9a6054fc8470e907be1b4589ee9f3959f6646705644e247b85cdab0fe7e2f219574ffddce9de3d6d0d424a6ee02586bd79e678b2eeb379af9e348d17ad9344053ee5509f972ee845ea911734fe5019f9dd46721f3551f2927bbd9de7bc6cf03b00a2067a4773b7064e40cfe8bfcabef9960f14d4c2b3fc6897d171e441dc5fef0c8c0f67e57b5aefc4e17f253f4d065b21b06102467c5a69efab23dcb5c94b0a1cd843b79824a12a0a0e5086b5c094431970e0dd8eb2a11f3b304b9fdbffce5fe47685e5f04dc154a9037daf3299c3aae25d6dbde64a0af32ce703db246ea82fb7111efaacb099952048a35de368d857c4b5af28e1cf755c01805c63c0ca09b069298983827bc0d51db31ebda22dcb24a484ff3d16ba47e213f6fc600c92de70563a0afd65bf76d9cc12244a6da54b93753db1059b839a1b7d226ecb31926a4affb9e5ecf7f81aa04319680d2f49c1c3524a8440b007a8796d31b7356b3eca4f111adf0ce4ef4dedcc7196ffd6ab98f24f156d82ce599429e11ad983205353b9e67802e8351497632a326b83da832b8d0284b1fa622fda25aaac75f21f131c2bcd4d5d3f866a100bac850b57cef2098b497c231f9e99f1d2fe494611a42c2c33c8d385495f484e3439f28b0a89d817d5bf613b98a3003878e6505bf30d64bdb6b1fbc8f0560f77a787cef9603a6eb2e1db5e00013b67ff1a2c321d0402b5aeb86f21accf70375cff9ca41a7f743f7ff0588e26e1270f8b4e666cca8ee27d57f59ace5de3866aba34b0a4ee6a4c80c82ebc2c80aa4047d27345bfb92d65054b6d98b7b10238914e4e1ccd27024d9677c3495f15590b73a3ab86ee07678fc0165c23a64608b09a0f6695b3bba5d4a497c0b4781f435b086bd2bb77807ee1c8c5ef414cf156600cc6a16b2c88baa9a610cc9f5e2af19bafc33597b74918171f886a73522348294a75c5b6c1e17343380cf9723f6c929079fc8bc84a6cc8c3bf2d092d50f76b93569f3f13cd3206db6325c242dda748fc5cb0e605aad6cce6e9c72462cfc92113fdf0fc5a66759a4014c0df6713fe0e6db0796753abaaae2a8579ceba1f159825dd920a297cb8d2c596f8c72850ff3a811156982fe843f67e439e6466dd74172ee8633551e31bfd28a5283952088c442e905de61cb48013d8f4b0803fda272d5bdaddf3bce81d9c953e5c0f2347e092d1aded50cf7930e7cd5647e0ecd2e398d5cb49c05ea4acaa955ae4bbe023e45dc3f87c235d9114c738b315eefbbe758503d1e237e5dfc2ee232d5c3a2df2528dd9fb2744c4d9f7ba4c13f10f86854b22e9b550074fffc47862d8e3dab5f893d450d1c4e3f66ef74db10d881d14524b5182dd67c9fd5e4943745bb17d1f9ad2c5c4277f8159ed5152592e1c0c3b45c5dd5c94c0db18702eb14f1277caa813ca2b51ed229aa9cf5895ad5d408d2cc55285797dbb25ed5f0279a03310c24ade3eb43116b090546f8e5dfef1cac19aae995f83d046908abbf3cdcf96185ec5a276171866604a85acd72961e55cd9351af8e253a537e4b51515ba828bd58bde40dc63945bf50925d9ec1f5244f7cb31cf1650ca2ead8af4eaf9a5264c46a06e13b40aa7611aaf2c29338e28ec4f7f8a3e076ac77e2d2dc84bfc604701e2d11a7b69b6ccd54527f79e0c27f36f9af4f2def58a1e284a4412ebdb4451c4d63a6f9bde56958c60d6f55767543879350681fb01436e5f385a96b113ccf249ce3d963496a75aedb022407edc2b0b394bf2ca11f132d18bc9eaade2a7faf969fbbc6a6537608c20ca5792628946d0d87dea1dcc5cf376c6b2d95c8a439bceb957b3cc9957e3fe7509846f5928c538ce3d3e124249d10ad156c35d86756ac024b40d9e42f696bb34b64b3b6087dab697bb7b2d8ec389140863bab0fb47173d21c5c4ed33296693cc0d8b8f60c33f3ffb5990aaf3d8024026661e86deabb1b64b0b1f1b3009976220c6dd7238e178e9c5b1ad7ee32ae2f30b976b9347275b345025a287168235fa246549e2485fd555f88122ac42a9c591aac9010f143ba2664f7ebd3cd271c6380c781abd43d2a89a99a4c30d5333b422df4dbf7ba101fcaf1d34162a6559c43ceb8296ecaa794c800737c9fc0cb999793c259502026c0059687378e51c9ecb2ef9cf8ec4a49df40dea788141b6872016dd27195757daeb1fb3b332e2b0a0acc53ba9a94754d8f5a956d76b0518eadac1663e06e2b99c9c21ea4b5dd8e5070df98a52b0b0afd9ce98dd30ef536420522a7b0fcfbc6a11d7ec2d61648ef7ba157737a30c8a0990f5757daef28940b8a2e44ef1faeb91da647350bea46ee9a70919f0b7ba8e143baaa2800da6ceb58f8d67a8b150986505b00e02237650f4fa434954561d186a708841912a5bbc7ff9d5db32091a5ef703e1602b835f6289a53d2086b4eedbfb338ee65d1ab08d52233bf4e5966c04b6e8f8f5e13913d7c25eda153c8f79e9ae302ae9ff9cbf5431cf204369184ae1e80bc04d62d9524565c2866fbe641c340f2a5f6ff35d6557daa6bdf3783de1799fe9efb8e425e81d200d1dad76b31d70bfab136554ba342ee3f40f0cfe953f5a5b20ca3f77946da09bbf45c871897f84bfe5a8d56ddd166eca18d998c275ff9358a9d33794999b558ac5ac72f5d3a13146b0e2b069187e30eaeb30db2a100097cea55eafcc307b8be123b718edd2615413571332b18ed1e6b7bbb2db6fb31441037efcce578dabe8c44b4bc11ef4ecb0203fbc47ca7d5105147d0f4cad0f06186082aeaa0655178ee5e68ca1e8be997a213742ddbabb2e533a8be66486a53acc87ade9daf27d36e096ea855cbac209a4e52fd2bda68fb7f601a551e6aca822c11009657a0fa123d6d666ca45a8b2fb9341bd60b9ce848695ee2a543138c0733170b291aeeeb19938c9a1deca6b92fa244c4884885da8333b50d430fcfb362fbf72bc5a31996be59a87a830fa8f9481ead4a7a1d2764090795a353881ee068b82f0bf3e1048e6c2320c9546d2685039a4314db7beb016db51dcabdb8a9a0e2bf80c32cf96639cfb2fd197b06c84d3585470c44eb58638369476bbe41d57f4b51bf1af79fd7e0e67b6eec4b43d2d2064c31bd117dafe46e110081776c7d0edb156c2f82ceaa92e0b48bf29f546f0ba9910a855f82c59f8df574787cada93e3a92b5586aa939b5e2917fb44a4d61c40334f0831506ae7984bec7024522e0d0b5a6faa963ed4e11de0abf145eea53cc9c18d32994bf6a46a5da3cfab41fc4fc211f296221e8b3c2ee70f3a2c4bdbe5269b6f64fe99efc99e3eec5b0495c361d897b10d443d66c1707ff59a2bea6d8b741fdeef9ca55acd59bf166aa8eb9a13da766af695f403acc986f63ce0a4f7e60a3a9aad502e326eae3e9dd9ca88bf0f4acad98e20069be49833fb5efa58523eb77feba42097245198cadf23e0a3af01c42eb4753a03c549f4d8d253bb8455a6d77974019a84e7da947c31cec75d77b32db4bc6dee09ac73999b6bd5b58a6b9b711ff807a5a89603285ef634f0041f57f05268b50704c45dd484c07bfea0b8adf538bc8368b85b226d45e1d2ae1f148a318237ce0500a7f893811037bbe57123fabc7baf67dd08523223f42900919cb443e22110e043514cbcf843895b4d2abbe83d3329d900d8476b82219b2191d18020f3231c4ed88b6c007ed5d7e06050866a7d7de0e002e4f57966819aeb119616ae362fe85416b4fbf02f957d34ed934c0e6db727574ec388325e74219012dcb8593caa4d3fff1de307e6073eb794f4510a6e162112a8634418d484d08ef654886d76f1a7ff51318f3632518753da324383af025b160c7a06da6d32078c3d725c31596a3340abcdcd9dc789c7159ac5c8edd2e50924adb9c34feb7816b13f247ac66a2b2ad63b0c32fe572f8de55c89f3b045c22c03bc8afd9368fa7c601bf7ac62112a6cfc653769892433a687eb4d34eef49d08e6dfffedd9a38927ad82b55fd4507e73db5187365e7be31e1e4681564e538a76080c9c4a2b143fcb5436e10e641392b9d36c9c3670837d6640f7ad12b470fb556cb8bf23b8eceff92a0f6e5ce1da28131eb5e402d52457c689914d60d73c68c8334bbb1e5994fe41bf313c565e0103da46e28bf16f4299a16c6cf70354c9a0a9e62ec9bb22f4410bd47bf5cde9bb7c5b5f7869d3c30e6eafbafb82c8a74c658e4d591e8a4e4d9cf973edee0cb9eda697501ab8438dd0aa13ab84237d96cc07ba6272197c0b3aa0534fd4a90f92c660050fc09152f64a49726f037ddbf9b20f4cc2fb8ca4fcdd7a1031945e4e2264bbfc30c9067fd565bcb601b5c1ce25d612c4f1e440cce5bbf3fa03fe9f7ae8aa628c129353998845783fb1181d267ecc58231c7254af9554afd3233e9e72a8b708927bcd6971ceec8f3d6b0ce3d6472196fa722f8f097c52562c855481de94eb3e015513b152a4c824aade9b3268185c898ff127071625ca4e585726469042f94c480b859777179c1d5a8feaec2594912addda1e2af67491deba323dec17f677e6ef81719bc93af7cb226c2401604b669c5d5e446ee33a44a95ac1511131ffd634baa502550fbae4cad1e7073afd797115fde614a2eba202f13b25883c7db9411947b97f562162127858e84426b47ea9e872ad7205aa277b1ad869c48beb52eb590e9ef48ac2d74e65ceeb63d7e1fd24c0d209aad0e0ec086d49f47312f2288f0a5270bfb1dd946f820895c8c78c4cceb4873acb56a284005c297fd592e491aaf72e5f28a45306c4e29430ad314eb86be30c4f06cafddac969ef5962b946e8728e9360a998192eaff8dd18d2896fd332f425e055018af62ef0d12c93fb06b997d065e1785d659108e96d9fd97c94e4cd705555a8cfc38b5767719070f95138274afe4976559a79f2f71eb2e04fa187f2cc52a8419554b629f1f631db80e33a7379bb1242464408920a32eb0fb1e96d679e68056021aea3b826"}}, @mark={0xc, 0x15, {0x35075d, 0x9}}, @sa={0xe4, 0x6, {{@in=@broadcast, @in=@remote, 0x4e21, 0x4000, 0x4e21, 0x3, 0xa, 0x1a0, 0x80, 0x88, r2, 0xee01}, {@in6=@mcast1, 0x4d2, 0x2b}, @in=@loopback, {0x6, 0x9, 0x5, 0x5, 0xfffffffffffffff9, 0x40, 0x2, 0x5}, {0x20, 0xfffffffffffffeff, 0x8, 0x5}, {0x5, 0x7, 0x7fffffff}, 0x70bd27, 0x3504, 0xa, 0x3, 0x6, 0x50}}]}, 0x11f8}, 0x1, 0x0, 0x0, 0x41}, 0x480) request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 12:26:21 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sg%Vex:De', 0x0) 12:26:21 executing program 5 (fault-call:4 fault-nth:0): r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:26:21 executing program 2: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0xfffffffffffffffc) r0 = add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)="5995f0612d4e597c79487106aa3f939e52bab1447468ab688619bd45912ba13332b085486c2b80ad0b0904a754ac6b3eeb04e562fd346cb434b3699310de711944bbd4264d3c3af62b6da2bc23bb338f495641ff3976b4c60a2b399e16660853c86fd4a355ba0cff1decb5fffb6b68770a64729c8fcf3bbdb8cf4fe9fd2f7be1145b6b6c2abc610c3f8e3158cc83217d477f08e1ab8d4d033f9ff831cfc8462b71de6088de66383672d074afbd6ceb42065be80b4461ea43738bc2cbd4e2788a613c0f300e553094d150daf87d41e9529df72abebffbcc1a61a3cb676c41d002f74f", 0xe2, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc3}, &(0x7f0000000300)={0x0, "adc0d1ca115f3263cf345d60ff3b2e90cc036f14f3d6c938bf5eae8e0ade4df143e81474eeb8cbc8794aa7886f9b0e3248b5ca8716601f7752f1ffbacc9d3e1e", 0x24}, 0x48, r0) request_key(&(0x7f00000001c0)='.dead\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='R\trust\xe3c*sgrVex:De', r1) 12:26:21 executing program 1: bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x17, 0x0, 0x1, 0x3, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x32}}, 0x14) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trubt\xe3c*sgrVex:De', 0x0) 12:26:21 executing program 0: r0 = add_key(&(0x7f0000000080)='.dead\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="f07a930329e2893cef90ac1f8d26dfba37ff507928f8d175dcf26898555b3734627f3a67", 0x24, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000000000)={'syz', 0x0}, &(0x7f0000001fee)='R\tr\x97st\xe3c*shrVex:De', r0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0x6, r1, 0x0, 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)='R\tr\x97st\xe3c*shrVex:De', r1) [ 752.931605][ T4871] FAULT_INJECTION: forcing a failure. [ 752.931605][ T4871] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 752.945491][ T4871] CPU: 0 PID: 4871 Comm: syz-executor.5 Not tainted 5.12.0-syzkaller #0 [ 752.954225][ T4871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 752.964296][