9:29 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x212801) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140)=r3, 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB]) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB="000000000000000007000000000000000800000000000000000000000000000000000000000000000000000000000000190c000000800000000000000000000000000043820000000000000000000000010000000000000006000000000000001800"/128]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:49:29 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xf00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:49:29 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1002) 03:49:29 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x700, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:49:29 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x8800000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:49:29 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:49:29 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) 03:49:29 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1020, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:49:29 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1003) 03:49:29 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:49:29 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) 03:49:29 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:49:29 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(0x0, 0x80000001, 0x212801) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140)=r3, 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB]) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB="000000000000000007000000000000000800000000000000000000000000000000000000000000000000000000000000190c000000800000000000000000000000000043820000000000000000000000010000000000000006000000000000001800"/128]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:49:29 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1100, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:49:29 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:49:29 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x705, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:49:29 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(0x0, 0x80000001, 0x212801) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140)=r3, 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB]) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB="000000000000000007000000000000000800000000000000000000000000000000000000000000000000000000000000190c000000800000000000000000000000000043820000000000000000000000010000000000000006000000000000001800"/128]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:49:29 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1004) 03:49:29 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) 03:49:42 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:49:42 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x18000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:49:42 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x805, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:49:42 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1005) 03:49:42 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:49:42 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1201, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:49:42 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(0x0, 0x80000001, 0x212801) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140)=r3, 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB]) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB="000000000000000007000000000000000800000000000000000000000000000000000000000000000000000000000000190c000000800000000000000000000000000043820000000000000000000000010000000000000006000000000000001800"/128]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:49:42 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) 03:49:42 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) 03:49:42 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x900, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:49:42 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1c000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:49:42 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1006) 03:49:42 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x0, 0x212801) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140)=r3, 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB]) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB="000000000000000007000000000000000800000000000000000000000000000000000000000000000000000000000000190c000000800000000000000000000000000043820000000000000000000000010000000000000006000000000000001800"/128]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:49:43 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x905, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:49:43 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1600, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:49:43 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) 03:49:55 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:49:55 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1007) 03:49:55 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:49:55 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) 03:49:55 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:49:55 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xa00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:49:55 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x0, 0x212801) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140)=r3, 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB]) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB="000000000000000007000000000000000800000000000000000000000000000000000000000000000000000000000000190c000000800000000000000000000000000043820000000000000000000000010000000000000006000000000000001800"/128]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:49:55 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1800, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:49:55 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x40000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:49:55 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) 03:49:55 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1008) 03:49:55 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x66000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:49:55 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) 03:49:55 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x0, 0x212801) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140)=r3, 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB]) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB="000000000000000007000000000000000800000000000000000000000000000000000000000000000000000000000000190c000000800000000000000000000000000043820000000000000000000000010000000000000006000000000000001800"/128]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:49:55 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:49:55 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1e30, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:50:09 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:50:09 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) 03:50:09 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1009) 03:50:09 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140)=r3, 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB]) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB="000000000000000007000000000000000800000000000000000000000000000000000000000000000000000000000000190c000000800000000000000000000000000043820000000000000000000000010000000000000006000000000000001800"/128]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:50:09 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xd00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:50:09 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x2000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:50:09 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:50:09 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x80040000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:50:09 executing program 5: syslog(0x0, &(0x7f0000000340)=""/4096, 0xb00) 03:50:09 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x100a) 03:50:09 executing program 5: syslog(0x0, &(0x7f0000000340)=""/4096, 0xb00) 03:50:09 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x2010, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:50:09 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xd30, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:50:09 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140)=r3, 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB]) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB="000000000000000007000000000000000800000000000000000000000000000000000000000000000000000000000000190c000000800000000000000000000000000043820000000000000000000000010000000000000006000000000000001800"/128]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:50:09 executing program 5: syslog(0x0, &(0x7f0000000340)=""/4096, 0xb00) 03:50:09 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:50:23 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x100b) 03:50:23 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x2e00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:50:23 executing program 5: syslog(0x3, 0x0, 0x0) 03:50:23 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xe00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:50:23 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xeffdffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:50:23 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:50:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, 0x0, 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB]) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB="000000000000000007000000000000000800000000000000000000000000000000000000000000000000000000000000190c000000800000000000000000000000000043820000000000000000000000010000000000000006000000000000001800"/128]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:50:23 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:50:23 executing program 5: syslog(0x3, 0x0, 0x0) 03:50:23 executing program 5: syslog(0x3, 0x0, 0x0) 03:50:23 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xe30, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:50:23 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x100c) 03:50:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, 0x0, 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB]) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB="000000000000000007000000000000000800000000000000000000000000000000000000000000000000000000000000190c000000800000000000000000000000000043820000000000000000000000010000000000000006000000000000001800"/128]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:50:23 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x2f00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:50:23 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:50:38 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:50:38 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x100d) 03:50:38 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xf00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:50:38 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfcfdffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:50:38 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x2ffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:50:38 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, 0x0, 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB]) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB="000000000000000007000000000000000800000000000000000000000000000000000000000000000000000000000000190c000000800000000000000000000000000043820000000000000000000000010000000000000006000000000000001800"/128]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:50:38 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:50:38 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:50:38 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB]) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB="000000000000000007000000000000000800000000000000000000000000000000000000000000000000000000000000190c000000800000000000000000000000000043820000000000000000000000010000000000000006000000000000001800"/128]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:50:38 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x100e) 03:50:38 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x301e, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:50:38 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:50:38 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xf30, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:50:38 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfdfdffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:50:38 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB]) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB="000000000000000007000000000000000800000000000000000000000000000000000000000000000000000000000000190c000000800000000000000000000000000043820000000000000000000000010000000000000006000000000000001800"/128]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:50:38 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:50:52 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1020, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:50:52 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1100, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:50:52 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:50:52 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x100f) 03:50:52 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x3f00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:50:52 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB]) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB="000000000000000007000000000000000800000000000000000000000000000000000000000000000000000000000000190c000000800000000000000000000000000043820000000000000000000000010000000000000006000000000000001800"/128]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:50:52 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1100, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:50:52 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfeffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:50:52 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:50:52 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1010) 03:50:52 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1002) 03:50:52 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB="000000000000000007000000000000000800000000000000000000000000000000000000000000000000000000000000190c000000800000000000000000000000000043820000000000000000000000010000000000000006000000000000001800"/128]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:50:52 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:50:52 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x4000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:50:52 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfffffdef, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:50:52 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1011) 03:50:52 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1201, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:50:52 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB="000000000000000007000000000000000800000000000000000000000000000000000000000000000000000000000000190c000000800000000000000000000000000043820000000000000000000000010000000000000006000000000000001800"/128]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:50:52 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 1) [ 1124.659902] FAULT_INJECTION: forcing a failure. [ 1124.659902] name failslab, interval 1, probability 0, space 0, times 0 [ 1124.660919] CPU: 0 PID: 7940 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1124.661469] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1124.662139] Call Trace: [ 1124.662359] dump_stack+0x107/0x167 [ 1124.662657] should_fail.cold+0x5/0xa [ 1124.662966] ? syslog_print_all+0xc6/0x500 [ 1124.663313] should_failslab+0x5/0x20 [ 1124.663635] kmem_cache_alloc_trace+0x55/0x320 [ 1124.664008] syslog_print_all+0xc6/0x500 [ 1124.664342] ? syslog_print+0x440/0x440 [ 1124.664664] ? lock_downgrade+0x6d0/0x6d0 [ 1124.665002] ? lock_acquire+0x197/0x470 [ 1124.665327] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1124.665709] ? avc_has_extended_perms+0xf40/0xf40 [ 1124.666113] ? ksys_write+0x21a/0x260 [ 1124.666431] ? lock_downgrade+0x6d0/0x6d0 [ 1124.666780] ? find_held_lock+0x2c/0x110 [ 1124.667116] do_syslog.part.0+0x427/0x850 [ 1124.667461] ? syslog_print_all+0x500/0x500 [ 1124.667805] ? avc_has_perm+0x108/0x1b0 [ 1124.668128] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1124.668522] ? rcu_read_lock_any_held+0x75/0xa0 [ 1124.668893] ? vfs_write+0x354/0xa70 03:50:52 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfffffdfc, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1124.669203] ? selinux_syslog+0xf4/0x2b0 [ 1124.669713] ? security_syslog+0x79/0xa0 [ 1124.670070] __x64_sys_syslog+0x9b/0xd0 [ 1124.670397] do_syscall_64+0x33/0x40 [ 1124.670702] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1124.671111] RIP: 0033:0x7fdbd377eb19 03:50:52 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1012) [ 1124.671419] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1124.672934] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1124.673539] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1124.674121] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1124.674682] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1124.675256] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1124.675830] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:50:52 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x4800, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:50:52 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1600, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:50:52 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:50:52 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 2) [ 1124.824733] FAULT_INJECTION: forcing a failure. [ 1124.824733] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1124.827199] CPU: 1 PID: 7955 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1124.828367] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1124.829660] Call Trace: [ 1124.830108] dump_stack+0x107/0x167 [ 1124.830699] should_fail.cold+0x5/0xa [ 1124.831323] __alloc_pages_nodemask+0x182/0x600 [ 1124.832082] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 1124.833065] ? kmem_cache_alloc_trace+0x305/0x320 [ 1124.833766] alloc_pages_current+0x187/0x280 [ 1124.834409] allocate_slab+0x26f/0x380 [ 1124.834974] ___slab_alloc+0x470/0x700 [ 1124.835538] ? syslog_print_all+0xc6/0x500 [ 1124.836198] ? syslog_print_all+0xc6/0x500 [ 1124.836862] ? kmem_cache_alloc_trace+0x305/0x320 [ 1124.837601] kmem_cache_alloc_trace+0x305/0x320 [ 1124.838345] syslog_print_all+0xc6/0x500 [ 1124.838988] ? syslog_print+0x440/0x440 [ 1124.839620] ? lock_downgrade+0x6d0/0x6d0 [ 1124.840280] ? lock_acquire+0x197/0x470 [ 1124.840911] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1124.841636] ? avc_has_extended_perms+0xf40/0xf40 [ 1124.842394] ? ksys_write+0x21a/0x260 [ 1124.842979] ? lock_downgrade+0x6d0/0x6d0 [ 1124.843629] ? find_held_lock+0x2c/0x110 [ 1124.844278] do_syslog.part.0+0x427/0x850 [ 1124.844926] ? syslog_print_all+0x500/0x500 [ 1124.845594] ? avc_has_perm+0x108/0x1b0 [ 1124.846238] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1124.846980] ? rcu_read_lock_any_held+0x75/0xa0 [ 1124.847703] ? vfs_write+0x354/0xa70 [ 1124.848298] ? selinux_syslog+0xf4/0x2b0 [ 1124.848918] ? security_syslog+0x79/0xa0 [ 1124.849553] __x64_sys_syslog+0x9b/0xd0 [ 1124.850187] do_syscall_64+0x33/0x40 [ 1124.850755] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1124.851556] RIP: 0033:0x7fdbd377eb19 [ 1124.852127] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1124.854922] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1124.856078] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1124.857165] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1124.858268] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1124.859350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1124.860453] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:50:52 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfffffdfd, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:50:52 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x4c00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:50:53 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB="000000000000000007000000000000000800000000000000000000000000000000000000000000000000000000000000190c000000800000000000000000000000000043820000000000000000000000010000000000000006000000000000001800"/128]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:51:08 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB="000000000000000007000000000000000800000000000000000000000000000000000000000000000000000000000000190c000000800000000000000000000000000043820000000000000000000000010000000000000006000000000000001800"/128]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:51:08 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:51:08 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 3) 03:51:08 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1013) 03:51:08 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1800, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:51:08 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x6800, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:51:08 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xffffff8c, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:51:08 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) [ 1140.746843] FAULT_INJECTION: forcing a failure. [ 1140.746843] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1140.748950] CPU: 0 PID: 7988 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1140.750167] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1140.751645] Call Trace: [ 1140.752115] dump_stack+0x107/0x167 [ 1140.752770] should_fail.cold+0x5/0xa [ 1140.753446] _copy_to_user+0x2e/0x180 [ 1140.754138] syslog_print_all+0x39f/0x500 [ 1140.754878] ? syslog_print+0x440/0x440 [ 1140.755591] ? lock_downgrade+0x6d0/0x6d0 [ 1140.756322] ? lock_acquire+0x197/0x470 [ 1140.757050] ? avc_has_extended_perms+0xf40/0xf40 [ 1140.757893] ? do_one_initcall+0x14d/0x470 [ 1140.758663] ? lock_downgrade+0x6d0/0x6d0 [ 1140.759275] ? find_held_lock+0x2c/0x110 [ 1140.759765] do_syslog.part.0+0x427/0x850 [ 1140.760243] ? syslog_print_all+0x500/0x500 [ 1140.760756] ? avc_has_perm+0x108/0x1b0 [ 1140.761215] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1140.761773] ? rcu_read_lock_any_held+0x75/0xa0 [ 1140.762339] ? vfs_write+0x354/0xa70 [ 1140.762790] ? selinux_syslog+0xf4/0x2b0 [ 1140.763231] ? security_syslog+0x79/0xa0 [ 1140.763643] __x64_sys_syslog+0x9b/0xd0 [ 1140.764030] do_syscall_64+0x33/0x40 [ 1140.764406] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1140.764903] RIP: 0033:0x7fdbd377eb19 [ 1140.765278] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1140.767051] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1140.767826] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1140.768540] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1140.769256] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1140.769972] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1140.770701] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:51:08 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1014) 03:51:23 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:51:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB="000000000000000007000000000000000800000000000000000000000000000000000000000000000000000000000000190c000000800000000000000000000000000043820000000000000000000000010000000000000006000000000000001800"/128]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:51:23 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:51:23 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:51:23 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1f30, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1155.455567] FAULT_INJECTION: forcing a failure. [ 1155.455567] name fail_page_alloc, interval 1, probability 0, space 0, times 0 03:51:23 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1015) 03:51:23 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 4) 03:51:23 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x6c00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1155.457787] CPU: 0 PID: 8013 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1155.459026] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1155.460378] Call Trace: [ 1155.460822] dump_stack+0x107/0x167 [ 1155.461421] should_fail.cold+0x5/0xa [ 1155.462050] __alloc_pages_nodemask+0x182/0x600 [ 1155.462819] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 1155.463815] ? add_mm_counter_fast+0x220/0x220 [ 1155.464556] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 1155.465508] alloc_pages_current+0x187/0x280 [ 1155.465901] __pmd_alloc+0x37/0x5e0 [ 1155.466494] handle_mm_fault+0x1ac4/0x3500 [ 1155.467155] ? __schedule+0x82c/0x1ea0 [ 1155.467790] ? __pmd_alloc+0x5e0/0x5e0 [ 1155.468424] ? vmacache_find+0x55/0x2a0 [ 1155.469042] ? vmacache_update+0xce/0x140 [ 1155.469712] do_user_addr_fault+0x56e/0xc60 [ 1155.470416] exc_page_fault+0xa2/0x1a0 [ 1155.471020] asm_exc_page_fault+0x1e/0x30 [ 1155.471680] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1155.472531] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca e9 63 6c 1e 02 0f 1f 00 0f 01 [ 1155.475397] RSP: 0018:ffff8880534afbb8 EFLAGS: 00050202 [ 1155.476226] RAX: 0000000000000001 RBX: 0000000000000054 RCX: 000000000000000a [ 1155.477337] RDX: 0000000000000004 RSI: ffff888053b28800 RDI: 0000000020000340 [ 1155.478443] RBP: 0000000020000340 R08: 0000000000000000 R09: ffff888053b28853 [ 1155.479545] R10: ffffed100a76510a R11: 0000000000000001 R12: 0000000020000394 [ 1155.480651] R13: ffff888053b28800 R14: 00007ffffffff000 R15: 0000000000000000 [ 1155.481781] _copy_to_user+0x13d/0x180 [ 1155.482448] syslog_print_all+0x39f/0x500 [ 1155.483147] ? syslog_print+0x440/0x440 [ 1155.483771] ? lock_downgrade+0x6d0/0x6d0 [ 1155.484437] ? lock_acquire+0x197/0x470 [ 1155.485069] ? avc_has_extended_perms+0xf40/0xf40 [ 1155.485860] ? do_one_initcall+0x14d/0x470 [ 1155.486605] ? lock_downgrade+0x6d0/0x6d0 [ 1155.487254] ? find_held_lock+0x2c/0x110 [ 1155.487960] do_syslog.part.0+0x427/0x850 [ 1155.488621] ? syslog_print_all+0x500/0x500 [ 1155.489294] ? avc_has_perm+0x108/0x1b0 [ 1155.489916] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1155.490654] ? rcu_read_lock_any_held+0x75/0xa0 [ 1155.491380] ? vfs_write+0x354/0xa70 [ 1155.491970] ? selinux_syslog+0xf4/0x2b0 [ 1155.492615] ? security_syslog+0x79/0xa0 [ 1155.493257] __x64_sys_syslog+0x9b/0xd0 [ 1155.493889] do_syscall_64+0x33/0x40 [ 1155.494487] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1155.495289] RIP: 0033:0x7fdbd377eb19 [ 1155.495864] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1155.498702] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1155.499885] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1155.500979] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1155.502066] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1155.503171] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1155.504278] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:51:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB="000000000000000007000000000000000800000000000000000000000000000000000000000000000000000000000000190c000000800000000000000000000000000043820000000000000000000000010000000000000006000000000000001800"/128]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:51:23 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 5) 03:51:23 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1016) 03:51:23 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x2000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:51:23 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfffffffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1155.739938] FAULT_INJECTION: forcing a failure. [ 1155.739938] name failslab, interval 1, probability 0, space 0, times 0 [ 1155.740991] CPU: 1 PID: 8042 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1155.741549] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1155.742219] Call Trace: [ 1155.742449] dump_stack+0x107/0x167 [ 1155.742746] should_fail.cold+0x5/0xa [ 1155.743084] ? __pmd_alloc+0x94/0x5e0 [ 1155.743413] should_failslab+0x5/0x20 [ 1155.743763] kmem_cache_alloc+0x5b/0x310 [ 1155.744111] __pmd_alloc+0x94/0x5e0 [ 1155.744434] handle_mm_fault+0x1ac4/0x3500 [ 1155.744780] ? __schedule+0x82c/0x1ea0 [ 1155.745102] ? __pmd_alloc+0x5e0/0x5e0 [ 1155.745420] ? vmacache_find+0x55/0x2a0 [ 1155.745762] ? vmacache_update+0xce/0x140 [ 1155.746123] do_user_addr_fault+0x56e/0xc60 [ 1155.746509] exc_page_fault+0xa2/0x1a0 [ 1155.746838] asm_exc_page_fault+0x1e/0x30 [ 1155.747210] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1155.747669] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca e9 63 6c 1e 02 0f 1f 00 0f 01 [ 1155.749164] RSP: 0018:ffff8880551afbb8 EFLAGS: 00050246 [ 1155.749587] RAX: 0000000000000001 RBX: 0000000000000030 RCX: 0000000000000006 [ 1155.750162] RDX: 0000000000000000 RSI: ffff8880534c2000 RDI: 0000000020000340 [ 1155.750731] RBP: 0000000020000340 R08: 0000000000000000 R09: ffff8880534c202f [ 1155.751312] R10: ffffed100a698405 R11: 0000000000000001 R12: 0000000020000370 [ 1155.751927] R13: ffff8880534c2000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1155.752544] _copy_to_user+0x13d/0x180 [ 1155.752866] syslog_print_all+0x39f/0x500 [ 1155.753205] ? syslog_print+0x440/0x440 [ 1155.753531] ? lock_downgrade+0x6d0/0x6d0 [ 1155.753907] ? lock_acquire+0x197/0x470 [ 1155.754258] ? avc_has_extended_perms+0xf40/0xf40 [ 1155.754678] ? do_one_initcall+0x14d/0x470 [ 1155.755023] ? lock_downgrade+0x6d0/0x6d0 [ 1155.755359] ? find_held_lock+0x2c/0x110 [ 1155.755689] do_syslog.part.0+0x427/0x850 [ 1155.756027] ? syslog_print_all+0x500/0x500 [ 1155.756378] ? avc_has_perm+0x108/0x1b0 [ 1155.756703] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1155.757084] ? rcu_read_lock_any_held+0x75/0xa0 [ 1155.757462] ? vfs_write+0x354/0xa70 [ 1155.757764] ? selinux_syslog+0xf4/0x2b0 [ 1155.758105] ? security_syslog+0x79/0xa0 [ 1155.758465] __x64_sys_syslog+0x9b/0xd0 [ 1155.758787] do_syscall_64+0x33/0x40 [ 1155.759091] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1155.759498] RIP: 0033:0x7fdbd377eb19 [ 1155.759798] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1155.761332] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1155.761980] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1155.762579] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1155.763150] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1155.763710] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1155.764320] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:51:38 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x7400, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:51:38 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:51:38 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x2010, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:51:38 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:51:38 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1017) 03:51:38 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 6) 03:51:38 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x225c17d03, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:51:38 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) [ 1170.091537] FAULT_INJECTION: forcing a failure. [ 1170.091537] name failslab, interval 1, probability 0, space 0, times 0 [ 1170.093536] CPU: 0 PID: 8068 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1170.094729] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1170.096152] Call Trace: [ 1170.096575] dump_stack+0x107/0x167 [ 1170.097139] should_fail.cold+0x5/0xa [ 1170.097811] ? create_object.isra.0+0x3a/0xa20 [ 1170.098532] should_failslab+0x5/0x20 [ 1170.099137] kmem_cache_alloc+0x5b/0x310 [ 1170.099760] create_object.isra.0+0x3a/0xa20 [ 1170.100430] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1170.101198] kmem_cache_alloc+0x159/0x310 [ 1170.101840] __pmd_alloc+0x94/0x5e0 [ 1170.102406] handle_mm_fault+0x1ac4/0x3500 [ 1170.103076] ? __schedule+0x82c/0x1ea0 [ 1170.103677] ? __pmd_alloc+0x5e0/0x5e0 [ 1170.104290] ? vmacache_find+0x55/0x2a0 [ 1170.104902] ? vmacache_update+0xce/0x140 [ 1170.105571] do_user_addr_fault+0x56e/0xc60 [ 1170.106238] exc_page_fault+0xa2/0x1a0 [ 1170.106868] asm_exc_page_fault+0x1e/0x30 [ 1170.107522] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1170.108343] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca e9 63 6c 1e 02 0f 1f 00 0f 01 [ 1170.111099] RSP: 0018:ffff888055fa7bb8 EFLAGS: 00050246 [ 1170.111918] RAX: 0000000000000001 RBX: 0000000000000030 RCX: 0000000000000006 [ 1170.113004] RDX: 0000000000000000 RSI: ffff8880543f3000 RDI: 0000000020000340 [ 1170.114141] RBP: 0000000020000340 R08: 0000000000000000 R09: ffff8880543f302f [ 1170.115526] R10: ffffed100a87e605 R11: 0000000000000001 R12: 0000000020000370 [ 1170.116637] R13: ffff8880543f3000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1170.117994] _copy_to_user+0x13d/0x180 [ 1170.118659] syslog_print_all+0x39f/0x500 [ 1170.119322] ? syslog_print+0x440/0x440 [ 1170.119926] ? lock_downgrade+0x6d0/0x6d0 [ 1170.120583] ? lock_acquire+0x197/0x470 [ 1170.121213] ? avc_has_extended_perms+0xf40/0xf40 [ 1170.121963] ? do_one_initcall+0x14d/0x470 [ 1170.122641] ? lock_downgrade+0x6d0/0x6d0 [ 1170.123292] ? find_held_lock+0x2c/0x110 [ 1170.123927] do_syslog.part.0+0x427/0x850 [ 1170.124654] ? syslog_print_all+0x500/0x500 [ 1170.125307] ? avc_has_perm+0x108/0x1b0 [ 1170.125915] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1170.126627] ? rcu_read_lock_any_held+0x75/0xa0 [ 1170.127322] ? vfs_write+0x354/0xa70 [ 1170.127888] ? selinux_syslog+0xf4/0x2b0 [ 1170.128533] ? security_syslog+0x79/0xa0 [ 1170.129143] __x64_sys_syslog+0x9b/0xd0 [ 1170.129773] do_syscall_64+0x33/0x40 [ 1170.130418] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1170.131344] RIP: 0033:0x7fdbd377eb19 [ 1170.131991] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1170.134789] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1170.136192] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1170.137331] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1170.138404] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1170.139489] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1170.140582] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:51:38 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1018) 03:51:38 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 7) 03:51:38 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:51:38 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x7800, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:51:38 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x7ffffffff000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1170.296049] FAULT_INJECTION: forcing a failure. [ 1170.296049] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1170.298370] CPU: 0 PID: 8082 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1170.299415] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1170.300657] Call Trace: [ 1170.301074] dump_stack+0x107/0x167 [ 1170.301631] should_fail.cold+0x5/0xa [ 1170.302240] __alloc_pages_nodemask+0x182/0x600 [ 1170.303145] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 1170.304025] ? find_held_lock+0x2c/0x110 [ 1170.304727] ? __pmd_alloc+0x2db/0x5e0 [ 1170.305312] ? lock_downgrade+0x6d0/0x6d0 [ 1170.306065] ? do_raw_spin_lock+0x121/0x260 [ 1170.306738] alloc_pages_current+0x187/0x280 [ 1170.307420] pte_alloc_one+0x16/0x1a0 [ 1170.308000] __pte_alloc+0x1d/0x330 [ 1170.308567] handle_mm_fault+0x287f/0x3500 [ 1170.309221] ? __schedule+0x82c/0x1ea0 [ 1170.309871] ? __pmd_alloc+0x5e0/0x5e0 [ 1170.310484] ? vmacache_find+0x55/0x2a0 [ 1170.311104] ? vmacache_update+0xce/0x140 [ 1170.311745] do_user_addr_fault+0x56e/0xc60 [ 1170.312403] exc_page_fault+0xa2/0x1a0 [ 1170.312998] asm_exc_page_fault+0x1e/0x30 [ 1170.313632] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1170.314443] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca e9 63 6c 1e 02 0f 1f 00 0f 01 [ 1170.317151] RSP: 0018:ffff888053d57bb8 EFLAGS: 00050206 [ 1170.317941] RAX: 0000000000000001 RBX: 000000000000002d RCX: 0000000000000005 [ 1170.319018] RDX: 0000000000000005 RSI: ffff88804dda0000 RDI: 0000000020000340 [ 1170.320116] RBP: 0000000020000340 R08: 0000000000000000 R09: ffff88804dda002c [ 1170.321188] R10: ffffed1009bb4005 R11: 0000000000000001 R12: 000000002000036d [ 1170.322252] R13: ffff88804dda0000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1170.323374] _copy_to_user+0x13d/0x180 [ 1170.323981] syslog_print_all+0x39f/0x500 [ 1170.324598] ? syslog_print+0x440/0x440 [ 1170.325192] ? lock_downgrade+0x6d0/0x6d0 [ 1170.325959] ? lock_acquire+0x197/0x470 [ 1170.326617] ? avc_has_extended_perms+0xf40/0xf40 [ 1170.327335] ? do_one_initcall+0x14d/0x470 [ 1170.327967] ? lock_downgrade+0x6d0/0x6d0 [ 1170.328582] ? find_held_lock+0x2c/0x110 [ 1170.329210] do_syslog.part.0+0x427/0x850 [ 1170.329845] ? syslog_print_all+0x500/0x500 [ 1170.330481] ? avc_has_perm+0x108/0x1b0 [ 1170.331088] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1170.331803] ? rcu_read_lock_any_held+0x75/0xa0 [ 1170.332518] ? vfs_write+0x354/0xa70 [ 1170.333099] ? selinux_syslog+0xf4/0x2b0 [ 1170.333726] ? security_syslog+0x79/0xa0 [ 1170.334362] __x64_sys_syslog+0x9b/0xd0 [ 1170.334990] do_syscall_64+0x33/0x40 [ 1170.335547] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1170.336315] RIP: 0033:0x7fdbd377eb19 [ 1170.337027] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1170.339905] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1170.341273] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1170.342348] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1170.343423] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1170.344498] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1170.345581] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:51:38 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x2e00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:51:38 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:51:53 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:51:53 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:51:53 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1019) 03:51:53 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x2f00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:51:53 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 8) 03:51:53 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x800800000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:51:53 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:51:53 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x7a00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1185.472819] FAULT_INJECTION: forcing a failure. [ 1185.472819] name failslab, interval 1, probability 0, space 0, times 0 [ 1185.473968] CPU: 0 PID: 8119 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1185.474606] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1185.475408] Call Trace: [ 1185.475661] dump_stack+0x107/0x167 [ 1185.476005] should_fail.cold+0x5/0xa [ 1185.476387] ? ptlock_alloc+0x1d/0x70 [ 1185.476761] should_failslab+0x5/0x20 [ 1185.477136] kmem_cache_alloc+0x5b/0x310 [ 1185.477528] ptlock_alloc+0x1d/0x70 [ 1185.477889] pte_alloc_one+0x68/0x1a0 [ 1185.478260] __pte_alloc+0x1d/0x330 [ 1185.478610] handle_mm_fault+0x287f/0x3500 [ 1185.479024] ? __schedule+0x82c/0x1ea0 [ 1185.479405] ? __pmd_alloc+0x5e0/0x5e0 [ 1185.479776] ? vmacache_find+0x55/0x2a0 [ 1185.480142] ? vmacache_update+0xce/0x140 [ 1185.480537] do_user_addr_fault+0x56e/0xc60 [ 1185.480942] exc_page_fault+0xa2/0x1a0 [ 1185.481302] asm_exc_page_fault+0x1e/0x30 [ 1185.481687] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1185.482184] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca e9 63 6c 1e 02 0f 1f 00 0f 01 [ 1185.483894] RSP: 0018:ffff8880541d7bb8 EFLAGS: 00050202 [ 1185.484393] RAX: 0000000000000001 RBX: 0000000000000032 RCX: 0000000000000006 [ 1185.485065] RDX: 0000000000000002 RSI: ffff888055fdb800 RDI: 0000000020000340 [ 1185.485740] RBP: 0000000020000340 R08: 0000000000000000 R09: ffff888055fdb831 [ 1185.485750] R10: ffffed100abfb706 R11: 0000000000000001 R12: 0000000020000372 [ 1185.485759] R13: ffff888055fdb800 R14: 00007ffffffff000 R15: 0000000000000000 [ 1185.485795] _copy_to_user+0x13d/0x180 [ 1185.488483] syslog_print_all+0x39f/0x500 [ 1185.488867] ? syslog_print+0x440/0x440 [ 1185.489237] ? lock_downgrade+0x6d0/0x6d0 [ 1185.489626] ? __lockdep_reset_lock+0x180/0x180 [ 1185.490068] ? avc_has_extended_perms+0xf40/0xf40 [ 1185.490512] ? do_one_initcall+0x14d/0x470 [ 1185.490910] ? lock_downgrade+0x6d0/0x6d0 [ 1185.491289] ? find_held_lock+0x2c/0x110 [ 1185.491672] do_syslog.part.0+0x427/0x850 [ 1185.492056] ? syslog_print_all+0x500/0x500 [ 1185.492459] ? avc_has_perm+0x108/0x1b0 [ 1185.492828] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1185.493259] ? rcu_read_lock_any_held+0x75/0xa0 [ 1185.493686] ? vfs_write+0x354/0xa70 [ 1185.494037] ? selinux_syslog+0xf4/0x2b0 [ 1185.494420] ? security_syslog+0x79/0xa0 [ 1185.494810] __x64_sys_syslog+0x9b/0xd0 [ 1185.495181] do_syscall_64+0x33/0x40 [ 1185.495527] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1185.495991] RIP: 0033:0x7fdbd377eb19 [ 1185.496334] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1185.497987] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1185.498681] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1185.499343] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1185.499989] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1185.500636] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1185.501285] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:51:53 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 9) [ 1185.593237] FAULT_INJECTION: forcing a failure. [ 1185.593237] name failslab, interval 1, probability 0, space 0, times 0 [ 1185.594379] CPU: 0 PID: 8131 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1185.595031] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1185.595818] Call Trace: [ 1185.596073] dump_stack+0x107/0x167 [ 1185.596439] should_fail.cold+0x5/0xa [ 1185.596806] ? create_object.isra.0+0x3a/0xa20 [ 1185.597230] should_failslab+0x5/0x20 [ 1185.597585] kmem_cache_alloc+0x5b/0x310 [ 1185.597957] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 1185.598507] create_object.isra.0+0x3a/0xa20 [ 1185.598922] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1185.599406] kmem_cache_alloc+0x159/0x310 [ 1185.599802] ptlock_alloc+0x1d/0x70 [ 1185.600140] pte_alloc_one+0x68/0x1a0 [ 1185.600492] __pte_alloc+0x1d/0x330 [ 1185.600835] handle_mm_fault+0x287f/0x3500 [ 1185.601235] ? __schedule+0x82c/0x1ea0 [ 1185.601597] ? __pmd_alloc+0x5e0/0x5e0 [ 1185.601969] ? vmacache_find+0x55/0x2a0 [ 1185.602368] ? vmacache_update+0xce/0x140 [ 1185.602779] do_user_addr_fault+0x56e/0xc60 [ 1185.603187] exc_page_fault+0xa2/0x1a0 [ 1185.603576] asm_exc_page_fault+0x1e/0x30 [ 1185.603968] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1185.604467] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca e9 63 6c 1e 02 0f 1f 00 0f 01 [ 1185.606150] RSP: 0018:ffff8880539a7bb8 EFLAGS: 00050246 [ 1185.606652] RAX: 0000000000000001 RBX: 0000000000000030 RCX: 0000000000000006 [ 1185.607318] RDX: 0000000000000000 RSI: ffff888055fdf000 RDI: 0000000020000340 [ 1185.607964] RBP: 0000000020000340 R08: 0000000000000000 R09: ffff888055fdf02f [ 1185.608613] R10: ffffed100abfbe05 R11: 0000000000000001 R12: 0000000020000370 [ 1185.609295] R13: ffff888055fdf000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1185.609993] _copy_to_user+0x13d/0x180 [ 1185.610384] syslog_print_all+0x39f/0x500 [ 1185.610778] ? syslog_print+0x440/0x440 [ 1185.611146] ? lock_downgrade+0x6d0/0x6d0 [ 1185.611534] ? lock_acquire+0x197/0x470 [ 1185.611912] ? avc_has_extended_perms+0xf40/0xf40 [ 1185.612358] ? do_one_initcall+0x14d/0x470 [ 1185.612750] ? lock_downgrade+0x6d0/0x6d0 [ 1185.613136] ? find_held_lock+0x2c/0x110 [ 1185.613540] do_syslog.part.0+0x427/0x850 [ 1185.613932] ? syslog_print_all+0x500/0x500 [ 1185.614340] ? avc_has_perm+0x108/0x1b0 [ 1185.614709] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1185.615158] ? rcu_read_lock_any_held+0x75/0xa0 [ 1185.615589] ? vfs_write+0x354/0xa70 [ 1185.615965] ? selinux_syslog+0xf4/0x2b0 [ 1185.616368] ? security_syslog+0x79/0xa0 [ 1185.616754] __x64_sys_syslog+0x9b/0xd0 [ 1185.617126] do_syscall_64+0x33/0x40 [ 1185.617470] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1185.617945] RIP: 0033:0x7fdbd377eb19 [ 1185.618291] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1185.620003] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1185.620696] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1185.621363] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1185.622004] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1185.622649] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1185.623311] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:51:53 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:51:53 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 10) [ 1185.723459] FAULT_INJECTION: forcing a failure. [ 1185.723459] name failslab, interval 1, probability 0, space 0, times 0 [ 1185.724940] CPU: 1 PID: 8137 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1185.725736] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1185.726689] Call Trace: [ 1185.727014] dump_stack+0x107/0x167 [ 1185.727445] should_fail.cold+0x5/0xa [ 1185.727887] ? __anon_vma_prepare+0x62/0x500 [ 1185.728410] should_failslab+0x5/0x20 [ 1185.728845] kmem_cache_alloc+0x5b/0x310 [ 1185.729342] __anon_vma_prepare+0x62/0x500 [ 1185.729829] ? __pte_alloc+0x194/0x330 [ 1185.730295] handle_mm_fault+0x2b2d/0x3500 [ 1185.730806] ? __schedule+0x82c/0x1ea0 [ 1185.731268] ? __pmd_alloc+0x5e0/0x5e0 [ 1185.731722] ? vmacache_find+0x55/0x2a0 [ 1185.732189] ? vmacache_update+0xce/0x140 [ 1185.732687] do_user_addr_fault+0x56e/0xc60 [ 1185.733200] exc_page_fault+0xa2/0x1a0 [ 1185.733663] asm_exc_page_fault+0x1e/0x30 [ 1185.734147] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1185.734786] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca e9 63 6c 1e 02 0f 1f 00 0f 01 [ 1185.736907] RSP: 0018:ffff888052ed7bb8 EFLAGS: 00050206 [ 1185.737591] RAX: 0000000000000001 RBX: 000000000000002d RCX: 0000000000000005 [ 1185.738415] RDX: 0000000000000005 RSI: ffff888054ef7800 RDI: 0000000020000340 [ 1185.739250] RBP: 0000000020000340 R08: 0000000000000000 R09: ffff888054ef782c [ 1185.740062] R10: ffffed100a9def05 R11: 0000000000000001 R12: 000000002000036d [ 1185.740885] R13: ffff888054ef7800 R14: 00007ffffffff000 R15: 0000000000000000 [ 1185.741741] _copy_to_user+0x13d/0x180 [ 1185.742199] syslog_print_all+0x39f/0x500 [ 1185.742694] ? syslog_print+0x440/0x440 [ 1185.743169] ? lock_downgrade+0x6d0/0x6d0 [ 1185.743662] ? lock_acquire+0x197/0x470 [ 1185.744132] ? avc_has_extended_perms+0xf40/0xf40 [ 1185.744696] ? do_one_initcall+0x14d/0x470 [ 1185.745188] ? lock_downgrade+0x6d0/0x6d0 [ 1185.745673] ? find_held_lock+0x2c/0x110 [ 1185.746153] do_syslog.part.0+0x427/0x850 [ 1185.746655] ? syslog_print_all+0x500/0x500 [ 1185.747164] ? avc_has_perm+0x108/0x1b0 [ 1185.747639] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1185.748179] ? rcu_read_lock_any_held+0x75/0xa0 [ 1185.748725] ? vfs_write+0x354/0xa70 [ 1185.749160] ? selinux_syslog+0xf4/0x2b0 [ 1185.749642] ? security_syslog+0x79/0xa0 [ 1185.750114] __x64_sys_syslog+0x9b/0xd0 [ 1185.750586] do_syscall_64+0x33/0x40 [ 1185.751031] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1185.751642] RIP: 0033:0x7fdbd377eb19 [ 1185.752078] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1185.754179] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1185.755071] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1185.755905] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1185.756749] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1185.757579] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1185.758421] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:51:53 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:51:53 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xedc0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:51:53 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x2ff3, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:51:53 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:51:53 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x101a) 03:52:08 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x2ff5, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:52:08 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x7ffffffffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:52:08 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 11) 03:52:08 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:52:08 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:52:08 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfe2f, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:52:08 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x101b) 03:52:08 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) [ 1200.902774] FAULT_INJECTION: forcing a failure. [ 1200.902774] name failslab, interval 1, probability 0, space 0, times 0 [ 1200.904739] CPU: 0 PID: 8175 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1200.905833] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1200.907203] Call Trace: [ 1200.907635] dump_stack+0x107/0x167 [ 1200.908220] should_fail.cold+0x5/0xa [ 1200.908814] ? create_object.isra.0+0x3a/0xa20 [ 1200.909551] should_failslab+0x5/0x20 [ 1200.910161] kmem_cache_alloc+0x5b/0x310 [ 1200.910856] create_object.isra.0+0x3a/0xa20 [ 1200.911635] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1200.912449] kmem_cache_alloc+0x159/0x310 [ 1200.913130] __anon_vma_prepare+0x62/0x500 [ 1200.913834] ? __pte_alloc+0x194/0x330 [ 1200.914481] handle_mm_fault+0x2b2d/0x3500 [ 1200.915259] ? __schedule+0x82c/0x1ea0 [ 1200.915939] ? __pmd_alloc+0x5e0/0x5e0 [ 1200.916582] ? vmacache_find+0x55/0x2a0 [ 1200.917233] ? vmacache_update+0xce/0x140 [ 1200.917919] do_user_addr_fault+0x56e/0xc60 [ 1200.918633] exc_page_fault+0xa2/0x1a0 [ 1200.919312] asm_exc_page_fault+0x1e/0x30 [ 1200.920041] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1200.920988] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca e9 63 6c 1e 02 0f 1f 00 0f 01 [ 1200.923985] RSP: 0018:ffff888054c9fbb8 EFLAGS: 00050202 [ 1200.924899] RAX: 0000000000000001 RBX: 0000000000000032 RCX: 0000000000000006 [ 1200.926240] RDX: 0000000000000002 RSI: ffff888052414000 RDI: 0000000020000340 [ 1200.927381] RBP: 0000000020000340 R08: 0000000000000000 R09: ffff888052414031 [ 1200.928498] R10: ffffed100a482806 R11: 0000000000000001 R12: 0000000020000372 [ 1200.929665] R13: ffff888052414000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1200.930818] _copy_to_user+0x13d/0x180 [ 1200.931433] syslog_print_all+0x39f/0x500 [ 1200.932107] ? syslog_print+0x440/0x440 [ 1200.932758] ? lock_downgrade+0x6d0/0x6d0 [ 1200.933455] ? __lockdep_reset_lock+0x180/0x180 [ 1200.934211] ? avc_has_extended_perms+0xf40/0xf40 [ 1200.934987] ? do_one_initcall+0x14d/0x470 [ 1200.935657] ? lock_downgrade+0x6d0/0x6d0 [ 1200.936309] ? find_held_lock+0x2c/0x110 [ 1200.937010] do_syslog.part.0+0x427/0x850 [ 1200.937670] ? syslog_print_all+0x500/0x500 [ 1200.938390] ? avc_has_perm+0x108/0x1b0 [ 1200.939040] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1200.939786] ? rcu_read_lock_any_held+0x75/0xa0 [ 1200.940520] ? vfs_write+0x354/0xa70 [ 1200.941120] ? selinux_syslog+0xf4/0x2b0 [ 1200.941785] ? security_syslog+0x79/0xa0 [ 1200.942470] __x64_sys_syslog+0x9b/0xd0 [ 1200.943127] do_syscall_64+0x33/0x40 [ 1200.943717] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1200.944542] RIP: 0033:0x7fdbd377eb19 [ 1200.945138] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1200.948062] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1200.949259] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1200.950416] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1200.951542] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1200.952656] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1200.953796] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:52:09 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x8000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:52:09 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:52:09 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x2ffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:52:09 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 12) 03:52:09 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xff0f, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:52:09 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x101c) 03:52:09 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:52:09 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:52:09 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x14000200000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1201.323708] FAULT_INJECTION: forcing a failure. [ 1201.323708] name failslab, interval 1, probability 0, space 0, times 0 [ 1201.325642] CPU: 0 PID: 8194 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1201.326722] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1201.328042] Call Trace: [ 1201.328457] dump_stack+0x107/0x167 [ 1201.329064] should_fail.cold+0x5/0xa [ 1201.329643] ? __anon_vma_prepare+0x270/0x500 [ 1201.330336] should_failslab+0x5/0x20 [ 1201.330933] kmem_cache_alloc+0x5b/0x310 [ 1201.331580] __anon_vma_prepare+0x270/0x500 [ 1201.332241] ? __pte_alloc+0x194/0x330 [ 1201.332853] handle_mm_fault+0x2b2d/0x3500 [ 1201.333527] ? __schedule+0x82c/0x1ea0 [ 1201.334147] ? __pmd_alloc+0x5e0/0x5e0 [ 1201.334752] ? vmacache_find+0x55/0x2a0 [ 1201.335382] ? vmacache_update+0xce/0x140 [ 1201.336034] do_user_addr_fault+0x56e/0xc60 [ 1201.336721] exc_page_fault+0xa2/0x1a0 [ 1201.337344] asm_exc_page_fault+0x1e/0x30 [ 1201.338028] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1201.338853] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca e9 63 6c 1e 02 0f 1f 00 0f 01 [ 1201.341771] RSP: 0018:ffff888055fcfbb8 EFLAGS: 00050246 [ 1201.342598] RAX: 0000000000000001 RBX: 0000000000000030 RCX: 0000000000000006 [ 1201.343686] RDX: 0000000000000000 RSI: ffff8880542d8000 RDI: 0000000020000340 [ 1201.344769] RBP: 0000000020000340 R08: 0000000000000000 R09: ffff8880542d802f [ 1201.345850] R10: ffffed100a85b005 R11: 0000000000000001 R12: 0000000020000370 [ 1201.346950] R13: ffff8880542d8000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1201.348064] _copy_to_user+0x13d/0x180 [ 1201.348658] syslog_print_all+0x39f/0x500 [ 1201.349325] ? syslog_print+0x440/0x440 [ 1201.349951] ? lock_downgrade+0x6d0/0x6d0 [ 1201.350598] ? __lockdep_reset_lock+0x180/0x180 [ 1201.351340] ? avc_has_extended_perms+0xf40/0xf40 [ 1201.352061] ? do_one_initcall+0x14d/0x470 [ 1201.352707] ? lock_downgrade+0x6d0/0x6d0 [ 1201.353329] ? find_held_lock+0x2c/0x110 [ 1201.353956] do_syslog.part.0+0x427/0x850 [ 1201.354712] ? syslog_print_all+0x500/0x500 [ 1201.355572] ? avc_has_perm+0x108/0x1b0 [ 1201.356374] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1201.357304] ? rcu_read_lock_any_held+0x75/0xa0 [ 1201.358166] ? vfs_write+0x354/0xa70 [ 1201.358867] ? selinux_syslog+0xf4/0x2b0 [ 1201.359737] ? security_syslog+0x79/0xa0 [ 1201.360487] __x64_sys_syslog+0x9b/0xd0 [ 1201.361213] do_syscall_64+0x33/0x40 [ 1201.362014] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1201.362939] RIP: 0033:0x7fdbd377eb19 [ 1201.363685] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1201.367312] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1201.368532] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1201.369664] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1201.370900] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1201.372045] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1201.373176] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:52:09 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:52:09 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x20000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:52:09 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x10009, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:52:09 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x2fff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:52:09 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x101d) 03:52:09 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:52:09 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1000a, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:52:23 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 13) 03:52:23 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x101e) 03:52:23 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) [ 1215.224457] FAULT_INJECTION: forcing a failure. 03:52:23 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x3003, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:52:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:52:23 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xf0ffffff7f0000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:52:23 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1215.224457] name failslab, interval 1, probability 0, space 0, times 0 [ 1215.225628] CPU: 1 PID: 8242 Comm: syz-executor.5 Not tainted 5.10.213 #1 03:52:23 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) [ 1215.226163] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1215.226985] Call Trace: [ 1215.227232] dump_stack+0x107/0x167 [ 1215.227517] should_fail.cold+0x5/0xa [ 1215.227905] ? create_object.isra.0+0x3a/0xa20 [ 1215.228263] should_failslab+0x5/0x20 [ 1215.228646] kmem_cache_alloc+0x5b/0x310 [ 1215.229007] create_object.isra.0+0x3a/0xa20 [ 1215.229380] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1215.229770] kmem_cache_alloc+0x159/0x310 [ 1215.230139] __anon_vma_prepare+0x270/0x500 [ 1215.230488] ? __pte_alloc+0x194/0x330 [ 1215.230797] handle_mm_fault+0x2b2d/0x3500 [ 1215.231173] ? __schedule+0x82c/0x1ea0 [ 1215.231487] ? __pmd_alloc+0x5e0/0x5e0 [ 1215.231782] ? vmacache_find+0x55/0x2a0 [ 1215.232089] ? vmacache_update+0xce/0x140 [ 1215.232402] do_user_addr_fault+0x56e/0xc60 [ 1215.232728] exc_page_fault+0xa2/0x1a0 [ 1215.233020] asm_exc_page_fault+0x1e/0x30 [ 1215.233378] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1215.233784] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca e9 63 6c 1e 02 0f 1f 00 0f 01 [ 1215.235264] RSP: 0018:ffff88805398fbb8 EFLAGS: 00050206 [ 1215.235686] RAX: 0000000000000001 RBX: 000000000000002d RCX: 0000000000000005 [ 1215.236239] RDX: 0000000000000005 RSI: ffff888054925000 RDI: 0000000020000340 [ 1215.236786] RBP: 0000000020000340 R08: 0000000000000000 R09: ffff88805492502c [ 1215.237344] R10: ffffed100a924a05 R11: 0000000000000001 R12: 000000002000036d [ 1215.237894] R13: ffff888054925000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1215.238469] _copy_to_user+0x13d/0x180 [ 1215.238798] syslog_print_all+0x39f/0x500 [ 1215.239173] ? syslog_print+0x440/0x440 [ 1215.239479] ? lock_downgrade+0x6d0/0x6d0 [ 1215.239805] ? __lockdep_reset_lock+0x180/0x180 [ 1215.240282] ? avc_has_extended_perms+0xf40/0xf40 [ 1215.240653] ? do_one_initcall+0x14d/0x470 [ 1215.241075] ? lock_downgrade+0x6d0/0x6d0 [ 1215.241392] ? find_held_lock+0x2c/0x110 [ 1215.241795] do_syslog.part.0+0x427/0x850 [ 1215.242146] ? syslog_print_all+0x500/0x500 [ 1215.242569] ? avc_has_perm+0x108/0x1b0 [ 1215.242905] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1215.243387] ? rcu_read_lock_any_held+0x75/0xa0 [ 1215.243762] ? vfs_write+0x354/0xa70 [ 1215.244144] ? selinux_syslog+0xf4/0x2b0 [ 1215.244459] ? security_syslog+0x79/0xa0 [ 1215.244866] __x64_sys_syslog+0x9b/0xd0 [ 1215.245205] do_syscall_64+0x33/0x40 [ 1215.245573] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1215.245968] RIP: 0033:0x7fdbd377eb19 [ 1215.246262] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1215.247664] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1215.248248] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1215.248790] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1215.249359] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1215.249908] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1215.250462] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:52:23 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 14) 03:52:23 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x300d, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:52:23 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1215.365752] FAULT_INJECTION: forcing a failure. [ 1215.365752] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1215.367011] CPU: 0 PID: 8259 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1215.367670] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1215.368471] Call Trace: [ 1215.368740] dump_stack+0x107/0x167 [ 1215.369111] should_fail.cold+0x5/0xa [ 1215.369488] __alloc_pages_nodemask+0x182/0x600 [ 1215.369941] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 1215.370529] ? up_write+0x191/0x550 [ 1215.370888] ? rwlock_bug.part.0+0x90/0x90 [ 1215.371319] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1215.371848] alloc_pages_vma+0xbb/0x410 [ 1215.372246] handle_mm_fault+0x152f/0x3500 [ 1215.372666] ? __schedule+0x82c/0x1ea0 [ 1215.373046] ? __pmd_alloc+0x5e0/0x5e0 [ 1215.373436] ? vmacache_find+0x55/0x2a0 [ 1215.373823] ? vmacache_update+0xce/0x140 [ 1215.374238] do_user_addr_fault+0x56e/0xc60 [ 1215.374667] exc_page_fault+0xa2/0x1a0 [ 1215.375054] asm_exc_page_fault+0x1e/0x30 [ 1215.375476] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1215.376004] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca e9 63 6c 1e 02 0f 1f 00 0f 01 [ 1215.377754] RSP: 0018:ffff888055d37bb8 EFLAGS: 00050246 [ 1215.378272] RAX: 0000000000000001 RBX: 0000000000000030 RCX: 0000000000000006 [ 1215.378955] RDX: 0000000000000000 RSI: ffff888053a31000 RDI: 0000000020000340 [ 1215.379653] RBP: 0000000020000340 R08: 0000000000000000 R09: ffff888053a3102f [ 1215.380341] R10: ffffed100a746205 R11: 0000000000000001 R12: 0000000020000370 [ 1215.381033] R13: ffff888053a31000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1215.381743] _copy_to_user+0x13d/0x180 [ 1215.382133] syslog_print_all+0x39f/0x500 [ 1215.382537] ? syslog_print+0x440/0x440 [ 1215.382924] ? lock_downgrade+0x6d0/0x6d0 [ 1215.383349] ? lock_acquire+0x197/0x470 [ 1215.383750] ? avc_has_extended_perms+0xf40/0xf40 [ 1215.384221] ? do_one_initcall+0x14d/0x470 [ 1215.384632] ? lock_downgrade+0x6d0/0x6d0 [ 1215.385033] ? find_held_lock+0x2c/0x110 [ 1215.385442] do_syslog.part.0+0x427/0x850 [ 1215.385842] ? syslog_print_all+0x500/0x500 [ 1215.386265] ? avc_has_perm+0x108/0x1b0 [ 1215.386656] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1215.387124] ? rcu_read_lock_any_held+0x75/0xa0 [ 1215.387577] ? vfs_write+0x354/0xa70 [ 1215.387948] ? selinux_syslog+0xf4/0x2b0 [ 1215.388348] ? security_syslog+0x79/0xa0 [ 1215.388747] __x64_sys_syslog+0x9b/0xd0 [ 1215.389126] do_syscall_64+0x33/0x40 [ 1215.389492] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1215.389984] RIP: 0033:0x7fdbd377eb19 [ 1215.390349] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1215.392109] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1215.392843] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1215.393528] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1215.394217] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1215.394900] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1215.395601] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:52:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:52:23 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 15) 03:52:23 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1021) 03:52:23 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:52:23 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1215.553013] FAULT_INJECTION: forcing a failure. [ 1215.553013] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1215.554020] CPU: 1 PID: 8272 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1215.554559] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1215.555247] Call Trace: [ 1215.555457] dump_stack+0x107/0x167 [ 1215.555739] should_fail.cold+0x5/0xa [ 1215.556035] _copy_to_user+0x2e/0x180 [ 1215.556339] syslog_print_all+0x39f/0x500 [ 1215.556665] ? syslog_print+0x440/0x440 [ 1215.556965] ? lock_downgrade+0x6d0/0x6d0 [ 1215.557291] ? lock_acquire+0x197/0x470 [ 1215.557604] ? avc_has_extended_perms+0xf40/0xf40 [ 1215.557969] ? do_one_initcall+0x14d/0x470 [ 1215.558299] ? lock_downgrade+0x6d0/0x6d0 [ 1215.558610] ? find_held_lock+0x2c/0x110 [ 1215.558947] do_syslog.part.0+0x427/0x850 [ 1215.559299] ? syslog_print_all+0x500/0x500 [ 1215.559623] ? avc_has_perm+0x108/0x1b0 [ 1215.559921] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1215.560314] ? rcu_read_lock_any_held+0x75/0xa0 [ 1215.560660] ? vfs_write+0x354/0xa70 [ 1215.560943] ? selinux_syslog+0xf4/0x2b0 [ 1215.561253] ? security_syslog+0x79/0xa0 [ 1215.561557] __x64_sys_syslog+0x9b/0xd0 [ 1215.561858] do_syscall_64+0x33/0x40 [ 1215.562145] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1215.562519] RIP: 0033:0x7fdbd377eb19 03:52:23 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x300e, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1215.562795] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1215.564271] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1215.565027] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1215.565728] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1215.566430] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1215.567146] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1215.567852] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:52:37 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:52:37 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1022) 03:52:37 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 16) 03:52:37 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x300f, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:52:37 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:52:37 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:52:37 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:52:37 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xe0000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1229.128823] FAULT_INJECTION: forcing a failure. [ 1229.128823] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1229.130337] CPU: 0 PID: 8298 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1229.131148] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1229.132119] Call Trace: [ 1229.132437] dump_stack+0x107/0x167 [ 1229.132871] should_fail.cold+0x5/0xa [ 1229.133334] _copy_to_user+0x2e/0x180 [ 1229.133795] syslog_print_all+0x39f/0x500 [ 1229.134310] ? syslog_print+0x440/0x440 [ 1229.134807] ? lock_downgrade+0x6d0/0x6d0 [ 1229.135321] ? lock_acquire+0x197/0x470 [ 1229.135817] ? avc_has_extended_perms+0xf40/0xf40 [ 1229.136406] ? do_one_initcall+0x14d/0x470 [ 1229.136917] ? lock_downgrade+0x6d0/0x6d0 [ 1229.137443] ? find_held_lock+0x2c/0x110 [ 1229.137946] do_syslog.part.0+0x427/0x850 [ 1229.138478] ? syslog_print_all+0x500/0x500 [ 1229.138992] ? avc_has_perm+0x108/0x1b0 [ 1229.139488] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1229.140069] ? rcu_read_lock_any_held+0x75/0xa0 [ 1229.140645] ? vfs_write+0x354/0xa70 [ 1229.141107] ? selinux_syslog+0xf4/0x2b0 [ 1229.141639] ? security_syslog+0x79/0xa0 [ 1229.142168] __x64_sys_syslog+0x9b/0xd0 [ 1229.142699] do_syscall_64+0x33/0x40 [ 1229.143191] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1229.143871] RIP: 0033:0x7fdbd377eb19 [ 1229.144356] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1229.146797] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1229.147788] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1229.148686] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1229.149585] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1229.150491] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1229.151435] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:52:37 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:52:50 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 17) 03:52:50 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:52:50 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:52:50 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1fffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:52:50 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1023) 03:52:50 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x301f, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:52:50 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:52:50 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) [ 1242.294088] FAULT_INJECTION: forcing a failure. [ 1242.294088] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1242.295294] CPU: 0 PID: 8325 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1242.295980] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1242.296804] Call Trace: [ 1242.297079] dump_stack+0x107/0x167 [ 1242.297449] should_fail.cold+0x5/0xa [ 1242.297840] _copy_to_user+0x2e/0x180 [ 1242.298234] syslog_print_all+0x39f/0x500 [ 1242.298658] ? syslog_print+0x440/0x440 [ 1242.299063] ? lock_downgrade+0x6d0/0x6d0 [ 1242.299505] ? lock_acquire+0x197/0x470 [ 1242.299923] ? avc_has_extended_perms+0xf40/0xf40 [ 1242.300410] ? do_one_initcall+0x14d/0x470 [ 1242.300842] ? lock_downgrade+0x6d0/0x6d0 [ 1242.301263] ? find_held_lock+0x2c/0x110 [ 1242.301685] do_syslog.part.0+0x427/0x850 [ 1242.302107] ? syslog_print_all+0x500/0x500 [ 1242.302536] ? avc_has_perm+0x108/0x1b0 [ 1242.302937] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1242.303424] ? rcu_read_lock_any_held+0x75/0xa0 [ 1242.303890] ? vfs_write+0x354/0xa70 [ 1242.304281] ? selinux_syslog+0xf4/0x2b0 [ 1242.304684] ? security_syslog+0x79/0xa0 [ 1242.305104] __x64_sys_syslog+0x9b/0xd0 [ 1242.305513] do_syscall_64+0x33/0x40 [ 1242.305892] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1242.306418] RIP: 0033:0x7fdbd377eb19 [ 1242.306806] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1242.308832] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1242.309614] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1242.310322] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1242.311025] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1242.311756] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1242.312465] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:52:50 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:52:50 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x3f00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:52:50 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1024) 03:52:50 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 18) 03:52:50 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:52:50 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x37dc12502000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:52:50 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) [ 1242.528220] FAULT_INJECTION: forcing a failure. [ 1242.528220] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1242.529226] CPU: 0 PID: 8348 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1242.529776] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1242.530436] Call Trace: [ 1242.530649] dump_stack+0x107/0x167 [ 1242.530946] should_fail.cold+0x5/0xa [ 1242.531262] _copy_to_user+0x2e/0x180 [ 1242.531599] syslog_print_all+0x39f/0x500 [ 1242.531929] ? syslog_print+0x440/0x440 [ 1242.532254] ? lock_downgrade+0x6d0/0x6d0 [ 1242.532585] ? lock_acquire+0x197/0x470 [ 1242.532915] ? avc_has_extended_perms+0xf40/0xf40 [ 1242.533309] ? do_one_initcall+0x14d/0x470 [ 1242.533658] ? lock_downgrade+0x6d0/0x6d0 [ 1242.533987] ? find_held_lock+0x2c/0x110 [ 1242.534322] do_syslog.part.0+0x427/0x850 [ 1242.534663] ? syslog_print_all+0x500/0x500 [ 1242.535012] ? avc_has_perm+0x108/0x1b0 [ 1242.535343] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1242.535739] ? rcu_read_lock_any_held+0x75/0xa0 [ 1242.536125] ? vfs_write+0x354/0xa70 [ 1242.536437] ? selinux_syslog+0xf4/0x2b0 [ 1242.536771] ? security_syslog+0x79/0xa0 [ 1242.537103] __x64_sys_syslog+0x9b/0xd0 [ 1242.537431] do_syscall_64+0x33/0x40 [ 1242.537739] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1242.538167] RIP: 0033:0x7fdbd377eb19 [ 1242.538461] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1242.539922] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1242.540528] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1242.541096] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1242.541665] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1242.542232] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1242.542799] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:53:04 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:53:04 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1025) 03:53:04 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x4000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:53:04 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:53:04 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 19) 03:53:04 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:53:04 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1010000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:53:04 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) [ 1256.638121] FAULT_INJECTION: forcing a failure. [ 1256.638121] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1256.639318] CPU: 0 PID: 8383 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1256.639988] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1256.640807] Call Trace: [ 1256.641081] dump_stack+0x107/0x167 [ 1256.641450] should_fail.cold+0x5/0xa [ 1256.641830] _copy_to_user+0x2e/0x180 [ 1256.642224] syslog_print_all+0x39f/0x500 [ 1256.642631] ? syslog_print+0x440/0x440 [ 1256.643025] ? lock_downgrade+0x6d0/0x6d0 [ 1256.643435] ? __lockdep_reset_lock+0x180/0x180 [ 1256.643893] ? avc_has_extended_perms+0xf40/0xf40 [ 1256.644347] ? do_one_initcall+0x14d/0x470 [ 1256.644755] ? lock_downgrade+0x6d0/0x6d0 [ 1256.645166] ? find_held_lock+0x2c/0x110 [ 1256.645583] do_syslog.part.0+0x427/0x850 [ 1256.645992] ? syslog_print_all+0x500/0x500 [ 1256.646418] ? avc_has_perm+0x108/0x1b0 [ 1256.646808] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1256.647291] ? rcu_read_lock_any_held+0x75/0xa0 [ 1256.647744] ? vfs_write+0x354/0xa70 [ 1256.648115] ? selinux_syslog+0xf4/0x2b0 [ 1256.648519] ? security_syslog+0x79/0xa0 [ 1256.648905] __x64_sys_syslog+0x9b/0xd0 [ 1256.649291] do_syscall_64+0x33/0x40 [ 1256.649657] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1256.650142] RIP: 0033:0x7fdbd377eb19 [ 1256.650496] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1256.652218] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1256.652935] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1256.653611] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1256.654287] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1256.654946] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1256.655638] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:53:04 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x500000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:53:04 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 20) 03:53:04 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:53:04 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x4800, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:53:04 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x2000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:53:04 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:53:04 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1026) [ 1256.888975] FAULT_INJECTION: forcing a failure. [ 1256.888975] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1256.890239] CPU: 1 PID: 8397 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1256.890912] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1256.891746] Call Trace: [ 1256.892021] dump_stack+0x107/0x167 [ 1256.892393] should_fail.cold+0x5/0xa [ 1256.892818] _copy_to_user+0x2e/0x180 [ 1256.893209] syslog_print_all+0x39f/0x500 [ 1256.893658] ? syslog_print+0x440/0x440 [ 1256.894172] ? lock_downgrade+0x6d0/0x6d0 [ 1256.894594] ? lock_acquire+0x197/0x470 [ 1256.895093] ? avc_has_extended_perms+0xf40/0xf40 [ 1256.895628] ? do_one_initcall+0x14d/0x470 [ 1256.896156] ? lock_downgrade+0x6d0/0x6d0 [ 1256.896572] ? find_held_lock+0x2c/0x110 [ 1256.897079] do_syslog.part.0+0x427/0x850 [ 1256.897498] ? syslog_print_all+0x500/0x500 [ 1256.898019] ? avc_has_perm+0x108/0x1b0 [ 1256.898437] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1256.899008] ? rcu_read_lock_any_held+0x75/0xa0 [ 1256.899494] ? vfs_write+0x354/0xa70 [ 1256.899970] ? selinux_syslog+0xf4/0x2b0 [ 1256.900395] ? security_syslog+0x79/0xa0 [ 1256.900898] __x64_sys_syslog+0x9b/0xd0 [ 1256.901357] do_syscall_64+0x33/0x40 [ 1256.901809] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1256.902337] RIP: 0033:0x7fdbd377eb19 [ 1256.902792] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1256.904647] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1256.905424] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1256.906154] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1256.906881] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1256.907612] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1256.908338] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:53:04 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:53:18 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:53:18 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x800000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:53:18 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 21) 03:53:18 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x4c00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:53:18 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:53:18 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x3000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:53:18 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1027) 03:53:18 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) [ 1270.175827] FAULT_INJECTION: forcing a failure. [ 1270.175827] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1270.177218] CPU: 1 PID: 8421 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1270.178023] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1270.178995] Call Trace: [ 1270.179315] dump_stack+0x107/0x167 [ 1270.179767] should_fail.cold+0x5/0xa [ 1270.180232] _copy_to_user+0x2e/0x180 [ 1270.180688] syslog_print_all+0x39f/0x500 [ 1270.181183] ? syslog_print+0x440/0x440 [ 1270.181656] ? lock_downgrade+0x6d0/0x6d0 [ 1270.182138] ? lock_acquire+0x197/0x470 [ 1270.182624] ? avc_has_extended_perms+0xf40/0xf40 [ 1270.183204] ? do_one_initcall+0x14d/0x470 [ 1270.183690] ? lock_downgrade+0x6d0/0x6d0 [ 1270.184187] ? find_held_lock+0x2c/0x110 [ 1270.184676] do_syslog.part.0+0x427/0x850 [ 1270.185167] ? syslog_print_all+0x500/0x500 [ 1270.185676] ? avc_has_perm+0x108/0x1b0 [ 1270.186149] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1270.186701] ? rcu_read_lock_any_held+0x75/0xa0 [ 1270.187237] ? vfs_write+0x354/0xa70 [ 1270.187685] ? selinux_syslog+0xf4/0x2b0 [ 1270.188164] ? security_syslog+0x79/0xa0 [ 1270.188652] __x64_sys_syslog+0x9b/0xd0 [ 1270.189112] do_syscall_64+0x33/0x40 [ 1270.189555] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1270.190137] RIP: 0033:0x7fdbd377eb19 [ 1270.190583] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1270.192663] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1270.193553] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1270.194387] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1270.195222] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1270.196066] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1270.196902] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:53:18 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:53:18 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:53:18 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 22) 03:53:18 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:53:18 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:53:18 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:53:18 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x6800, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1270.374529] FAULT_INJECTION: forcing a failure. [ 1270.374529] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1270.375768] CPU: 1 PID: 8441 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1270.376430] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1270.377229] Call Trace: [ 1270.377498] dump_stack+0x107/0x167 [ 1270.377856] should_fail.cold+0x5/0xa [ 1270.378244] _copy_to_user+0x2e/0x180 [ 1270.378623] syslog_print_all+0x39f/0x500 [ 1270.379026] ? syslog_print+0x440/0x440 [ 1270.379418] ? lock_downgrade+0x6d0/0x6d0 [ 1270.379838] ? lock_acquire+0x197/0x470 [ 1270.380240] ? avc_has_extended_perms+0xf40/0xf40 [ 1270.380710] ? do_one_initcall+0x14d/0x470 [ 1270.381125] ? lock_downgrade+0x6d0/0x6d0 [ 1270.381527] ? find_held_lock+0x2c/0x110 [ 1270.381930] do_syslog.part.0+0x427/0x850 [ 1270.382338] ? syslog_print_all+0x500/0x500 [ 1270.382763] ? avc_has_perm+0x108/0x1b0 [ 1270.383162] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1270.383621] ? rcu_read_lock_any_held+0x75/0xa0 [ 1270.384082] ? vfs_write+0x354/0xa70 [ 1270.384452] ? selinux_syslog+0xf4/0x2b0 [ 1270.384856] ? security_syslog+0x79/0xa0 [ 1270.385255] __x64_sys_syslog+0x9b/0xd0 [ 1270.385673] do_syscall_64+0x33/0x40 [ 1270.386037] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1270.386532] RIP: 0033:0x7fdbd377eb19 [ 1270.386893] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1270.388654] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1270.389388] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1270.390078] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1270.390770] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1270.391455] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1270.392136] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:53:18 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:53:18 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x5000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:53:18 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1800000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:53:18 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1028) 03:53:18 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:53:18 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x5050000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:53:34 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 23) 03:53:34 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:53:34 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x6000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:53:34 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:53:34 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) [ 1286.469235] FAULT_INJECTION: forcing a failure. [ 1286.469235] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1286.470295] CPU: 0 PID: 8486 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1286.470857] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1286.471538] Call Trace: [ 1286.471759] dump_stack+0x107/0x167 [ 1286.472080] should_fail.cold+0x5/0xa [ 1286.472392] _copy_to_user+0x2e/0x180 [ 1286.472701] syslog_print_all+0x39f/0x500 [ 1286.473087] ? syslog_print+0x440/0x440 [ 1286.473445] ? lock_downgrade+0x6d0/0x6d0 [ 1286.473782] ? lock_acquire+0x197/0x470 [ 1286.474129] ? avc_has_extended_perms+0xf40/0xf40 [ 1286.474520] ? do_one_initcall+0x14d/0x470 [ 1286.474836] ? lock_downgrade+0x6d0/0x6d0 [ 1286.475159] ? find_held_lock+0x2c/0x110 [ 1286.475490] do_syslog.part.0+0x427/0x850 [ 1286.475816] ? syslog_print_all+0x500/0x500 03:53:34 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1029) 03:53:34 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1c00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:53:34 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x6c00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1286.476188] ? avc_has_perm+0x108/0x1b0 [ 1286.476729] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1286.477107] ? rcu_read_lock_any_held+0x75/0xa0 [ 1286.477469] ? vfs_write+0x354/0xa70 [ 1286.477769] ? selinux_syslog+0xf4/0x2b0 [ 1286.478107] ? security_syslog+0x79/0xa0 [ 1286.478420] __x64_sys_syslog+0x9b/0xd0 [ 1286.478733] do_syscall_64+0x33/0x40 [ 1286.479038] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1286.479441] RIP: 0033:0x7fdbd377eb19 [ 1286.479738] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1286.481260] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1286.481876] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1286.482432] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1286.482449] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1286.483726] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1286.484285] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:53:34 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 24) 03:53:34 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x6050000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:53:34 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:53:34 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x7400, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:53:34 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x7000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:53:34 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) [ 1286.659852] FAULT_INJECTION: forcing a failure. [ 1286.659852] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1286.660900] CPU: 0 PID: 8511 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1286.661463] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1286.662133] Call Trace: [ 1286.662353] dump_stack+0x107/0x167 [ 1286.662658] should_fail.cold+0x5/0xa [ 1286.662992] _copy_to_user+0x2e/0x180 [ 1286.663339] syslog_print_all+0x39f/0x500 [ 1286.663694] ? syslog_print+0x440/0x440 [ 1286.664030] ? lock_downgrade+0x6d0/0x6d0 [ 1286.664397] ? lock_acquire+0x197/0x470 [ 1286.664744] ? avc_has_extended_perms+0xf40/0xf40 [ 1286.665153] ? do_one_initcall+0x14d/0x470 [ 1286.665509] ? lock_downgrade+0x6d0/0x6d0 [ 1286.665845] ? find_held_lock+0x2c/0x110 [ 1286.666205] do_syslog.part.0+0x427/0x850 [ 1286.666551] ? syslog_print_all+0x500/0x500 [ 1286.666914] ? avc_has_perm+0x108/0x1b0 [ 1286.667247] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1286.667642] ? rcu_read_lock_any_held+0x75/0xa0 [ 1286.668056] ? vfs_write+0x354/0xa70 [ 1286.668365] ? selinux_syslog+0xf4/0x2b0 [ 1286.668708] ? security_syslog+0x79/0xa0 [ 1286.669047] __x64_sys_syslog+0x9b/0xd0 [ 1286.669382] do_syscall_64+0x33/0x40 [ 1286.669698] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1286.670115] RIP: 0033:0x7fdbd377eb19 [ 1286.670444] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 03:53:34 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1286.671941] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1286.672706] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1286.673289] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1286.673866] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1286.674441] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1286.675013] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:53:34 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 25) 03:53:34 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x7800, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1286.765873] FAULT_INJECTION: forcing a failure. [ 1286.765873] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1286.766891] CPU: 0 PID: 8521 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1286.767509] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1286.768215] Call Trace: [ 1286.768453] dump_stack+0x107/0x167 [ 1286.768771] should_fail.cold+0x5/0xa [ 1286.769092] _copy_to_user+0x2e/0x180 [ 1286.769406] syslog_print_all+0x39f/0x500 [ 1286.769748] ? syslog_print+0x440/0x440 [ 1286.770075] ? lock_downgrade+0x6d0/0x6d0 [ 1286.770414] ? lock_acquire+0x197/0x470 [ 1286.770745] ? avc_has_extended_perms+0xf40/0xf40 [ 1286.771140] ? do_one_initcall+0x14d/0x470 [ 1286.771490] ? lock_downgrade+0x6d0/0x6d0 [ 1286.771828] ? find_held_lock+0x2c/0x110 [ 1286.772167] do_syslog.part.0+0x427/0x850 [ 1286.772507] ? syslog_print_all+0x500/0x500 [ 1286.772859] ? avc_has_perm+0x108/0x1b0 [ 1286.773174] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1286.773544] ? rcu_read_lock_any_held+0x75/0xa0 [ 1286.773895] ? vfs_write+0x354/0xa70 [ 1286.774191] ? selinux_syslog+0xf4/0x2b0 [ 1286.774504] ? security_syslog+0x79/0xa0 [ 1286.774815] __x64_sys_syslog+0x9b/0xd0 [ 1286.775124] do_syscall_64+0x33/0x40 [ 1286.775417] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1286.775834] RIP: 0033:0x7fdbd377eb19 [ 1286.776141] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1286.777558] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1286.778125] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1286.778653] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1286.779180] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1286.779711] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1286.780272] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:53:48 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:53:48 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x102a) 03:53:48 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x7050000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:53:49 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:53:49 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:53:49 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:53:49 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 26) 03:53:49 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x7a00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1301.090224] FAULT_INJECTION: forcing a failure. [ 1301.090224] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1301.091419] CPU: 1 PID: 8553 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1301.092097] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1301.092900] Call Trace: [ 1301.093174] dump_stack+0x107/0x167 [ 1301.093540] should_fail.cold+0x5/0xa [ 1301.093923] _copy_to_user+0x2e/0x180 [ 1301.094313] syslog_print_all+0x39f/0x500 [ 1301.094728] ? syslog_print+0x440/0x440 [ 1301.095122] ? lock_downgrade+0x6d0/0x6d0 [ 1301.095536] ? __lockdep_reset_lock+0x180/0x180 [ 1301.096012] ? avc_has_extended_perms+0xf40/0xf40 [ 1301.096505] ? do_one_initcall+0x14d/0x470 [ 1301.096925] ? lock_downgrade+0x6d0/0x6d0 [ 1301.097340] ? find_held_lock+0x2c/0x110 [ 1301.097781] do_syslog.part.0+0x427/0x850 [ 1301.098208] ? syslog_print_all+0x500/0x500 [ 1301.098644] ? avc_has_perm+0x108/0x1b0 [ 1301.099057] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1301.099540] ? rcu_read_lock_any_held+0x75/0xa0 [ 1301.100014] ? vfs_write+0x354/0xa70 [ 1301.100414] ? selinux_syslog+0xf4/0x2b0 [ 1301.100840] ? security_syslog+0x79/0xa0 [ 1301.101258] __x64_sys_syslog+0x9b/0xd0 [ 1301.101685] do_syscall_64+0x33/0x40 [ 1301.102080] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1301.102600] RIP: 0033:0x7fdbd377eb19 [ 1301.102956] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1301.104830] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1301.105653] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1301.106423] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1301.107214] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1301.107996] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1301.108738] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:53:49 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xedc0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:53:49 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x6600000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:53:49 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 27) 03:53:49 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x102b) 03:53:49 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) [ 1301.343588] FAULT_INJECTION: forcing a failure. [ 1301.343588] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1301.344817] CPU: 1 PID: 8572 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1301.345489] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1301.346304] Call Trace: [ 1301.346578] dump_stack+0x107/0x167 [ 1301.346946] should_fail.cold+0x5/0xa [ 1301.347333] _copy_to_user+0x2e/0x180 [ 1301.347722] syslog_print_all+0x39f/0x500 [ 1301.348154] ? syslog_print+0x440/0x440 [ 1301.348550] ? lock_downgrade+0x6d0/0x6d0 [ 1301.348966] ? __lockdep_reset_lock+0x180/0x180 [ 1301.349445] ? avc_has_extended_perms+0xf40/0xf40 [ 1301.349920] ? do_one_initcall+0x14d/0x470 [ 1301.350343] ? lock_downgrade+0x6d0/0x6d0 [ 1301.350749] ? find_held_lock+0x2c/0x110 [ 1301.351165] do_syslog.part.0+0x427/0x850 [ 1301.351579] ? syslog_print_all+0x500/0x500 [ 1301.352015] ? avc_has_perm+0x108/0x1b0 [ 1301.352421] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1301.352879] ? rcu_read_lock_any_held+0x75/0xa0 [ 1301.353340] ? vfs_write+0x354/0xa70 [ 1301.353713] ? selinux_syslog+0xf4/0x2b0 [ 1301.354126] ? security_syslog+0x79/0xa0 [ 1301.354529] __x64_sys_syslog+0x9b/0xd0 [ 1301.354923] do_syscall_64+0x33/0x40 [ 1301.355297] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1301.355796] RIP: 0033:0x7fdbd377eb19 [ 1301.356179] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1301.357951] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1301.358702] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1301.359389] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1301.360072] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1301.360784] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1301.361495] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:54:02 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:54:02 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:54:02 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 28) 03:54:02 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xf32f, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:54:02 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:54:02 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x8000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:54:02 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x7fffffffffffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:54:02 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x102c) 03:54:02 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) [ 1314.591609] FAULT_INJECTION: forcing a failure. [ 1314.591609] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1314.592631] CPU: 1 PID: 8599 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1314.593159] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1314.593790] Call Trace: [ 1314.593995] dump_stack+0x107/0x167 [ 1314.594310] should_fail.cold+0x5/0xa [ 1314.594608] _copy_to_user+0x2e/0x180 [ 1314.594905] syslog_print_all+0x39f/0x500 [ 1314.595243] ? syslog_print+0x440/0x440 [ 1314.595560] ? lock_downgrade+0x6d0/0x6d0 [ 1314.595872] ? lock_acquire+0x197/0x470 [ 1314.596207] ? avc_has_extended_perms+0xf40/0xf40 [ 1314.596585] ? do_one_initcall+0x14d/0x470 [ 1314.596903] ? lock_downgrade+0x6d0/0x6d0 [ 1314.597243] ? find_held_lock+0x2c/0x110 [ 1314.597572] do_syslog.part.0+0x427/0x850 [ 1314.597897] ? syslog_print_all+0x500/0x500 [ 1314.598254] ? avc_has_perm+0x108/0x1b0 [ 1314.598559] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1314.598925] ? rcu_read_lock_any_held+0x75/0xa0 [ 1314.599305] ? vfs_write+0x354/0xa70 [ 1314.599602] ? selinux_syslog+0xf4/0x2b0 [ 1314.599914] ? security_syslog+0x79/0xa0 [ 1314.600270] __x64_sys_syslog+0x9b/0xd0 [ 1314.600574] do_syscall_64+0x33/0x40 [ 1314.600873] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1314.601290] RIP: 0033:0x7fdbd377eb19 [ 1314.601586] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1314.602989] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1314.603594] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1314.604137] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1314.604707] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1314.605268] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1314.605804] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:54:02 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 29) 03:54:02 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x8050000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:54:02 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xf52f, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:54:02 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x8004000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:54:02 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) [ 1314.782290] FAULT_INJECTION: forcing a failure. [ 1314.782290] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1314.784266] CPU: 0 PID: 8611 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1314.785594] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1314.786891] Call Trace: [ 1314.787330] dump_stack+0x107/0x167 [ 1314.787898] should_fail.cold+0x5/0xa [ 1314.788666] _copy_to_user+0x2e/0x180 [ 1314.789272] syslog_print_all+0x39f/0x500 [ 1314.790131] ? syslog_print+0x440/0x440 [ 1314.790822] ? lock_downgrade+0x6d0/0x6d0 [ 1314.791658] ? __lockdep_reset_lock+0x180/0x180 [ 1314.792487] ? avc_has_extended_perms+0xf40/0xf40 [ 1314.793268] ? do_one_initcall+0x14d/0x470 [ 1314.793963] ? lock_downgrade+0x6d0/0x6d0 [ 1314.794643] ? find_held_lock+0x2c/0x110 [ 1314.795315] do_syslog.part.0+0x427/0x850 [ 1314.795991] ? syslog_print_all+0x500/0x500 [ 1314.796721] ? avc_has_perm+0x108/0x1b0 [ 1314.797370] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1314.798142] ? rcu_read_lock_any_held+0x75/0xa0 [ 1314.798896] ? vfs_write+0x354/0xa70 [ 1314.799509] ? selinux_syslog+0xf4/0x2b0 [ 1314.800179] ? security_syslog+0x79/0xa0 [ 1314.800865] __x64_sys_syslog+0x9b/0xd0 [ 1314.801529] do_syscall_64+0x33/0x40 [ 1314.802144] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1314.802968] RIP: 0033:0x7fdbd377eb19 [ 1314.803573] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1314.806533] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1314.807751] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 03:54:02 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x8cffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1314.808905] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1314.810229] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1314.811377] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1314.812534] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:54:22 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x102d) 03:54:22 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:54:22 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:54:22 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xeffdffffffffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:54:22 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 30) 03:54:22 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:54:22 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x9000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:54:22 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfe2f, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1334.683634] FAULT_INJECTION: forcing a failure. [ 1334.683634] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1334.685036] CPU: 0 PID: 8644 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1334.685719] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1334.686493] Call Trace: [ 1334.686764] dump_stack+0x107/0x167 [ 1334.687108] should_fail.cold+0x5/0xa [ 1334.687472] _copy_to_user+0x2e/0x180 [ 1334.687839] syslog_print_all+0x39f/0x500 [ 1334.688237] ? syslog_print+0x440/0x440 [ 1334.688619] ? lock_downgrade+0x6d0/0x6d0 [ 1334.689012] ? __lockdep_reset_lock+0x180/0x180 [ 1334.689458] ? avc_has_extended_perms+0xf40/0xf40 [ 1334.689920] ? do_one_initcall+0x14d/0x470 [ 1334.690317] ? lock_downgrade+0x6d0/0x6d0 [ 1334.690736] ? find_held_lock+0x2c/0x110 [ 1334.691122] do_syslog.part.0+0x427/0x850 [ 1334.691539] ? syslog_print_all+0x500/0x500 [ 1334.691937] ? avc_has_perm+0x108/0x1b0 [ 1334.692336] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1334.692776] ? rcu_read_lock_any_held+0x75/0xa0 [ 1334.693241] ? vfs_write+0x354/0xa70 [ 1334.693596] ? selinux_syslog+0xf4/0x2b0 [ 1334.694008] ? security_syslog+0x79/0xa0 [ 1334.694391] __x64_sys_syslog+0x9b/0xd0 [ 1334.694797] do_syscall_64+0x33/0x40 [ 1334.695243] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1334.695766] RIP: 0033:0x7fdbd377eb19 [ 1334.696219] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1334.698055] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1334.698975] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1334.699762] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1334.700511] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1334.701225] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1334.701942] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:54:22 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 31) 03:54:22 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x9000100, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1334.799270] FAULT_INJECTION: forcing a failure. [ 1334.799270] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1334.801182] CPU: 1 PID: 8651 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1334.802263] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1334.803566] Call Trace: [ 1334.804050] dump_stack+0x107/0x167 [ 1334.804773] should_fail.cold+0x5/0xa [ 1334.805563] _copy_to_user+0x2e/0x180 [ 1334.806305] syslog_print_all+0x39f/0x500 [ 1334.807144] ? syslog_print+0x440/0x440 [ 1334.807879] ? lock_downgrade+0x6d0/0x6d0 [ 1334.808583] ? __lockdep_reset_lock+0x180/0x180 [ 1334.809316] ? avc_has_extended_perms+0xf40/0xf40 [ 1334.810065] ? do_one_initcall+0x14d/0x470 [ 1334.810715] ? lock_downgrade+0x6d0/0x6d0 [ 1334.811375] ? find_held_lock+0x2c/0x110 [ 1334.812003] do_syslog.part.0+0x427/0x850 [ 1334.812697] ? syslog_print_all+0x500/0x500 [ 1334.813362] ? avc_has_perm+0x108/0x1b0 [ 1334.813990] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1334.814710] ? rcu_read_lock_any_held+0x75/0xa0 [ 1334.815448] ? vfs_write+0x354/0xa70 [ 1334.816022] ? selinux_syslog+0xf4/0x2b0 [ 1334.816667] ? security_syslog+0x79/0xa0 [ 1334.817313] __x64_sys_syslog+0x9b/0xd0 [ 1334.817913] do_syscall_64+0x33/0x40 [ 1334.818487] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1334.819273] RIP: 0033:0x7fdbd377eb19 [ 1334.819835] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1334.822589] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1334.823732] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1334.824835] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1334.825909] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1334.826972] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1334.828035] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:54:22 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:54:22 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xff0f, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:54:37 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 32) 03:54:37 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:54:37 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:54:37 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xa000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:54:37 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xf6ffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:54:37 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x102e) 03:54:37 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:54:37 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xff2f, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1349.665326] FAULT_INJECTION: forcing a failure. [ 1349.665326] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1349.666478] CPU: 0 PID: 8672 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1349.667030] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1349.667745] Call Trace: [ 1349.667965] dump_stack+0x107/0x167 [ 1349.668263] should_fail.cold+0x5/0xa [ 1349.668609] _copy_to_user+0x2e/0x180 [ 1349.668961] syslog_print_all+0x39f/0x500 [ 1349.669333] ? syslog_print+0x440/0x440 03:54:37 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x10009, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:54:37 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xa000100, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1349.669752] ? lock_downgrade+0x6d0/0x6d0 [ 1349.670111] ? lock_acquire+0x197/0x470 [ 1349.670444] ? avc_has_extended_perms+0xf40/0xf40 [ 1349.670853] ? do_one_initcall+0x14d/0x470 [ 1349.671190] ? lock_downgrade+0x6d0/0x6d0 [ 1349.671519] ? find_held_lock+0x2c/0x110 [ 1349.671855] do_syslog.part.0+0x427/0x850 [ 1349.672191] ? syslog_print_all+0x500/0x500 03:54:37 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) [ 1349.672535] ? avc_has_perm+0x108/0x1b0 [ 1349.672924] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1349.673306] ? rcu_read_lock_any_held+0x75/0xa0 [ 1349.673688] ? vfs_write+0x354/0xa70 [ 1349.674011] ? selinux_syslog+0xf4/0x2b0 [ 1349.674338] ? security_syslog+0x79/0xa0 [ 1349.674696] __x64_sys_syslog+0x9b/0xd0 [ 1349.675030] do_syscall_64+0x33/0x40 [ 1349.675341] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1349.675760] RIP: 0033:0x7fdbd377eb19 [ 1349.676060] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1349.677526] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1349.678142] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1349.678706] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1349.679271] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1349.679855] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1349.680418] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:54:37 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 33) 03:54:37 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfcfdffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:54:37 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) [ 1349.742303] FAULT_INJECTION: forcing a failure. [ 1349.742303] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1349.743428] CPU: 1 PID: 8699 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1349.743980] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1349.744649] Call Trace: [ 1349.744887] dump_stack+0x107/0x167 [ 1349.745193] should_fail.cold+0x5/0xa [ 1349.745520] _copy_to_user+0x2e/0x180 [ 1349.745839] syslog_print_all+0x39f/0x500 [ 1349.746222] ? syslog_print+0x440/0x440 [ 1349.746564] ? lock_downgrade+0x6d0/0x6d0 [ 1349.746907] ? lock_acquire+0x197/0x470 [ 1349.747281] ? avc_has_extended_perms+0xf40/0xf40 [ 1349.747761] ? do_one_initcall+0x14d/0x470 [ 1349.748134] ? lock_downgrade+0x6d0/0x6d0 [ 1349.748551] ? find_held_lock+0x2c/0x110 [ 1349.748931] do_syslog.part.0+0x427/0x850 [ 1349.749354] ? syslog_print_all+0x500/0x500 [ 1349.749739] ? avc_has_perm+0x108/0x1b0 [ 1349.750147] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1349.750588] ? rcu_read_lock_any_held+0x75/0xa0 [ 1349.751053] ? vfs_write+0x354/0xa70 [ 1349.751366] ? selinux_syslog+0xf4/0x2b0 [ 1349.751799] ? security_syslog+0x79/0xa0 [ 1349.752202] __x64_sys_syslog+0x9b/0xd0 [ 1349.752601] do_syscall_64+0x33/0x40 [ 1349.752919] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1349.753432] RIP: 0033:0x7fdbd377eb19 [ 1349.753772] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1349.755598] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1349.756284] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1349.756974] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1349.757696] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1349.758406] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1349.759102] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:54:37 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:54:37 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x102f) 03:54:37 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 34) [ 1349.896975] FAULT_INJECTION: forcing a failure. [ 1349.896975] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1349.897976] CPU: 0 PID: 8714 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1349.898574] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1349.899272] Call Trace: [ 1349.899502] dump_stack+0x107/0x167 [ 1349.899834] should_fail.cold+0x5/0xa [ 1349.900167] _copy_to_user+0x2e/0x180 [ 1349.900521] syslog_print_all+0x39f/0x500 [ 1349.900898] ? syslog_print+0x440/0x440 [ 1349.901250] ? lock_downgrade+0x6d0/0x6d0 [ 1349.901590] ? lock_acquire+0x197/0x470 [ 1349.901926] ? avc_has_extended_perms+0xf40/0xf40 [ 1349.902316] ? do_one_initcall+0x14d/0x470 [ 1349.902681] ? lock_downgrade+0x6d0/0x6d0 [ 1349.903052] ? find_held_lock+0x2c/0x110 [ 1349.903411] do_syslog.part.0+0x427/0x850 [ 1349.903744] ? syslog_print_all+0x500/0x500 [ 1349.904092] ? avc_has_perm+0x108/0x1b0 [ 1349.904412] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1349.904797] ? rcu_read_lock_any_held+0x75/0xa0 [ 1349.905217] ? vfs_write+0x354/0xa70 [ 1349.905520] ? selinux_syslog+0xf4/0x2b0 [ 1349.905843] ? security_syslog+0x79/0xa0 [ 1349.906178] __x64_sys_syslog+0x9b/0xd0 [ 1349.906503] do_syscall_64+0x33/0x40 [ 1349.906802] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1349.907236] RIP: 0033:0x7fdbd377eb19 [ 1349.907533] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1349.909002] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1349.909639] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1349.910228] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1349.910790] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1349.911371] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1349.911963] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:54:53 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:54:53 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:54:53 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1000a, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:54:53 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 35) 03:54:53 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:54:53 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1030) 03:54:53 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:54:53 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfdfdffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1365.332093] FAULT_INJECTION: forcing a failure. [ 1365.332093] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1365.333137] CPU: 0 PID: 8740 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1365.333679] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1365.334325] Call Trace: [ 1365.334543] dump_stack+0x107/0x167 [ 1365.334836] should_fail.cold+0x5/0xa [ 1365.335134] _copy_to_user+0x2e/0x180 [ 1365.335443] syslog_print_all+0x39f/0x500 [ 1365.335772] ? syslog_print+0x440/0x440 [ 1365.336092] ? lock_downgrade+0x6d0/0x6d0 [ 1365.336421] ? __lockdep_reset_lock+0x180/0x180 [ 1365.336802] ? avc_has_extended_perms+0xf40/0xf40 [ 1365.337198] ? do_one_initcall+0x14d/0x470 [ 1365.337526] ? lock_downgrade+0x6d0/0x6d0 [ 1365.337849] ? find_held_lock+0x2c/0x110 [ 1365.338174] do_syslog.part.0+0x427/0x850 [ 1365.338499] ? syslog_print_all+0x500/0x500 [ 1365.338828] ? avc_has_perm+0x108/0x1b0 [ 1365.339140] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1365.339495] ? rcu_read_lock_any_held+0x75/0xa0 [ 1365.339871] ? vfs_write+0x354/0xa70 [ 1365.340188] ? selinux_syslog+0xf4/0x2b0 [ 1365.340511] ? security_syslog+0x79/0xa0 [ 1365.340828] __x64_sys_syslog+0x9b/0xd0 [ 1365.341172] do_syscall_64+0x33/0x40 [ 1365.341471] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1365.341869] RIP: 0033:0x7fdbd377eb19 [ 1365.342175] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1365.343583] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1365.344193] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1365.344756] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1365.345351] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1365.345906] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1365.346486] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:54:53 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfeffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:54:53 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:54:53 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 36) 03:54:53 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xd000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:54:53 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1365.575231] FAULT_INJECTION: forcing a failure. [ 1365.575231] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1365.576204] CPU: 0 PID: 8752 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1365.576740] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1365.577417] Call Trace: [ 1365.577634] dump_stack+0x107/0x167 [ 1365.577920] should_fail.cold+0x5/0xa [ 1365.578244] _copy_to_user+0x2e/0x180 [ 1365.578545] syslog_print_all+0x39f/0x500 [ 1365.578876] ? syslog_print+0x440/0x440 [ 1365.579208] ? lock_downgrade+0x6d0/0x6d0 [ 1365.579525] ? lock_acquire+0x197/0x470 [ 1365.579835] ? avc_has_extended_perms+0xf40/0xf40 [ 1365.580233] ? do_one_initcall+0x14d/0x470 [ 1365.580562] ? lock_downgrade+0x6d0/0x6d0 [ 1365.580897] ? find_held_lock+0x2c/0x110 [ 1365.581241] do_syslog.part.0+0x427/0x850 [ 1365.581567] ? syslog_print_all+0x500/0x500 [ 1365.581903] ? avc_has_perm+0x108/0x1b0 [ 1365.582243] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1365.582611] ? rcu_read_lock_any_held+0x75/0xa0 [ 1365.582972] ? vfs_write+0x354/0xa70 [ 1365.583283] ? selinux_syslog+0xf4/0x2b0 [ 1365.583598] ? security_syslog+0x79/0xa0 [ 1365.583918] __x64_sys_syslog+0x9b/0xd0 [ 1365.584252] do_syscall_64+0x33/0x40 [ 1365.584536] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1365.584951] RIP: 0033:0x7fdbd377eb19 [ 1365.585263] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1365.586710] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1365.587330] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1365.587885] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1365.588460] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1365.589034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1365.589610] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:54:53 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xffffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:54:53 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:54:53 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1031) 03:54:53 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:54:53 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 37) 03:54:53 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:54:53 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) [ 1365.858420] FAULT_INJECTION: forcing a failure. [ 1365.858420] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1365.859382] CPU: 0 PID: 8776 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1365.859915] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1365.860562] Call Trace: [ 1365.860778] dump_stack+0x107/0x167 [ 1365.861090] should_fail.cold+0x5/0xa [ 1365.861397] _copy_to_user+0x2e/0x180 [ 1365.861719] syslog_print_all+0x39f/0x500 [ 1365.862047] ? syslog_print+0x440/0x440 [ 1365.862362] ? lock_downgrade+0x6d0/0x6d0 [ 1365.862691] ? __lockdep_reset_lock+0x180/0x180 [ 1365.863066] ? avc_has_extended_perms+0xf40/0xf40 [ 1365.863454] ? do_one_initcall+0x14d/0x470 [ 1365.863812] ? lock_downgrade+0x6d0/0x6d0 [ 1365.864147] ? find_held_lock+0x2c/0x110 [ 1365.864473] do_syslog.part.0+0x427/0x850 [ 1365.864804] ? syslog_print_all+0x500/0x500 [ 1365.865151] ? avc_has_perm+0x108/0x1b0 [ 1365.865461] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1365.865831] ? rcu_read_lock_any_held+0x75/0xa0 [ 1365.866198] ? vfs_write+0x354/0xa70 [ 1365.866499] ? selinux_syslog+0xf4/0x2b0 [ 1365.866820] ? security_syslog+0x79/0xa0 [ 1365.867145] __x64_sys_syslog+0x9b/0xd0 [ 1365.867459] do_syscall_64+0x33/0x40 [ 1365.867755] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1365.868150] RIP: 0033:0x7fdbd377eb19 [ 1365.868443] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1365.869866] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1365.870474] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1365.871032] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1365.871581] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1365.872135] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1365.872686] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:55:09 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:55:09 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xf000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:55:09 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 38) 03:55:09 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xffffffffffff0700, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:55:09 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:55:09 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xe0000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:55:09 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1032) 03:55:09 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:55:09 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1fffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1381.315665] FAULT_INJECTION: forcing a failure. [ 1381.315665] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1381.316859] CPU: 0 PID: 8791 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1381.317536] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1381.318360] Call Trace: [ 1381.318626] dump_stack+0x107/0x167 [ 1381.318978] should_fail.cold+0x5/0xa [ 1381.319380] _copy_to_user+0x2e/0x180 [ 1381.319751] syslog_print_all+0x39f/0x500 [ 1381.320191] ? syslog_print+0x440/0x440 [ 1381.320574] ? lock_downgrade+0x6d0/0x6d0 [ 1381.320994] ? lock_acquire+0x197/0x470 [ 1381.321428] ? avc_has_extended_perms+0xf40/0xf40 [ 1381.321904] ? do_one_initcall+0x14d/0x470 [ 1381.322335] ? lock_downgrade+0x6d0/0x6d0 [ 1381.322742] ? find_held_lock+0x2c/0x110 [ 1381.323152] do_syslog.part.0+0x427/0x850 [ 1381.323571] ? syslog_print_all+0x500/0x500 [ 1381.323986] ? avc_has_perm+0x108/0x1b0 [ 1381.324426] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1381.324902] ? rcu_read_lock_any_held+0x75/0xa0 [ 1381.325371] ? vfs_write+0x354/0xa70 [ 1381.325722] ? selinux_syslog+0xf4/0x2b0 [ 1381.326133] ? security_syslog+0x79/0xa0 [ 1381.326550] __x64_sys_syslog+0x9b/0xd0 [ 1381.326939] do_syscall_64+0x33/0x40 [ 1381.327337] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1381.327827] RIP: 0033:0x7fdbd377eb19 [ 1381.328220] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1381.329997] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1381.330738] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1381.331443] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1381.332136] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1381.332822] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1381.333550] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:55:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:55:23 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffdef, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:55:23 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:55:23 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:55:23 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1033) 03:55:23 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 39) 03:55:23 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:55:23 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x11000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1395.349058] FAULT_INJECTION: forcing a failure. [ 1395.349058] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1395.350497] CPU: 0 PID: 8830 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1395.351228] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1395.352058] Call Trace: [ 1395.352333] dump_stack+0x107/0x167 [ 1395.352748] should_fail.cold+0x5/0xa [ 1395.353118] _copy_to_user+0x2e/0x180 [ 1395.353529] syslog_print_all+0x39f/0x500 [ 1395.353961] ? syslog_print+0x440/0x440 [ 1395.354349] ? lock_downgrade+0x6d0/0x6d0 [ 1395.354782] ? lock_acquire+0x197/0x470 [ 1395.355195] ? avc_has_extended_perms+0xf40/0xf40 [ 1395.355693] ? do_one_initcall+0x14d/0x470 [ 1395.356125] ? lock_downgrade+0x6d0/0x6d0 [ 1395.356552] ? find_held_lock+0x2c/0x110 [ 1395.356988] do_syslog.part.0+0x427/0x850 [ 1395.357438] ? syslog_print_all+0x500/0x500 [ 1395.357876] ? avc_has_perm+0x108/0x1b0 [ 1395.358303] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1395.358772] ? rcu_read_lock_any_held+0x75/0xa0 [ 1395.359270] ? vfs_write+0x354/0xa70 [ 1395.359639] ? selinux_syslog+0xf4/0x2b0 [ 1395.360059] ? security_syslog+0x79/0xa0 [ 1395.360478] __x64_sys_syslog+0x9b/0xd0 [ 1395.360897] do_syscall_64+0x33/0x40 [ 1395.361290] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1395.361794] RIP: 0033:0x7fdbd377eb19 [ 1395.362174] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1395.363968] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1395.364743] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1395.365458] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1395.366201] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1395.366918] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1395.367613] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:55:23 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 40) 03:55:23 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1010000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:55:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:55:23 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xffffffffffffff7f, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:55:23 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x12010000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1395.497711] FAULT_INJECTION: forcing a failure. [ 1395.497711] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1395.498785] CPU: 1 PID: 8842 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1395.499374] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1395.500052] Call Trace: [ 1395.500298] dump_stack+0x107/0x167 [ 1395.500603] should_fail.cold+0x5/0xa [ 1395.500919] _copy_to_user+0x2e/0x180 [ 1395.501279] syslog_print_all+0x39f/0x500 [ 1395.501619] ? syslog_print+0x440/0x440 [ 1395.501942] ? lock_downgrade+0x6d0/0x6d0 [ 1395.502317] ? lock_acquire+0x197/0x470 [ 1395.502650] ? avc_has_extended_perms+0xf40/0xf40 [ 1395.503048] ? do_one_initcall+0x14d/0x470 [ 1395.503408] ? lock_downgrade+0x6d0/0x6d0 [ 1395.503741] ? find_held_lock+0x2c/0x110 [ 1395.504087] do_syslog.part.0+0x427/0x850 [ 1395.504444] ? syslog_print_all+0x500/0x500 [ 1395.504788] ? avc_has_perm+0x108/0x1b0 [ 1395.505136] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1395.505547] ? rcu_read_lock_any_held+0x75/0xa0 [ 1395.505925] ? vfs_write+0x354/0xa70 [ 1395.506268] ? selinux_syslog+0xf4/0x2b0 [ 1395.506597] ? security_syslog+0x79/0xa0 [ 1395.506923] __x64_sys_syslog+0x9b/0xd0 [ 1395.507283] do_syscall_64+0x33/0x40 [ 1395.507584] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1395.507994] RIP: 0033:0x7fdbd377eb19 [ 1395.508329] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1395.509845] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1395.510489] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1395.511068] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1395.511658] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1395.512261] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1395.512831] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:55:23 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x2000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:55:23 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:55:23 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:55:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:55:23 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 41) 03:55:23 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:55:23 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x16000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1395.734803] FAULT_INJECTION: forcing a failure. [ 1395.734803] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1395.735781] CPU: 0 PID: 8867 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1395.736302] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1395.736921] Call Trace: [ 1395.737129] dump_stack+0x107/0x167 [ 1395.737418] should_fail.cold+0x5/0xa [ 1395.737717] _copy_to_user+0x2e/0x180 [ 1395.738019] syslog_print_all+0x39f/0x500 [ 1395.738339] ? syslog_print+0x440/0x440 [ 1395.738637] ? lock_downgrade+0x6d0/0x6d0 [ 1395.738951] ? __lockdep_reset_lock+0x180/0x180 [ 1395.739333] ? avc_has_extended_perms+0xf40/0xf40 [ 1395.739702] ? do_one_initcall+0x14d/0x470 [ 1395.740044] ? lock_downgrade+0x6d0/0x6d0 [ 1395.740356] ? find_held_lock+0x2c/0x110 [ 1395.740685] do_syslog.part.0+0x427/0x850 [ 1395.741004] ? syslog_print_all+0x500/0x500 [ 1395.741357] ? avc_has_perm+0x108/0x1b0 [ 1395.741665] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1395.742024] ? rcu_read_lock_any_held+0x75/0xa0 [ 1395.742374] ? vfs_write+0x354/0xa70 [ 1395.742662] ? selinux_syslog+0xf4/0x2b0 [ 1395.742973] ? security_syslog+0x79/0xa0 [ 1395.743283] __x64_sys_syslog+0x9b/0xd0 [ 1395.743597] do_syscall_64+0x33/0x40 [ 1395.743885] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1395.744271] RIP: 0033:0x7fdbd377eb19 [ 1395.744553] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1395.746324] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1395.747004] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1395.747691] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1395.748317] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1395.748891] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1395.749473] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:55:23 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1034) 03:55:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:55:23 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x3000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:55:23 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x18000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:55:23 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 42) 03:55:23 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:55:23 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) [ 1395.930766] FAULT_INJECTION: forcing a failure. [ 1395.930766] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1395.931876] CPU: 1 PID: 8889 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1395.932461] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1395.933145] Call Trace: [ 1395.933389] dump_stack+0x107/0x167 [ 1395.933680] should_fail.cold+0x5/0xa [ 1395.934000] _copy_to_user+0x2e/0x180 [ 1395.934341] syslog_print_all+0x39f/0x500 [ 1395.934672] ? syslog_print+0x440/0x440 [ 1395.935003] ? lock_downgrade+0x6d0/0x6d0 [ 1395.935367] ? __lockdep_reset_lock+0x180/0x180 [ 1395.935743] ? avc_has_extended_perms+0xf40/0xf40 [ 1395.936163] ? do_one_initcall+0x14d/0x470 [ 1395.936503] ? lock_downgrade+0x6d0/0x6d0 [ 1395.936843] ? find_held_lock+0x2c/0x110 [ 1395.937250] do_syslog.part.0+0x427/0x850 [ 1395.937587] ? syslog_print_all+0x500/0x500 [ 1395.937934] ? avc_has_perm+0x108/0x1b0 [ 1395.938298] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1395.938698] ? rcu_read_lock_any_held+0x75/0xa0 [ 1395.939091] ? vfs_write+0x354/0xa70 [ 1395.939393] ? selinux_syslog+0xf4/0x2b0 [ 1395.939713] ? security_syslog+0x79/0xa0 [ 1395.940055] __x64_sys_syslog+0x9b/0xd0 [ 1395.940370] do_syscall_64+0x33/0x40 [ 1395.940668] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1395.941086] RIP: 0033:0x7fdbd377eb19 [ 1395.941402] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1395.942896] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1395.943510] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1395.944094] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1395.944658] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1395.945254] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1395.945825] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:55:38 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:55:38 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1035) 03:55:38 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:55:38 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:55:38 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:55:38 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x3010000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:55:38 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1e300000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:55:38 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 43) 03:55:39 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) [ 1411.212591] FAULT_INJECTION: forcing a failure. [ 1411.212591] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1411.216629] CPU: 0 PID: 8915 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1411.217744] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1411.219067] Call Trace: [ 1411.219501] dump_stack+0x107/0x167 [ 1411.220092] should_fail.cold+0x5/0xa [ 1411.220717] _copy_to_user+0x2e/0x180 [ 1411.221341] syslog_print_all+0x39f/0x500 [ 1411.222030] ? syslog_print+0x440/0x440 [ 1411.222673] ? lock_downgrade+0x6d0/0x6d0 [ 1411.223352] ? __lockdep_reset_lock+0x180/0x180 [ 1411.224123] ? avc_has_extended_perms+0xf40/0xf40 [ 1411.224901] ? do_one_initcall+0x14d/0x470 [ 1411.225592] ? lock_downgrade+0x6d0/0x6d0 [ 1411.226259] ? find_held_lock+0x2c/0x110 [ 1411.226926] do_syslog.part.0+0x427/0x850 [ 1411.227598] ? syslog_print_all+0x500/0x500 [ 1411.228293] ? avc_has_perm+0x108/0x1b0 [ 1411.228938] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1411.229699] ? rcu_read_lock_any_held+0x75/0xa0 [ 1411.230446] ? vfs_write+0x354/0xa70 [ 1411.231055] ? selinux_syslog+0xf4/0x2b0 [ 1411.231712] ? security_syslog+0x79/0xa0 [ 1411.232375] __x64_sys_syslog+0x9b/0xd0 [ 1411.233021] do_syscall_64+0x33/0x40 [ 1411.233628] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1411.234451] RIP: 0033:0x7fdbd377eb19 [ 1411.235053] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1411.237980] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1411.239206] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1411.240345] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1411.241597] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1411.242696] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1411.243792] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:55:39 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:55:53 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:55:53 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1036) 03:55:53 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 44) 03:55:53 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:55:53 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x3300000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:55:53 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, 0x0, 0x0) 03:55:53 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x20000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:55:53 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) [ 1425.177717] FAULT_INJECTION: forcing a failure. [ 1425.177717] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1425.178658] CPU: 0 PID: 8936 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1425.179170] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1425.179784] Call Trace: [ 1425.179990] dump_stack+0x107/0x167 [ 1425.180265] should_fail.cold+0x5/0xa [ 1425.180563] _copy_to_user+0x2e/0x180 [ 1425.180854] syslog_print_all+0x39f/0x500 [ 1425.181175] ? syslog_print+0x440/0x440 [ 1425.181498] ? lock_downgrade+0x6d0/0x6d0 [ 1425.181860] ? lock_acquire+0x197/0x470 [ 1425.182194] ? avc_has_extended_perms+0xf40/0xf40 [ 1425.182588] ? do_one_initcall+0x14d/0x470 [ 1425.182929] ? lock_downgrade+0x6d0/0x6d0 [ 1425.183268] ? find_held_lock+0x2c/0x110 [ 1425.183611] do_syslog.part.0+0x427/0x850 [ 1425.183949] ? syslog_print_all+0x500/0x500 [ 1425.184282] ? avc_has_perm+0x108/0x1b0 [ 1425.184607] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1425.184953] ? rcu_read_lock_any_held+0x75/0xa0 [ 1425.185346] ? vfs_write+0x354/0xa70 [ 1425.185645] ? selinux_syslog+0xf4/0x2b0 [ 1425.185972] ? security_syslog+0x79/0xa0 [ 1425.186301] __x64_sys_syslog+0x9b/0xd0 [ 1425.186633] do_syscall_64+0x33/0x40 [ 1425.186917] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1425.187341] RIP: 0033:0x7fdbd377eb19 [ 1425.187626] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1425.189104] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1425.189688] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1425.190235] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1425.190792] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1425.191347] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1425.191884] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:55:53 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:55:53 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, 0x0, 0x0) 03:55:53 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x20100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:55:53 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:55:53 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:55:53 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 45) 03:55:53 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x2e000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:55:53 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, 0x0, 0x8000) [ 1425.492306] FAULT_INJECTION: forcing a failure. [ 1425.492306] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1425.493391] CPU: 0 PID: 8973 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1425.493923] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1425.494546] Call Trace: [ 1425.494752] dump_stack+0x107/0x167 [ 1425.495035] should_fail.cold+0x5/0xa [ 1425.495328] _copy_to_user+0x2e/0x180 [ 1425.495622] syslog_print_all+0x39f/0x500 [ 1425.495937] ? syslog_print+0x440/0x440 [ 1425.496239] ? lock_downgrade+0x6d0/0x6d0 [ 1425.496575] ? lock_acquire+0x197/0x470 [ 1425.496886] ? avc_has_extended_perms+0xf40/0xf40 [ 1425.497282] ? do_one_initcall+0x14d/0x470 [ 1425.497609] ? lock_downgrade+0x6d0/0x6d0 [ 1425.497940] ? find_held_lock+0x2c/0x110 [ 1425.498248] do_syslog.part.0+0x427/0x850 [ 1425.498598] ? syslog_print_all+0x500/0x500 [ 1425.498922] ? avc_has_perm+0x108/0x1b0 [ 1425.499264] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1425.499617] ? rcu_read_lock_any_held+0x75/0xa0 [ 1425.499998] ? vfs_write+0x354/0xa70 [ 1425.500282] ? selinux_syslog+0xf4/0x2b0 [ 1425.500613] ? security_syslog+0x79/0xa0 [ 1425.500922] __x64_sys_syslog+0x9b/0xd0 [ 1425.501248] do_syscall_64+0x33/0x40 [ 1425.501531] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1425.501969] RIP: 0033:0x7fdbd377eb19 [ 1425.502275] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1425.503749] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1425.504393] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1425.504966] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1425.505568] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1425.506160] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1425.506735] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:56:06 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 46) 03:56:06 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, 0x0, 0x0) 03:56:06 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x2f000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:56:06 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x5000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:56:06 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1037) 03:56:06 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, 0x0, 0x8000) 03:56:06 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617402020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:56:06 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:56:07 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:56:07 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, 0x0, 0x8000) [ 1439.148867] FAULT_INJECTION: forcing a failure. [ 1439.148867] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1439.151063] CPU: 0 PID: 8994 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1439.152268] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1439.153745] Call Trace: [ 1439.154227] dump_stack+0x107/0x167 [ 1439.154881] should_fail.cold+0x5/0xa [ 1439.155574] _copy_to_user+0x2e/0x180 [ 1439.156268] syslog_print_all+0x39f/0x500 [ 1439.157019] ? syslog_print+0x440/0x440 [ 1439.157755] ? lock_downgrade+0x6d0/0x6d0 [ 1439.158329] ? lock_acquire+0x197/0x470 [ 1439.158724] ? avc_has_extended_perms+0xf40/0xf40 [ 1439.159167] ? do_one_initcall+0x14d/0x470 [ 1439.159557] ? lock_downgrade+0x6d0/0x6d0 [ 1439.159924] ? find_held_lock+0x2c/0x110 [ 1439.160311] do_syslog.part.0+0x427/0x850 [ 1439.160697] ? syslog_print_all+0x500/0x500 [ 1439.161096] ? avc_has_perm+0x108/0x1b0 [ 1439.161467] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1439.161925] ? rcu_read_lock_any_held+0x75/0xa0 [ 1439.162351] ? vfs_write+0x354/0xa70 [ 1439.162706] ? selinux_syslog+0xf4/0x2b0 [ 1439.163094] ? security_syslog+0x79/0xa0 [ 1439.163490] __x64_sys_syslog+0x9b/0xd0 [ 1439.163863] do_syscall_64+0x33/0x40 [ 1439.164207] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1439.164677] RIP: 0033:0x7fdbd377eb19 [ 1439.165030] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1439.166695] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1439.167392] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1439.168038] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1439.168687] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1439.169334] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1439.169995] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 [ 1439.193306] FAT-fs (loop4): bogus logical sector size 514 [ 1439.194585] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1453.589426] FAULT_INJECTION: forcing a failure. [ 1453.589426] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1453.590482] CPU: 1 PID: 9024 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1453.591097] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1453.591782] Call Trace: [ 1453.592006] dump_stack+0x107/0x167 [ 1453.592301] should_fail.cold+0x5/0xa [ 1453.592608] _copy_to_user+0x2e/0x180 [ 1453.592927] syslog_print_all+0x39f/0x500 [ 1453.593279] ? syslog_print+0x440/0x440 [ 1453.593608] ? lock_downgrade+0x6d0/0x6d0 [ 1453.594016] ? lock_acquire+0x197/0x470 [ 1453.594621] ? avc_has_extended_perms+0xf40/0xf40 03:56:21 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1038) 03:56:21 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:56:21 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 47) 03:56:21 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x5050000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:56:21 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:56:21 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:56:21 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617403020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:56:21 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1453.595080] ? do_one_initcall+0x14d/0x470 [ 1453.595533] ? lock_downgrade+0x6d0/0x6d0 [ 1453.595876] ? find_held_lock+0x2c/0x110 [ 1453.596207] do_syslog.part.0+0x427/0x850 [ 1453.596546] ? syslog_print_all+0x500/0x500 [ 1453.596882] ? avc_has_perm+0x108/0x1b0 [ 1453.597207] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1453.597576] ? rcu_read_lock_any_held+0x75/0xa0 [ 1453.597958] ? vfs_write+0x354/0xa70 [ 1453.598258] ? selinux_syslog+0xf4/0x2b0 [ 1453.598574] ? security_syslog+0x79/0xa0 [ 1453.598896] __x64_sys_syslog+0x9b/0xd0 [ 1453.599233] do_syscall_64+0x33/0x40 [ 1453.599536] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1453.599951] RIP: 0033:0x7fdbd377eb19 [ 1453.600270] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1453.601767] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1453.602391] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1453.602990] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1453.603568] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1453.604158] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1453.604751] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:56:21 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:56:21 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 48) 03:56:21 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xffffffffffffff7f, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:56:21 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004}, 0x8000) [ 1453.766746] FAT-fs (loop4): bogus logical sector size 515 [ 1453.767799] FAT-fs (loop4): Can't find a valid FAT filesystem 03:56:21 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, 0x0, 0x8000) 03:56:21 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:56:21 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x6000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1453.843873] FAULT_INJECTION: forcing a failure. [ 1453.843873] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1453.845681] CPU: 0 PID: 9052 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1453.846723] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1453.847952] Call Trace: [ 1453.848487] dump_stack+0x107/0x167 [ 1453.849050] should_fail.cold+0x5/0xa [ 1453.849641] _copy_to_user+0x2e/0x180 [ 1453.850416] syslog_print_all+0x39f/0x500 [ 1453.851065] ? syslog_print+0x440/0x440 [ 1453.851865] ? lock_downgrade+0x6d0/0x6d0 [ 1453.852509] ? lock_acquire+0x197/0x470 [ 1453.853324] ? avc_has_extended_perms+0xf40/0xf40 [ 1453.854071] ? do_one_initcall+0x14d/0x470 [ 1453.854919] ? lock_downgrade+0x6d0/0x6d0 [ 1453.855556] ? find_held_lock+0x2c/0x110 [ 1453.856376] do_syslog.part.0+0x427/0x850 [ 1453.857021] ? syslog_print_all+0x500/0x500 [ 1453.857899] ? avc_has_perm+0x108/0x1b0 [ 1453.858526] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1453.859459] ? rcu_read_lock_any_held+0x75/0xa0 [ 1453.860175] ? vfs_write+0x354/0xa70 [ 1453.860920] ? selinux_syslog+0xf4/0x2b0 [ 1453.861545] ? security_syslog+0x79/0xa0 [ 1453.862372] __x64_sys_syslog+0x9b/0xd0 [ 1453.863180] do_syscall_64+0x33/0x40 [ 1453.863908] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1453.864679] RIP: 0033:0x7fdbd377eb19 [ 1453.865419] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1453.868202] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1453.869567] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1453.870727] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1453.871866] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1453.873004] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1453.874156] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:56:21 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x40000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:56:21 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1039) 03:56:21 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={0x0}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:56:21 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617404020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1454.068277] Zero length message leads to an empty skb 03:56:22 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, 0x0, 0x8000) [ 1454.078316] FAT-fs (loop4): bogus logical sector size 516 [ 1454.079344] FAT-fs (loop4): Can't find a valid FAT filesystem 03:56:22 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x6050000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:56:22 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfcfdffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:56:22 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={0x0}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:56:35 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:56:35 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={0x0}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:56:35 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x48000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:56:35 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 49) 03:56:35 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617405020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:56:35 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, 0x0, 0x8000) 03:56:35 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x7000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:56:35 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x103a) 03:56:35 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:56:35 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xff0f, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1467.772847] FAT-fs (loop4): bogus logical sector size 517 [ 1467.773832] FAT-fs (loop4): Can't find a valid FAT filesystem 03:56:35 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x4c000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1467.831589] FAULT_INJECTION: forcing a failure. [ 1467.831589] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1467.833549] CPU: 0 PID: 9097 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1467.834831] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1467.836149] Call Trace: [ 1467.836651] dump_stack+0x107/0x167 [ 1467.837258] should_fail.cold+0x5/0xa [ 1467.837963] _copy_to_user+0x2e/0x180 [ 1467.838654] syslog_print_all+0x39f/0x500 [ 1467.839417] ? syslog_print+0x440/0x440 [ 1467.840145] ? lock_downgrade+0x6d0/0x6d0 [ 1467.840810] ? lock_acquire+0x197/0x470 [ 1467.841535] ? avc_has_extended_perms+0xf40/0xf40 [ 1467.842350] ? do_one_initcall+0x14d/0x470 [ 1467.843098] ? lock_downgrade+0x6d0/0x6d0 [ 1467.843853] ? find_held_lock+0x2c/0x110 [ 1467.844527] do_syslog.part.0+0x427/0x850 [ 1467.845208] ? syslog_print_all+0x500/0x500 [ 1467.845893] ? avc_has_perm+0x108/0x1b0 [ 1467.846568] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1467.847285] ? rcu_read_lock_any_held+0x75/0xa0 [ 1467.848123] ? vfs_write+0x354/0xa70 [ 1467.848762] ? selinux_syslog+0xf4/0x2b0 [ 1467.849509] ? security_syslog+0x79/0xa0 [ 1467.850263] __x64_sys_syslog+0x9b/0xd0 [ 1467.850958] do_syscall_64+0x33/0x40 [ 1467.851637] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1467.852587] RIP: 0033:0x7fdbd377eb19 [ 1467.853192] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1467.856089] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1467.857243] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1467.858342] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1467.859420] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1467.860542] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1467.861626] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:56:50 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x103b) 03:56:50 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:56:50 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x68000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:56:50 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617406020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:56:50 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x7050000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:56:50 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x0, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:56:50 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:56:50 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 50) 03:56:50 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x0, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) [ 1482.604288] FAT-fs (loop4): bogus logical sector size 518 [ 1482.605793] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1482.628902] FAULT_INJECTION: forcing a failure. 03:56:50 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x8000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1482.628902] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1482.631146] CPU: 0 PID: 9138 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1482.632489] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1482.634134] Call Trace: [ 1482.634687] dump_stack+0x107/0x167 [ 1482.635241] should_fail.cold+0x5/0xa [ 1482.636003] _copy_to_user+0x2e/0x180 [ 1482.636589] syslog_print_all+0x39f/0x500 [ 1482.637410] ? syslog_print+0x440/0x440 [ 1482.637997] ? lock_downgrade+0x6d0/0x6d0 [ 1482.638823] ? lock_acquire+0x197/0x470 [ 1482.639433] ? avc_has_extended_perms+0xf40/0xf40 [ 1482.640384] ? do_one_initcall+0x14d/0x470 [ 1482.641071] ? lock_downgrade+0x6d0/0x6d0 [ 1482.641874] ? find_held_lock+0x2c/0x110 [ 1482.642509] do_syslog.part.0+0x427/0x850 [ 1482.643322] ? syslog_print_all+0x500/0x500 [ 1482.644028] ? avc_has_perm+0x108/0x1b0 [ 1482.644824] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1482.645531] ? rcu_read_lock_any_held+0x75/0xa0 [ 1482.646456] ? vfs_write+0x354/0xa70 [ 1482.647024] ? selinux_syslog+0xf4/0x2b0 [ 1482.647826] ? security_syslog+0x79/0xa0 [ 1482.648445] __x64_sys_syslog+0x9b/0xd0 [ 1482.649228] do_syscall_64+0x33/0x40 [ 1482.649849] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1482.650850] RIP: 0033:0x7fdbd377eb19 [ 1482.651419] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1482.655016] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1482.656146] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1482.657550] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1482.658986] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1482.660371] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1482.661768] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:56:50 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:56:50 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x6c000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:56:50 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617407020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:56:50 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x0, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:56:50 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) 03:56:50 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x103c) 03:56:50 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x103d) 03:56:50 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 51) 03:56:50 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617408020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1482.882874] FAULT_INJECTION: forcing a failure. [ 1482.882874] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1482.884081] CPU: 1 PID: 9171 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1482.884763] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1482.885603] Call Trace: [ 1482.885880] dump_stack+0x107/0x167 [ 1482.886268] should_fail.cold+0x5/0xa [ 1482.886667] _copy_to_user+0x2e/0x180 [ 1482.887088] syslog_print_all+0x39f/0x500 [ 1482.887519] ? syslog_print+0x440/0x440 [ 1482.887924] ? lock_downgrade+0x6d0/0x6d0 [ 1482.888389] ? lock_acquire+0x197/0x470 [ 1482.888815] ? avc_has_extended_perms+0xf40/0xf40 [ 1482.889366] ? do_one_initcall+0x14d/0x470 [ 1482.889800] ? lock_downgrade+0x6d0/0x6d0 [ 1482.890244] ? find_held_lock+0x2c/0x110 [ 1482.890675] do_syslog.part.0+0x427/0x850 [ 1482.891116] ? syslog_print_all+0x500/0x500 [ 1482.891562] ? avc_has_perm+0x108/0x1b0 [ 1482.892021] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1482.892655] ? rcu_read_lock_any_held+0x75/0xa0 [ 1482.893234] ? vfs_write+0x354/0xa70 [ 1482.893712] ? selinux_syslog+0xf4/0x2b0 [ 1482.894208] ? security_syslog+0x79/0xa0 [ 1482.894654] __x64_sys_syslog+0x9b/0xd0 [ 1482.895081] do_syscall_64+0x33/0x40 [ 1482.895505] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1482.896013] RIP: 0033:0x7fdbd377eb19 [ 1482.896374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1482.898144] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1482.898915] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1482.899640] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1482.900333] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1482.901029] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1482.901716] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:57:04 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 52) 03:57:04 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0x0, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:57:04 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x103e) 03:57:04 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x8050000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:57:04 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={0x0}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:57:04 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e6661740b020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:57:04 executing program 7: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:57:04 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x74000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1496.604733] FAULT_INJECTION: forcing a failure. [ 1496.604733] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1496.605889] CPU: 0 PID: 9183 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1496.606503] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1496.607169] Call Trace: [ 1496.607433] dump_stack+0x107/0x167 [ 1496.607760] should_fail.cold+0x5/0xa [ 1496.608130] _copy_to_user+0x2e/0x180 [ 1496.608501] syslog_print_all+0x39f/0x500 [ 1496.608905] ? syslog_print+0x440/0x440 [ 1496.609230] ? lock_downgrade+0x6d0/0x6d0 [ 1496.609571] ? lock_acquire+0x197/0x470 [ 1496.609911] ? avc_has_extended_perms+0xf40/0xf40 [ 1496.610306] ? do_one_initcall+0x14d/0x470 [ 1496.610662] ? lock_downgrade+0x6d0/0x6d0 [ 1496.611062] ? find_held_lock+0x2c/0x110 [ 1496.611461] do_syslog.part.0+0x427/0x850 [ 1496.611813] ? syslog_print_all+0x500/0x500 [ 1496.612232] ? avc_has_perm+0x108/0x1b0 [ 1496.612587] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1496.612971] ? rcu_read_lock_any_held+0x75/0xa0 [ 1496.613360] ? vfs_write+0x354/0xa70 [ 1496.613733] ? selinux_syslog+0xf4/0x2b0 [ 1496.614068] ? security_syslog+0x79/0xa0 [ 1496.614475] __x64_sys_syslog+0x9b/0xd0 [ 1496.614863] do_syscall_64+0x33/0x40 [ 1496.615183] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1496.615675] RIP: 0033:0x7fdbd377eb19 [ 1496.616012] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1496.617511] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1496.618266] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1496.618949] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1496.619512] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1496.620083] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1496.620776] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 [ 1496.725550] FAT-fs (loop4): bogus logical sector size 523 [ 1496.726297] FAT-fs (loop4): Can't find a valid FAT filesystem 03:57:04 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={0x0}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:57:04 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0x0, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:57:04 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 53) 03:57:04 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0x0, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:57:04 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={0x0}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:57:04 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x78000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:57:04 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1041) 03:57:04 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x9000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:57:04 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617418020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:57:04 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x0, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:57:04 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x7a000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1496.939207] FAULT_INJECTION: forcing a failure. [ 1496.939207] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1496.940160] CPU: 0 PID: 9208 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1496.940762] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1496.941496] Call Trace: [ 1496.941770] dump_stack+0x107/0x167 [ 1496.942046] should_fail.cold+0x5/0xa [ 1496.942438] _copy_to_user+0x2e/0x180 [ 1496.942814] syslog_print_all+0x39f/0x500 [ 1496.943136] ? syslog_print+0x440/0x440 [ 1496.943442] ? lock_downgrade+0x6d0/0x6d0 [ 1496.943848] ? lock_acquire+0x197/0x470 [ 1496.944237] ? avc_has_extended_perms+0xf40/0xf40 [ 1496.944704] ? do_one_initcall+0x14d/0x470 [ 1496.945031] ? lock_downgrade+0x6d0/0x6d0 [ 1496.945428] ? find_held_lock+0x2c/0x110 [ 1496.945774] do_syslog.part.0+0x427/0x850 [ 1496.946180] ? syslog_print_all+0x500/0x500 [ 1496.946611] ? avc_has_perm+0x108/0x1b0 [ 1496.946930] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1496.947355] ? rcu_read_lock_any_held+0x75/0xa0 [ 1496.947806] ? vfs_write+0x354/0xa70 [ 1496.948179] ? selinux_syslog+0xf4/0x2b0 [ 1496.948505] ? security_syslog+0x79/0xa0 [ 1496.948880] __x64_sys_syslog+0x9b/0xd0 [ 1496.949273] do_syscall_64+0x33/0x40 [ 1496.949637] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1496.950076] RIP: 0033:0x7fdbd377eb19 [ 1496.950454] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1496.952027] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1496.952576] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1496.953093] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1496.953608] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1496.954118] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1496.954639] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:57:04 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x0, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:57:04 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x0, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:57:04 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x9000100, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:57:05 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x7400, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1497.073361] FAT-fs (loop4): bogus logical sector size 536 [ 1497.074373] FAT-fs (loop4): Can't find a valid FAT filesystem 03:57:05 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:57:19 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 54) 03:57:19 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1042) 03:57:19 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xc0ed0000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:57:19 executing program 7: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1017) 03:57:19 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x9050000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:57:19 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x0, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:57:19 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x0, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:57:19 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e6661741c020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1511.245978] FAT-fs (loop4): bogus logical sector size 540 [ 1511.246553] FAT-fs (loop4): Can't find a valid FAT filesystem 03:57:19 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0x0, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) [ 1511.294552] FAULT_INJECTION: forcing a failure. [ 1511.294552] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1511.295771] CPU: 1 PID: 9253 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1511.296352] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1511.297013] Call Trace: [ 1511.297233] dump_stack+0x107/0x167 [ 1511.297526] should_fail.cold+0x5/0xa [ 1511.297838] _copy_to_user+0x2e/0x180 [ 1511.298152] syslog_print_all+0x39f/0x500 [ 1511.298485] ? syslog_print+0x440/0x440 [ 1511.298809] ? lock_downgrade+0x6d0/0x6d0 [ 1511.299152] ? __lockdep_reset_lock+0x180/0x180 [ 1511.299530] ? avc_has_extended_perms+0xf40/0xf40 [ 1511.299914] ? do_one_initcall+0x14d/0x470 [ 1511.300275] ? lock_downgrade+0x6d0/0x6d0 [ 1511.300610] ? find_held_lock+0x2c/0x110 [ 1511.300939] do_syslog.part.0+0x427/0x850 [ 1511.301296] ? syslog_print_all+0x500/0x500 [ 1511.301666] ? avc_has_perm+0x108/0x1b0 [ 1511.301996] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1511.302399] ? rcu_read_lock_any_held+0x75/0xa0 [ 1511.302807] ? vfs_write+0x354/0xa70 [ 1511.303132] ? selinux_syslog+0xf4/0x2b0 [ 1511.303461] ? security_syslog+0x79/0xa0 [ 1511.303788] __x64_sys_syslog+0x9b/0xd0 [ 1511.304102] do_syscall_64+0x33/0x40 [ 1511.304400] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1511.304808] RIP: 0033:0x7fdbd377eb19 [ 1511.305105] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1511.335284] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1511.335876] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1511.336443] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1511.336983] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1511.337519] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1511.338061] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:57:19 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617466020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:57:19 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xa000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1511.513683] FAT-fs (loop4): bogus logical sector size 614 [ 1511.515235] FAT-fs (loop4): Can't find a valid FAT filesystem 03:57:33 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xf0ffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:57:33 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400030801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:57:33 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xa000100, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:57:33 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x0, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:57:33 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0x0, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:57:33 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1043) 03:57:33 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:57:33 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 55) [ 1525.337071] FAULT_INJECTION: forcing a failure. [ 1525.337071] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1525.338982] CPU: 0 PID: 9289 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1525.340057] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1525.341356] Call Trace: [ 1525.341769] dump_stack+0x107/0x167 [ 1525.342340] should_fail.cold+0x5/0xa [ 1525.342967] _copy_to_user+0x2e/0x180 [ 1525.343559] syslog_print_all+0x39f/0x500 [ 1525.344238] ? syslog_print+0x440/0x440 [ 1525.344863] ? lock_downgrade+0x6d0/0x6d0 [ 1525.345508] ? lock_acquire+0x197/0x470 [ 1525.346132] ? avc_has_extended_perms+0xf40/0xf40 [ 1525.346905] ? do_one_initcall+0x14d/0x470 [ 1525.347562] ? lock_downgrade+0x6d0/0x6d0 [ 1525.348234] ? find_held_lock+0x2c/0x110 [ 1525.348891] do_syslog.part.0+0x427/0x850 [ 1525.349539] ? syslog_print_all+0x500/0x500 [ 1525.350224] ? avc_has_perm+0x108/0x1b0 [ 1525.350877] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 1525.351568] ? rcu_read_lock_any_held+0x75/0xa0 [ 1525.352315] ? vfs_write+0x354/0xa70 [ 1525.352918] ? selinux_syslog+0xf4/0x2b0 [ 1525.353549] ? security_syslog+0x79/0xa0 [ 1525.354201] __x64_sys_syslog+0x9b/0xd0 [ 1525.354868] do_syscall_64+0x33/0x40 [ 1525.355449] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1525.356267] RIP: 0033:0x7fdbd377eb19 [ 1525.356861] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1525.359703] RSP: 002b:00007fdbd0cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1525.360912] RAX: ffffffffffffffda RBX: 00007fdbd3891f60 RCX: 00007fdbd377eb19 [ 1525.362042] RDX: 0000000000000b00 RSI: 0000000020000340 RDI: 0000000000000003 [ 1525.363196] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1525.364351] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1525.365462] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:57:33 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x8000) 03:57:33 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0x0, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) [ 1525.405382] FAT-fs (loop4): bogus logical sector size 768 [ 1525.405896] FAT-fs (loop4): Can't find a valid FAT filesystem 03:57:33 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:57:33 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xf9fdffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:57:33 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400060801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:57:33 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1525.640036] FAT-fs (loop4): bogus logical sector size 1536 [ 1525.640561] FAT-fs (loop4): Can't find a valid FAT filesystem 03:57:47 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) (fail_nth: 56) 03:57:47 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:57:47 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x0, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:57:47 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1044) 03:57:47 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x8000) 03:57:47 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400070801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:57:47 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:57:47 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfcfdffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1539.353676] FAULT_INJECTION: forcing a failure. [ 1539.353676] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1539.354642] CPU: 0 PID: 9340 Comm: syz-executor.5 Not tainted 5.10.213 #1 [ 1539.355179] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1539.355812] Call Trace: [ 1539.356021] dump_stack+0x107/0x167 [ 1539.356298] should_fail.cold+0x5/0xa [ 1539.356594] _copy_to_user+0x2e/0x180 [ 1539.356891] simple_read_from_buffer+0xcc/0x160 [ 1539.357249] proc_fail_nth_read+0x198/0x230 [ 1539.357588] ? proc_sessionid_read+0x230/0x230 [ 1539.357938] ? security_file_permission+0x24e/0x570 [ 1539.358334] ? perf_trace_initcall_start+0x101/0x380 [ 1539.358734] ? proc_sessionid_read+0x230/0x230 [ 1539.359104] vfs_read+0x228/0x580 [ 1539.359393] ksys_read+0x12d/0x260 [ 1539.359669] ? vfs_write+0xa70/0xa70 [ 1539.359965] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1539.360380] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1539.360787] do_syscall_64+0x33/0x40 [ 1539.361071] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1539.361482] RIP: 0033:0x7fdbd373169c [ 1539.361783] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1539.363287] RSP: 002b:00007fdbd0cf4170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1539.363883] RAX: ffffffffffffffda RBX: 0000000000000aad RCX: 00007fdbd373169c [ 1539.364451] RDX: 000000000000000f RSI: 00007fdbd0cf41e0 RDI: 0000000000000003 [ 1539.365023] RBP: 00007fdbd0cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1539.365579] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1539.366143] R13: 00007ffcfa0f3b7f R14: 00007fdbd0cf4300 R15: 0000000000022000 03:57:47 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xd000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1539.479133] FAT-fs (loop4): bogus logical sector size 1792 [ 1539.479688] FAT-fs (loop4): Can't find a valid FAT filesystem 03:57:47 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) 03:57:47 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x0, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 03:57:47 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfdfdffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:57:47 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1045) 03:57:47 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617466020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:57:47 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400200801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:57:47 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x8000) 03:57:47 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x0, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) [ 1539.741975] FAT-fs (loop7): bogus logical sector size 614 [ 1539.742554] FAT-fs (loop7): Can't find a valid FAT filesystem [ 1539.772415] FAT-fs (loop4): bogus logical sector size 8192 [ 1539.772972] FAT-fs (loop4): Can't find a valid FAT filesystem 03:58:03 executing program 5: syslog(0x2, &(0x7f0000000340)=""/4096, 0xb00) 03:58:03 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xffffff8c, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:58:03 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400400801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:58:03 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1046) 03:58:03 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xd300000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:58:03 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfe2f0000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:58:03 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x8000) 03:58:03 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x0) [ 1555.301384] FAT-fs (loop4): bogus logical sector size 16384 [ 1555.302038] FAT-fs (loop4): Can't find a valid FAT filesystem 03:58:03 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfeffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:58:03 executing program 5: syslog(0x4, &(0x7f0000000340)=""/4096, 0xb00) 03:58:03 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400030801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:58:03 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 1) 03:58:03 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xe300000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:58:03 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1047) [ 1555.539609] FAULT_INJECTION: forcing a failure. [ 1555.539609] name failslab, interval 1, probability 0, space 0, times 0 [ 1555.540815] CPU: 1 PID: 9421 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1555.541422] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1555.542076] Call Trace: [ 1555.542276] dump_stack+0x107/0x167 [ 1555.542541] should_fail.cold+0x5/0xa [ 1555.542817] ? mb_cache_entry_create+0xbf/0x910 [ 1555.543163] should_failslab+0x5/0x20 [ 1555.543438] kmem_cache_alloc+0x5b/0x310 [ 1555.543733] mb_cache_entry_create+0xbf/0x910 [ 1555.544092] ? ext4_xattr_check_entries+0x337/0x3c0 [ 1555.544510] ext4_xattr_get+0x563/0xa00 [ 1555.544832] ? ext4_xattr_ibody_get+0x4a0/0x4a0 [ 1555.545231] ? arch_stack_walk+0x99/0xf0 [ 1555.545540] ? xattr_resolve_name+0x26e/0x3e0 [ 1555.545889] ? ext4_xattr_security_set+0x40/0x40 [ 1555.546258] __vfs_getxattr+0xe3/0x150 [ 1555.546554] ? __vfs_setxattr+0x180/0x180 [ 1555.546870] ? lock_acquire+0x197/0x470 [ 1555.547317] ? ext4_file_write_iter+0x377/0x18d0 [ 1555.547708] cap_inode_need_killpriv+0x3c/0x60 [ 1555.548074] security_inode_need_killpriv+0x46/0xa0 [ 1555.548473] file_remove_privs+0x2ea/0x520 [ 1555.548806] ? inode_set_ctime_current+0xa0/0xa0 [ 1555.549193] ? generic_write_checks+0x2ad/0x390 [ 1555.549579] ? generic_write_check_limits+0x2a0/0x2a0 [ 1555.549986] ? down_write+0xe0/0x160 [ 1555.550280] ? down_write_killable+0x180/0x180 [ 1555.550636] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1555.551064] file_modified+0x14/0xa0 [ 1555.551382] ext4_file_write_iter+0x906/0x18d0 [ 1555.551752] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1555.552114] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1555.552532] new_sync_write+0x42c/0x660 [ 1555.552853] ? new_sync_read+0x6f0/0x6f0 [ 1555.553172] ? ksys_write+0x12d/0x260 [ 1555.553480] ? lock_release+0x680/0x680 [ 1555.553793] ? selinux_file_permission+0x92/0x520 [ 1555.554171] ? __fget_files+0x296/0x4c0 [ 1555.554489] vfs_write+0x747/0xa70 [ 1555.554779] ksys_write+0x12d/0x260 [ 1555.555065] ? __ia32_sys_read+0xb0/0xb0 [ 1555.555414] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1555.555872] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1555.556388] do_syscall_64+0x33/0x40 [ 1555.556688] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1555.557150] RIP: 0033:0x7f21b1e90b19 [ 1555.557481] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1555.559012] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1555.559646] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1555.560197] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1555.560809] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1555.561436] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1555.562008] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 03:58:18 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 03:58:18 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xff0f0000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:58:18 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x8000) 03:58:18 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1048) 03:58:18 executing program 5: syslog(0x9, &(0x7f0000000340)=""/4096, 0xb00) 03:58:18 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 2) 03:58:18 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xf000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:58:18 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400040801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1570.551409] FAULT_INJECTION: forcing a failure. [ 1570.551409] name failslab, interval 1, probability 0, space 0, times 0 [ 1570.553298] CPU: 1 PID: 9443 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1570.554378] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1570.555730] Call Trace: [ 1570.556163] dump_stack+0x107/0x167 [ 1570.556748] should_fail.cold+0x5/0xa [ 1570.557363] ? create_object.isra.0+0x3a/0xa20 [ 1570.558109] should_failslab+0x5/0x20 [ 1570.558727] kmem_cache_alloc+0x5b/0x310 [ 1570.559381] create_object.isra.0+0x3a/0xa20 [ 1570.560065] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1570.560851] kmem_cache_alloc+0x159/0x310 [ 1570.561508] mb_cache_entry_create+0xbf/0x910 [ 1570.562248] ext4_xattr_get+0x563/0xa00 [ 1570.562891] ? ext4_xattr_ibody_get+0x4a0/0x4a0 [ 1570.563653] ? arch_stack_walk+0x99/0xf0 [ 1570.564287] ? xattr_resolve_name+0x26e/0x3e0 [ 1570.564989] ? ext4_xattr_security_set+0x40/0x40 [ 1570.565719] __vfs_getxattr+0xe3/0x150 [ 1570.566328] ? __vfs_setxattr+0x180/0x180 [ 1570.566979] ? lock_acquire+0x197/0x470 [ 1570.567639] ? ext4_file_write_iter+0x377/0x18d0 [ 1570.568378] cap_inode_need_killpriv+0x3c/0x60 [ 1570.569084] security_inode_need_killpriv+0x46/0xa0 [ 1570.569860] file_remove_privs+0x2ea/0x520 [ 1570.570519] ? inode_set_ctime_current+0xa0/0xa0 [ 1570.571291] ? generic_write_checks+0x2ad/0x390 [ 1570.572027] ? generic_write_check_limits+0x2a0/0x2a0 [ 1570.572827] ? down_write+0xe0/0x160 [ 1570.573436] ? down_write_killable+0x180/0x180 [ 1570.574176] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1570.574995] file_modified+0x14/0xa0 [ 1570.575610] ext4_file_write_iter+0x906/0x18d0 [ 1570.576370] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1570.577115] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1570.577974] new_sync_write+0x42c/0x660 [ 1570.578611] ? new_sync_read+0x6f0/0x6f0 [ 1570.579263] ? ksys_write+0x12d/0x260 [ 1570.579864] ? lock_release+0x680/0x680 [ 1570.580507] ? selinux_file_permission+0x92/0x520 [ 1570.581268] ? __fget_files+0x296/0x4c0 [ 1570.581929] vfs_write+0x747/0xa70 [ 1570.582496] ksys_write+0x12d/0x260 [ 1570.583090] ? __ia32_sys_read+0xb0/0xb0 [ 1570.583740] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1570.584605] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1570.585444] do_syscall_64+0x33/0x40 [ 1570.586049] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1570.586874] RIP: 0033:0x7f21b1e90b19 [ 1570.587476] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1570.590370] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1570.591554] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1570.592702] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1570.593804] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1570.594917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1570.596080] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 03:58:18 executing program 5: syslog(0x9, &(0x7f0000000340)=""/4096, 0xb00) 03:58:18 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 3) 03:58:18 executing program 5: syslog(0x9, &(0x7f0000000340)=""/4096, 0xb00) [ 1570.825941] FAT-fs (loop4): bogus number of directory entries (112) [ 1570.827548] FAT-fs (loop4): Can't find a valid FAT filesystem 03:58:18 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1049) 03:58:18 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xf300000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1570.865851] FAULT_INJECTION: forcing a failure. [ 1570.865851] name failslab, interval 1, probability 0, space 0, times 0 [ 1570.867777] CPU: 1 PID: 9459 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1570.868825] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1570.870085] Call Trace: [ 1570.870505] dump_stack+0x107/0x167 [ 1570.871078] should_fail.cold+0x5/0xa [ 1570.871684] ? mb_cache_entry_create+0xbf/0x910 [ 1570.872414] should_failslab+0x5/0x20 [ 1570.872991] kmem_cache_alloc+0x5b/0x310 [ 1570.873633] mb_cache_entry_create+0xbf/0x910 [ 1570.874345] ext4_xattr_get+0x563/0xa00 [ 1570.874976] ? ext4_xattr_ibody_get+0x4a0/0x4a0 [ 1570.875865] ? xattr_resolve_name+0x26e/0x3e0 [ 1570.876593] ? ext4_xattr_security_set+0x40/0x40 [ 1570.877335] __vfs_getxattr+0xe3/0x150 [ 1570.877964] ? __vfs_setxattr+0x180/0x180 [ 1570.878637] ? igrab+0xc0/0xc0 [ 1570.879156] ? ext4_xattr_security_set+0x40/0x40 [ 1570.879926] cap_inode_need_killpriv+0x3c/0x60 [ 1570.880652] security_inode_need_killpriv+0x46/0xa0 [ 1570.881460] notify_change+0x886/0x10d0 [ 1570.882095] file_remove_privs+0x364/0x520 [ 1570.882782] ? inode_set_ctime_current+0xa0/0xa0 [ 1570.883570] ? generic_write_checks+0x2ad/0x390 [ 1570.884331] ? down_write+0xe0/0x160 [ 1570.884930] ? down_write_killable+0x180/0x180 [ 1570.885661] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1570.886496] file_modified+0x14/0xa0 [ 1570.887103] ext4_file_write_iter+0x906/0x18d0 [ 1570.887884] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1570.888645] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1570.889509] new_sync_write+0x42c/0x660 [ 1570.890175] ? new_sync_read+0x6f0/0x6f0 [ 1570.890848] ? ksys_write+0x12d/0x260 [ 1570.891499] ? lock_release+0x680/0x680 [ 1570.892138] ? selinux_file_permission+0x92/0x520 [ 1570.892922] ? __fget_files+0x296/0x4c0 [ 1570.893600] vfs_write+0x747/0xa70 [ 1570.894202] ksys_write+0x12d/0x260 [ 1570.894805] ? __ia32_sys_read+0xb0/0xb0 [ 1570.895488] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1570.896359] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1570.897209] do_syscall_64+0x33/0x40 [ 1570.897808] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1570.898653] RIP: 0033:0x7f21b1e90b19 [ 1570.899279] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1570.902321] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1570.903607] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1570.904778] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1570.905918] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1570.907091] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1570.908290] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 03:58:18 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 03:58:18 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfffdffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:58:35 executing program 5: syslog(0x9, &(0x7f0000000340)=""/4096, 0xb00) 03:58:35 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xffff1f00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:58:35 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x104a) [ 1587.509831] FAULT_INJECTION: forcing a failure. [ 1587.509831] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1587.511311] CPU: 0 PID: 9493 Comm: syz-executor.6 Not tainted 5.10.213 #1 [ 1587.511938] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1587.512687] Call Trace: [ 1587.512958] dump_stack+0x107/0x167 [ 1587.513314] should_fail.cold+0x5/0xa [ 1587.513697] _copy_from_user+0x2e/0x1b0 [ 1587.514098] __copy_msghdr_from_user+0x91/0x4b0 [ 1587.514755] ? __ia32_sys_shutdown+0x80/0x80 [ 1587.515191] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1587.515729] ? __lock_acquire+0x1657/0x5b00 [ 1587.516157] ? __lock_acquire+0xbb1/0x5b00 [ 1587.516586] sendmsg_copy_msghdr+0xa1/0x160 [ 1587.517002] ? do_recvmmsg+0x6d0/0x6d0 [ 1587.517393] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1587.517874] ? lock_downgrade+0x6d0/0x6d0 [ 1587.518296] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1587.518802] ___sys_sendmsg+0xc6/0x170 [ 1587.519194] ? sendmsg_copy_msghdr+0x160/0x160 [ 1587.519640] ? __fget_files+0x26d/0x4c0 [ 1587.520023] ? lock_downgrade+0x6d0/0x6d0 [ 1587.520417] ? find_held_lock+0x2c/0x110 [ 1587.520798] ? __fget_files+0x296/0x4c0 [ 1587.521226] ? __fget_light+0xea/0x290 [ 1587.521593] __sys_sendmsg+0xe5/0x1b0 [ 1587.521952] ? __sys_sendmsg_sock+0x40/0x40 [ 1587.522377] ? rcu_read_lock_any_held+0x75/0xa0 [ 1587.522802] ? fput_many+0x2f/0x1a0 [ 1587.523167] ? ksys_write+0x1a9/0x260 [ 1587.523557] ? __ia32_sys_read+0xb0/0xb0 [ 1587.523960] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1587.524462] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1587.524967] ? trace_hardirqs_on+0x5b/0x180 [ 1587.525385] do_syscall_64+0x33/0x40 [ 1587.525754] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1587.526277] RIP: 0033:0x7fa4f0967b19 [ 1587.526637] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1587.528373] RSP: 002b:00007fa4ededd188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1587.529128] RAX: ffffffffffffffda RBX: 00007fa4f0a7af60 RCX: 00007fa4f0967b19 [ 1587.529821] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1587.530500] RBP: 00007fa4ededd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1587.531214] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1587.531894] R13: 00007ffd65f736ff R14: 00007fa4ededd300 R15: 0000000000022000 03:58:35 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x11000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:58:35 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x8000) 03:58:35 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 4) 03:58:35 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400060801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:58:35 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 1) [ 1587.576573] FAULT_INJECTION: forcing a failure. [ 1587.576573] name failslab, interval 1, probability 0, space 0, times 0 [ 1587.577920] CPU: 0 PID: 9499 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1587.578609] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1587.579392] Call Trace: [ 1587.579740] dump_stack+0x107/0x167 [ 1587.580171] should_fail.cold+0x5/0xa [ 1587.580632] ? create_object.isra.0+0x3a/0xa20 [ 1587.581151] should_failslab+0x5/0x20 [ 1587.581607] kmem_cache_alloc+0x5b/0x310 [ 1587.582099] create_object.isra.0+0x3a/0xa20 [ 1587.582581] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1587.583175] kmem_cache_alloc+0x159/0x310 [ 1587.583696] mb_cache_entry_create+0xbf/0x910 [ 1587.584225] ext4_xattr_get+0x563/0xa00 [ 1587.584706] ? ext4_xattr_ibody_get+0x4a0/0x4a0 [ 1587.585261] ? xattr_resolve_name+0x26e/0x3e0 [ 1587.585752] ? ext4_xattr_security_set+0x40/0x40 [ 1587.586278] __vfs_getxattr+0xe3/0x150 [ 1587.586738] ? __vfs_setxattr+0x180/0x180 [ 1587.587215] ? igrab+0xc0/0xc0 [ 1587.587606] ? ext4_xattr_security_set+0x40/0x40 [ 1587.588207] cap_inode_need_killpriv+0x3c/0x60 [ 1587.588699] security_inode_need_killpriv+0x46/0xa0 [ 1587.589277] notify_change+0x886/0x10d0 [ 1587.589748] file_remove_privs+0x364/0x520 [ 1587.590232] ? inode_set_ctime_current+0xa0/0xa0 [ 1587.590795] ? generic_write_checks+0x2ad/0x390 [ 1587.591327] ? down_write+0xe0/0x160 [ 1587.591780] ? down_write_killable+0x180/0x180 [ 1587.592289] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1587.592893] file_modified+0x14/0xa0 [ 1587.593332] ext4_file_write_iter+0x906/0x18d0 [ 1587.593852] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1587.594399] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1587.595021] new_sync_write+0x42c/0x660 [ 1587.595504] ? new_sync_read+0x6f0/0x6f0 [ 1587.595979] ? ksys_write+0x12d/0x260 [ 1587.596428] ? lock_release+0x680/0x680 [ 1587.596903] ? selinux_file_permission+0x92/0x520 [ 1587.597502] ? __fget_files+0x296/0x4c0 [ 1587.597992] vfs_write+0x747/0xa70 [ 1587.598397] ksys_write+0x12d/0x260 [ 1587.598831] ? __ia32_sys_read+0xb0/0xb0 [ 1587.599276] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1587.599896] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1587.600512] do_syscall_64+0x33/0x40 [ 1587.600951] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1587.601561] RIP: 0033:0x7f21b1e90b19 [ 1587.602016] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1587.604166] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1587.605086] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1587.606031] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1587.606836] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1587.607651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1587.608429] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 03:58:35 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x12010000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1587.636797] FAT-fs (loop4): bogus logical sector size 1536 [ 1587.637830] FAT-fs (loop4): Can't find a valid FAT filesystem 03:58:35 executing program 5: syslog(0x9, &(0x7f0000000340)=""/4096, 0xb00) 03:58:35 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x104b) 03:58:35 executing program 5: syslog(0xa, &(0x7f0000000340)=""/4096, 0xb00) 03:58:35 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfffffdf9, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:58:35 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 03:58:35 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 2) 03:58:35 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x16000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:58:35 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 5) 03:58:35 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400070801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1587.778241] FAULT_INJECTION: forcing a failure. [ 1587.778241] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1587.779167] CPU: 1 PID: 9518 Comm: syz-executor.6 Not tainted 5.10.213 #1 [ 1587.779697] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1587.780326] Call Trace: [ 1587.780537] dump_stack+0x107/0x167 [ 1587.780824] should_fail.cold+0x5/0xa [ 1587.781133] _copy_from_user+0x2e/0x1b0 [ 1587.781444] iovec_from_user+0x141/0x400 [ 1587.781761] __import_iovec+0x67/0x590 [ 1587.782066] ? __ia32_sys_shutdown+0x80/0x80 [ 1587.782408] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1587.782810] import_iovec+0x83/0xb0 [ 1587.783096] sendmsg_copy_msghdr+0x131/0x160 [ 1587.783435] ? do_recvmmsg+0x6d0/0x6d0 [ 1587.783749] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1587.784145] ? lock_downgrade+0x6d0/0x6d0 [ 1587.784467] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1587.784876] ___sys_sendmsg+0xc6/0x170 [ 1587.785178] ? sendmsg_copy_msghdr+0x160/0x160 [ 1587.785535] ? __fget_files+0x26d/0x4c0 [ 1587.785840] ? lock_downgrade+0x6d0/0x6d0 [ 1587.786173] ? find_held_lock+0x2c/0x110 [ 1587.786491] ? __fget_files+0x296/0x4c0 [ 1587.786796] ? __fget_light+0xea/0x290 [ 1587.787101] __sys_sendmsg+0xe5/0x1b0 [ 1587.787391] ? __sys_sendmsg_sock+0x40/0x40 [ 1587.787746] ? rcu_read_lock_any_held+0x75/0xa0 [ 1587.788104] ? fput_many+0x2f/0x1a0 [ 1587.788380] ? ksys_write+0x1a9/0x260 [ 1587.788675] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1587.789066] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1587.789463] ? trace_hardirqs_on+0x5b/0x180 [ 1587.789812] do_syscall_64+0x33/0x40 [ 1587.790110] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1587.790522] RIP: 0033:0x7fa4f0967b19 [ 1587.790809] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1587.792235] RSP: 002b:00007fa4ededd188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1587.792832] RAX: ffffffffffffffda RBX: 00007fa4f0a7af60 RCX: 00007fa4f0967b19 [ 1587.793418] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1587.793965] RBP: 00007fa4ededd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1587.794511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1587.795077] R13: 00007ffd65f736ff R14: 00007fa4ededd300 R15: 0000000000022000 03:58:35 executing program 5: syslog(0x63, &(0x7f0000000340)=""/4096, 0xb00) [ 1587.869604] FAULT_INJECTION: forcing a failure. [ 1587.869604] name failslab, interval 1, probability 0, space 0, times 0 [ 1587.870883] CPU: 1 PID: 9525 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1587.871465] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1587.872153] Call Trace: [ 1587.872376] dump_stack+0x107/0x167 [ 1587.872667] should_fail.cold+0x5/0xa [ 1587.872974] ? jbd2__journal_start+0x190/0x7e0 [ 1587.873366] should_failslab+0x5/0x20 [ 1587.873674] kmem_cache_alloc+0x5b/0x310 [ 1587.874011] ? _down_write_nest_lock+0x160/0x160 [ 1587.874409] jbd2__journal_start+0x190/0x7e0 [ 1587.874771] __ext4_journal_start_sb+0x214/0x390 [ 1587.875184] ext4_xattr_set+0x23a/0x340 [ 1587.875517] ? ext4_xattr_set_credits+0x200/0x200 [ 1587.875908] ? xattr_resolve_name+0x26e/0x3e0 [ 1587.876278] ? ext4_initxattrs+0x120/0x120 [ 1587.876608] __vfs_removexattr+0xf9/0x170 [ 1587.876946] ? __vfs_getxattr+0x150/0x150 [ 1587.877291] cap_inode_killpriv+0x19/0x50 [ 1587.877627] security_inode_killpriv+0x46/0xa0 [ 1587.877995] setattr_prepare+0x19f/0x7c0 [ 1587.878315] ext4_setattr+0x1a8/0x2160 [ 1587.878630] ? igrab+0xc0/0xc0 [ 1587.878890] ? ext4_xattr_security_set+0x40/0x40 [ 1587.879283] ? ext4_journalled_write_end+0x1190/0x1190 [ 1587.879711] notify_change+0xc28/0x10d0 [ 1587.880041] file_remove_privs+0x364/0x520 [ 1587.880378] ? inode_set_ctime_current+0xa0/0xa0 [ 1587.880763] ? generic_write_checks+0x2ad/0x390 [ 1587.881148] ? down_write+0xe0/0x160 [ 1587.881448] ? down_write_killable+0x180/0x180 [ 1587.881796] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1587.882215] file_modified+0x14/0xa0 [ 1587.882520] ext4_file_write_iter+0x906/0x18d0 [ 1587.882884] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1587.883271] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1587.883685] new_sync_write+0x42c/0x660 [ 1587.884045] ? new_sync_read+0x6f0/0x6f0 [ 1587.884387] ? ksys_write+0x12d/0x260 [ 1587.884684] ? lock_release+0x680/0x680 [ 1587.885012] ? selinux_file_permission+0x92/0x520 [ 1587.885422] ? __fget_files+0x296/0x4c0 [ 1587.885744] vfs_write+0x747/0xa70 [ 1587.886051] ksys_write+0x12d/0x260 [ 1587.886358] ? __ia32_sys_read+0xb0/0xb0 [ 1587.886725] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1587.887186] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1587.887661] do_syscall_64+0x33/0x40 [ 1587.887971] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1587.888436] RIP: 0033:0x7f21b1e90b19 [ 1587.888764] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1587.890305] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1587.890950] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1587.891560] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1587.892104] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1587.892672] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1587.893226] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 [ 1587.943324] FAT-fs (loop4): bogus logical sector size 1792 [ 1587.943842] FAT-fs (loop4): Can't find a valid FAT filesystem 03:58:51 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0x900) 03:58:51 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x104c) 03:58:51 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020701000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:58:51 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 6) 03:58:51 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 03:58:51 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfffffdfc, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:58:51 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x18000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:58:51 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 3) [ 1603.422216] FAULT_INJECTION: forcing a failure. [ 1603.422216] name failslab, interval 1, probability 0, space 0, times 0 [ 1603.423439] CPU: 1 PID: 9545 Comm: syz-executor.6 Not tainted 5.10.213 #1 [ 1603.424177] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1603.425028] Call Trace: [ 1603.425329] dump_stack+0x107/0x167 [ 1603.425694] should_fail.cold+0x5/0xa [ 1603.426085] ? __alloc_skb+0x6d/0x5b0 [ 1603.426469] should_failslab+0x5/0x20 [ 1603.426852] kmem_cache_alloc_node+0x55/0x330 [ 1603.427307] __alloc_skb+0x6d/0x5b0 [ 1603.427696] netlink_sendmsg+0x998/0xdf0 [ 1603.428105] ? netlink_unicast+0x7f0/0x7f0 [ 1603.428537] ? netlink_unicast+0x7f0/0x7f0 [ 1603.428964] __sock_sendmsg+0x154/0x190 [ 1603.429360] ____sys_sendmsg+0x70d/0x870 [ 1603.429769] ? sock_write_iter+0x3d0/0x3d0 [ 1603.430223] ? do_recvmmsg+0x6d0/0x6d0 [ 1603.430626] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1603.431196] ? lock_downgrade+0x6d0/0x6d0 [ 1603.431619] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1603.432155] ___sys_sendmsg+0xf3/0x170 [ 1603.432553] ? sendmsg_copy_msghdr+0x160/0x160 [ 1603.433018] ? lock_downgrade+0x6d0/0x6d0 [ 1603.433434] ? find_held_lock+0x2c/0x110 [ 1603.433852] ? __fget_files+0x296/0x4c0 [ 1603.434256] ? __fget_light+0xea/0x290 [ 1603.434659] __sys_sendmsg+0xe5/0x1b0 [ 1603.435042] ? __sys_sendmsg_sock+0x40/0x40 [ 1603.435481] ? rcu_read_lock_any_held+0x75/0xa0 [ 1603.435975] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1603.436497] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1603.437019] ? trace_hardirqs_on+0x5b/0x180 [ 1603.437463] do_syscall_64+0x33/0x40 [ 1603.437951] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1603.438447] RIP: 0033:0x7fa4f0967b19 [ 1603.438808] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1603.440574] RSP: 002b:00007fa4ededd188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1603.441288] RAX: ffffffffffffffda RBX: 00007fa4f0a7af60 RCX: 00007fa4f0967b19 [ 1603.441971] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1603.442653] RBP: 00007fa4ededd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1603.443358] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1603.444055] R13: 00007ffd65f736ff R14: 00007fa4ededd300 R15: 0000000000022000 03:58:51 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 4) [ 1603.483895] FAT-fs (loop4): bogus sectors per cluster 7 [ 1603.484719] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1603.502585] FAULT_INJECTION: forcing a failure. [ 1603.502585] name failslab, interval 1, probability 0, space 0, times 0 [ 1603.504634] CPU: 0 PID: 9556 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1603.505704] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1603.506975] Call Trace: [ 1603.507395] dump_stack+0x107/0x167 [ 1603.507969] should_fail.cold+0x5/0xa [ 1603.508569] ? create_object.isra.0+0x3a/0xa20 [ 1603.509280] should_failslab+0x5/0x20 [ 1603.509876] kmem_cache_alloc+0x5b/0x310 [ 1603.510535] create_object.isra.0+0x3a/0xa20 [ 1603.511241] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1603.512068] kmem_cache_alloc+0x159/0x310 [ 1603.512725] ? _down_write_nest_lock+0x160/0x160 [ 1603.513473] jbd2__journal_start+0x190/0x7e0 [ 1603.514158] __ext4_journal_start_sb+0x214/0x390 [ 1603.514916] ext4_xattr_set+0x23a/0x340 [ 1603.515574] ? ext4_xattr_set_credits+0x200/0x200 [ 1603.516371] ? xattr_resolve_name+0x26e/0x3e0 [ 1603.517099] ? ext4_initxattrs+0x120/0x120 [ 1603.517769] __vfs_removexattr+0xf9/0x170 [ 1603.518419] ? __vfs_getxattr+0x150/0x150 [ 1603.519080] cap_inode_killpriv+0x19/0x50 [ 1603.519731] security_inode_killpriv+0x46/0xa0 [ 1603.520498] setattr_prepare+0x19f/0x7c0 [ 1603.521141] ext4_setattr+0x1a8/0x2160 [ 1603.521741] ? igrab+0xc0/0xc0 [ 1603.522245] ? ext4_xattr_security_set+0x40/0x40 [ 1603.522989] ? ext4_journalled_write_end+0x1190/0x1190 [ 1603.523812] notify_change+0xc28/0x10d0 [ 1603.524431] file_remove_privs+0x364/0x520 [ 1603.525090] ? inode_set_ctime_current+0xa0/0xa0 [ 1603.525888] ? generic_write_checks+0x2ad/0x390 [ 1603.526615] ? down_write+0xe0/0x160 [ 1603.527194] ? down_write_killable+0x180/0x180 [ 1603.527910] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1603.528745] file_modified+0x14/0xa0 [ 1603.529352] ext4_file_write_iter+0x906/0x18d0 [ 1603.530077] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1603.530809] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1603.531689] new_sync_write+0x42c/0x660 [ 1603.532320] ? new_sync_read+0x6f0/0x6f0 [ 1603.532957] ? ksys_write+0x12d/0x260 [ 1603.533547] ? lock_release+0x680/0x680 [ 1603.534183] ? selinux_file_permission+0x92/0x520 [ 1603.534950] ? __fget_files+0x296/0x4c0 [ 1603.535580] vfs_write+0x747/0xa70 [ 1603.536150] ksys_write+0x12d/0x260 [ 1603.536719] ? __ia32_sys_read+0xb0/0xb0 [ 1603.537413] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1603.538373] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1603.539213] do_syscall_64+0x33/0x40 [ 1603.539832] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1603.540664] RIP: 0033:0x7f21b1e90b19 [ 1603.541273] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1603.544218] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1603.545436] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1603.546573] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1603.547720] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1603.548840] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1603.549994] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 03:58:51 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb02) 03:58:51 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb03) 03:58:51 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1f300000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1603.652688] FAULT_INJECTION: forcing a failure. [ 1603.652688] name failslab, interval 1, probability 0, space 0, times 0 [ 1603.654798] CPU: 0 PID: 9564 Comm: syz-executor.6 Not tainted 5.10.213 #1 [ 1603.655911] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1603.657209] Call Trace: [ 1603.657629] dump_stack+0x107/0x167 [ 1603.658218] should_fail.cold+0x5/0xa [ 1603.658834] ? create_object.isra.0+0x3a/0xa20 [ 1603.659569] should_failslab+0x5/0x20 [ 1603.660187] kmem_cache_alloc+0x5b/0x310 [ 1603.660826] create_object.isra.0+0x3a/0xa20 [ 1603.661520] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1603.662319] kmem_cache_alloc_node+0x169/0x330 [ 1603.663061] __alloc_skb+0x6d/0x5b0 [ 1603.663664] netlink_sendmsg+0x998/0xdf0 [ 1603.664307] ? netlink_unicast+0x7f0/0x7f0 [ 1603.664996] ? netlink_unicast+0x7f0/0x7f0 [ 1603.665661] __sock_sendmsg+0x154/0x190 [ 1603.666292] ____sys_sendmsg+0x70d/0x870 [ 1603.666929] ? sock_write_iter+0x3d0/0x3d0 [ 1603.667604] ? do_recvmmsg+0x6d0/0x6d0 [ 1603.668245] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1603.669090] ? lock_downgrade+0x6d0/0x6d0 [ 1603.669741] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1603.670585] ___sys_sendmsg+0xf3/0x170 [ 1603.671213] ? sendmsg_copy_msghdr+0x160/0x160 [ 1603.671945] ? lock_downgrade+0x6d0/0x6d0 [ 1603.672599] ? find_held_lock+0x2c/0x110 [ 1603.673246] ? __fget_files+0x296/0x4c0 [ 1603.677508] ? __fget_light+0xea/0x290 [ 1603.678141] __sys_sendmsg+0xe5/0x1b0 [ 1603.678755] ? __sys_sendmsg_sock+0x40/0x40 [ 1603.679614] ? rcu_read_lock_any_held+0x75/0xa0 [ 1603.680392] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1603.681262] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1603.682089] ? trace_hardirqs_on+0x5b/0x180 [ 1603.682763] do_syscall_64+0x33/0x40 [ 1603.683377] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1603.684204] RIP: 0033:0x7fa4f0967b19 [ 1603.684781] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1603.687729] RSP: 002b:00007fa4ededd188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1603.688954] RAX: ffffffffffffffda RBX: 00007fa4f0a7af60 RCX: 00007fa4f0967b19 [ 1603.690096] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1603.691212] RBP: 00007fa4ededd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1603.692367] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1603.693498] R13: 00007ffd65f736ff R14: 00007fa4ededd300 R15: 0000000000022000 03:58:51 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb04) 03:58:51 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020802000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:58:51 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x104d) 03:58:51 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 7) 03:58:51 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfffffdfd, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:58:51 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb05) [ 1603.822564] FAULT_INJECTION: forcing a failure. [ 1603.822564] name failslab, interval 1, probability 0, space 0, times 0 [ 1603.824961] CPU: 0 PID: 9580 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1603.826064] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1603.827378] Call Trace: [ 1603.827821] dump_stack+0x107/0x167 [ 1603.828410] should_fail.cold+0x5/0xa [ 1603.829030] ? create_object.isra.0+0x3a/0xa20 [ 1603.829771] should_failslab+0x5/0x20 [ 1603.830380] kmem_cache_alloc+0x5b/0x310 [ 1603.831039] create_object.isra.0+0x3a/0xa20 [ 1603.831755] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1603.832563] kmem_cache_alloc+0x159/0x310 [ 1603.833234] ? jbd2_journal_put_journal_head+0x38a/0x560 [ 1603.834097] insert_revoke_hash+0x28/0x270 [ 1603.834766] jbd2_journal_revoke+0x2bb/0x570 [ 1603.835491] __ext4_forget+0x218/0x3e0 [ 1603.836134] ext4_free_blocks+0x2d0/0x2200 [ 1603.836829] ? jbd2_write_access_granted+0x210/0x3d0 [ 1603.837637] ? lock_downgrade+0x6d0/0x6d0 [ 1603.838301] ? ext4_mb_new_blocks+0x45b0/0x45b0 [ 1603.839050] ? chksum_update+0x4c/0xb0 [ 1603.839694] ? jbd2_write_access_granted+0x60/0x3d0 [ 1603.840476] ? wake_up_var+0x120/0x120 [ 1603.841124] ext4_xattr_release_block+0x3a3/0x910 [ 1603.841914] ext4_xattr_block_set+0x1f08/0x2fb0 [ 1603.842675] ? mark_held_locks+0x9e/0xe0 [ 1603.843337] ? ext4_xattr_set_entry+0x3b30/0x3b30 [ 1603.844137] ? xattr_find_entry+0x2aa/0x3b0 [ 1603.844828] ? ext4_xattr_block_find+0x5c/0x6a0 [ 1603.845599] ext4_xattr_set_handle+0x1037/0x1320 [ 1603.846379] ? ext4_xattr_ibody_set+0x3a0/0x3a0 [ 1603.847147] ? __jbd2_journal_unfile_buffer+0xb0/0xb0 [ 1603.847996] ? trace_hardirqs_on+0x5b/0x180 [ 1603.848723] ? __ext4_journal_start_sb+0x214/0x390 [ 1603.849527] ? __ext4_journal_start_sb+0x1db/0x390 [ 1603.850341] ext4_xattr_set+0x13a/0x340 [ 1603.851014] ? ext4_xattr_set_credits+0x200/0x200 [ 1603.851787] ? xattr_resolve_name+0x26e/0x3e0 [ 1603.852507] ? ext4_initxattrs+0x120/0x120 [ 1603.853189] __vfs_removexattr+0xf9/0x170 [ 1603.853854] ? __vfs_getxattr+0x150/0x150 [ 1603.854563] cap_inode_killpriv+0x19/0x50 [ 1603.855255] security_inode_killpriv+0x46/0xa0 [ 1603.855984] setattr_prepare+0x19f/0x7c0 [ 1603.856660] ext4_setattr+0x1a8/0x2160 [ 1603.857272] ? igrab+0xc0/0xc0 [ 1603.857797] ? ext4_xattr_security_set+0x40/0x40 [ 1603.858548] ? ext4_journalled_write_end+0x1190/0x1190 [ 1603.859401] notify_change+0xc28/0x10d0 [ 1603.860082] file_remove_privs+0x364/0x520 [ 1603.860746] ? inode_set_ctime_current+0xa0/0xa0 [ 1603.861514] ? generic_write_checks+0x2ad/0x390 [ 1603.862272] ? down_write+0xe0/0x160 [ 1603.862852] ? down_write_killable+0x180/0x180 [ 1603.863605] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1603.864456] file_modified+0x14/0xa0 [ 1603.865057] ext4_file_write_iter+0x906/0x18d0 [ 1603.865821] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1603.866548] ? __lockdep_reset_lock+0x180/0x180 [ 1603.867281] ? __lockdep_reset_lock+0x180/0x180 [ 1603.868018] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1603.868856] new_sync_write+0x42c/0x660 [ 1603.869501] ? new_sync_read+0x6f0/0x6f0 [ 1603.870136] ? ksys_write+0x12d/0x260 [ 1603.870757] ? lock_release+0x680/0x680 [ 1603.871382] ? selinux_file_permission+0x92/0x520 [ 1603.872144] ? __fget_files+0x296/0x4c0 [ 1603.872795] vfs_write+0x747/0xa70 [ 1603.873373] ksys_write+0x12d/0x260 [ 1603.873948] ? __ia32_sys_read+0xb0/0xb0 [ 1603.874586] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1603.875402] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1603.876215] do_syscall_64+0x33/0x40 [ 1603.876817] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1603.877637] RIP: 0033:0x7f21b1e90b19 [ 1603.878218] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1603.881154] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1603.882421] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1603.883520] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1603.884626] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1603.885724] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1603.886806] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 03:58:51 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x20000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:58:51 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020803000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:58:51 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 03:58:51 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfffffdff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:58:52 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 8) 03:58:52 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x104e) [ 1604.208832] FAULT_INJECTION: forcing a failure. [ 1604.208832] name failslab, interval 1, probability 0, space 0, times 0 [ 1604.209737] CPU: 1 PID: 9604 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1604.210264] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1604.210944] Call Trace: [ 1604.211154] dump_stack+0x107/0x167 [ 1604.211456] should_fail.cold+0x5/0xa [ 1604.211755] ? create_object.isra.0+0x3a/0xa20 [ 1604.212138] should_failslab+0x5/0x20 [ 1604.212423] kmem_cache_alloc+0x5b/0x310 [ 1604.212754] ? pagecache_get_page+0x243/0xc80 [ 1604.213095] create_object.isra.0+0x3a/0xa20 [ 1604.213454] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1604.213832] kmem_cache_alloc+0x159/0x310 [ 1604.214168] ext4_free_blocks+0xef2/0x2200 [ 1604.214508] ? ext4_mb_new_blocks+0x45b0/0x45b0 [ 1604.214862] ? chksum_update+0x4c/0xb0 [ 1604.215189] ext4_xattr_release_block+0x3a3/0x910 [ 1604.215566] ext4_xattr_block_set+0x1f08/0x2fb0 [ 1604.215963] ? mark_held_locks+0x9e/0xe0 [ 1604.216280] ? ext4_xattr_set_entry+0x3b30/0x3b30 [ 1604.216680] ? xattr_find_entry+0x2aa/0x3b0 [ 1604.217010] ? ext4_xattr_block_find+0x5c/0x6a0 [ 1604.217373] ext4_xattr_set_handle+0x1037/0x1320 [ 1604.217730] ? ext4_xattr_ibody_set+0x3a0/0x3a0 [ 1604.218100] ? __jbd2_journal_unfile_buffer+0xb0/0xb0 [ 1604.218481] ? trace_hardirqs_on+0x5b/0x180 [ 1604.218879] ? __ext4_journal_start_sb+0x214/0x390 [ 1604.219292] ? __ext4_journal_start_sb+0x1db/0x390 [ 1604.219698] ext4_xattr_set+0x13a/0x340 [ 1604.220047] ? ext4_xattr_set_credits+0x200/0x200 [ 1604.220462] ? xattr_resolve_name+0x26e/0x3e0 [ 1604.220798] ? ext4_initxattrs+0x120/0x120 [ 1604.221150] __vfs_removexattr+0xf9/0x170 [ 1604.221464] ? __vfs_getxattr+0x150/0x150 [ 1604.221824] cap_inode_killpriv+0x19/0x50 [ 1604.222139] security_inode_killpriv+0x46/0xa0 [ 1604.222512] setattr_prepare+0x19f/0x7c0 [ 1604.222842] ext4_setattr+0x1a8/0x2160 [ 1604.223161] ? igrab+0xc0/0xc0 [ 1604.223403] ? ext4_xattr_security_set+0x40/0x40 [ 1604.223811] ? ext4_journalled_write_end+0x1190/0x1190 [ 1604.224208] notify_change+0xc28/0x10d0 [ 1604.224546] file_remove_privs+0x364/0x520 [ 1604.224855] ? inode_set_ctime_current+0xa0/0xa0 [ 1604.225226] ? generic_write_checks+0x2ad/0x390 [ 1604.225623] ? down_write+0xe0/0x160 [ 1604.225946] ? down_write_killable+0x180/0x180 [ 1604.226313] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1604.226700] file_modified+0x14/0xa0 [ 1604.227002] ext4_file_write_iter+0x906/0x18d0 [ 1604.227356] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1604.227730] ? __lockdep_reset_lock+0x180/0x180 [ 1604.228079] ? __lockdep_reset_lock+0x180/0x180 [ 1604.228453] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1604.228886] new_sync_write+0x42c/0x660 [ 1604.229187] ? new_sync_read+0x6f0/0x6f0 [ 1604.229497] ? ksys_write+0x12d/0x260 [ 1604.229781] ? lock_release+0x680/0x680 [ 1604.230104] ? selinux_file_permission+0x92/0x520 [ 1604.230473] ? __fget_files+0x296/0x4c0 [ 1604.230785] vfs_write+0x747/0xa70 [ 1604.231095] ksys_write+0x12d/0x260 [ 1604.231381] ? __ia32_sys_read+0xb0/0xb0 [ 1604.231704] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1604.232133] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1604.232563] do_syscall_64+0x33/0x40 [ 1604.232857] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1604.233238] RIP: 0033:0x7f21b1e90b19 [ 1604.233535] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1604.234904] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1604.235529] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1604.236073] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1604.236595] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1604.237157] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1604.237698] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 03:59:06 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 5) 03:59:06 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 9) 03:59:06 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x104f) 03:59:06 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb06) 03:59:06 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020804000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:59:06 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x20100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:59:06 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xffffff7f, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:59:06 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020802000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1618.499565] FAULT_INJECTION: forcing a failure. [ 1618.499565] name failslab, interval 1, probability 0, space 0, times 0 [ 1618.507865] CPU: 0 PID: 9618 Comm: syz-executor.6 Not tainted 5.10.213 #1 [ 1618.508732] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1618.509717] Call Trace: [ 1618.510052] dump_stack+0x107/0x167 [ 1618.510478] should_fail.cold+0x5/0xa [ 1618.518636] should_failslab+0x5/0x20 [ 1618.519102] __kmalloc_node_track_caller+0x74/0x3b0 [ 1618.519732] ? netlink_sendmsg+0x998/0xdf0 [ 1618.520236] __alloc_skb+0xb1/0x5b0 [ 1618.520681] netlink_sendmsg+0x998/0xdf0 [ 1618.521165] ? netlink_unicast+0x7f0/0x7f0 [ 1618.521696] ? netlink_unicast+0x7f0/0x7f0 [ 1618.522192] __sock_sendmsg+0x154/0x190 [ 1618.522682] ____sys_sendmsg+0x70d/0x870 [ 1618.523173] ? sock_write_iter+0x3d0/0x3d0 [ 1618.523688] ? do_recvmmsg+0x6d0/0x6d0 [ 1618.524152] ? perf_trace_lock+0xac/0x490 [ 1618.524670] ? __lockdep_reset_lock+0x180/0x180 [ 1618.525228] ? perf_trace_lock+0xac/0x490 [ 1618.525742] ___sys_sendmsg+0xf3/0x170 [ 1618.526203] ? sendmsg_copy_msghdr+0x160/0x160 [ 1618.526766] ? lock_downgrade+0x6d0/0x6d0 [ 1618.527257] ? find_held_lock+0x2c/0x110 [ 1618.527768] ? __fget_files+0x296/0x4c0 [ 1618.528253] ? __fget_light+0xea/0x290 [ 1618.528743] __sys_sendmsg+0xe5/0x1b0 [ 1618.529187] ? __sys_sendmsg_sock+0x40/0x40 [ 1618.529717] ? rcu_read_lock_any_held+0x75/0xa0 [ 1618.530274] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1618.530938] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1618.531534] ? trace_hardirqs_on+0x5b/0x180 [ 1618.532084] do_syscall_64+0x33/0x40 [ 1618.532513] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1618.533136] RIP: 0033:0x7fa4f0967b19 [ 1618.533567] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1618.535775] RSP: 002b:00007fa4ededd188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1618.536673] RAX: ffffffffffffffda RBX: 00007fa4f0a7af60 RCX: 00007fa4f0967b19 [ 1618.537517] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1618.538345] RBP: 00007fa4ededd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1618.539206] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1618.540097] R13: 00007ffd65f736ff R14: 00007fa4ededd300 R15: 0000000000022000 [ 1618.554599] FAULT_INJECTION: forcing a failure. [ 1618.554599] name failslab, interval 1, probability 0, space 0, times 0 [ 1618.556416] CPU: 1 PID: 9624 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1618.557388] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1618.558580] Call Trace: [ 1618.558947] dump_stack+0x107/0x167 [ 1618.559464] should_fail.cold+0x5/0xa [ 1618.560003] ? jbd2__journal_start+0x190/0x7e0 [ 1618.560701] should_failslab+0x5/0x20 [ 1618.561216] kmem_cache_alloc+0x5b/0x310 [ 1618.561807] jbd2__journal_start+0x190/0x7e0 [ 1618.562412] __ext4_journal_start_sb+0x214/0x390 [ 1618.563092] ext4_dirty_inode+0xbc/0x130 [ 1618.563636] ? ext4_setattr+0x2160/0x2160 [ 1618.564232] __mark_inode_dirty+0x492/0xd40 [ 1618.564806] ? setattr_prepare+0x135/0x7c0 [ 1618.565421] ext4_setattr+0xc19/0x2160 [ 1618.565950] ? igrab+0xc0/0xc0 [ 1618.566402] ? ext4_xattr_security_set+0x40/0x40 [ 1618.567050] ? ext4_journalled_write_end+0x1190/0x1190 [ 1618.567799] notify_change+0xc28/0x10d0 [ 1618.568370] file_remove_privs+0x364/0x520 [ 1618.568977] ? inode_set_ctime_current+0xa0/0xa0 [ 1618.569622] ? generic_write_checks+0x2ad/0x390 [ 1618.570295] ? down_write+0xe0/0x160 [ 1618.570791] ? down_write_killable+0x180/0x180 [ 1618.571440] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1618.572169] file_modified+0x14/0xa0 [ 1618.572683] ext4_file_write_iter+0x906/0x18d0 [ 1618.573315] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1618.573947] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1618.574661] new_sync_write+0x42c/0x660 [ 1618.575209] ? new_sync_read+0x6f0/0x6f0 [ 1618.575760] ? ksys_write+0x12d/0x260 [ 1618.576299] ? lock_release+0x680/0x680 [ 1618.576833] ? selinux_file_permission+0x92/0x520 [ 1618.577496] ? __fget_files+0x296/0x4c0 [ 1618.578041] vfs_write+0x747/0xa70 [ 1618.578535] ksys_write+0x12d/0x260 [ 1618.579028] ? __ia32_sys_read+0xb0/0xb0 [ 1618.579586] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1618.580299] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1618.581011] do_syscall_64+0x33/0x40 [ 1618.581509] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1618.582209] RIP: 0033:0x7f21b1e90b19 [ 1618.582711] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1618.585199] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1618.586211] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1618.587179] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1618.588151] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1618.589116] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1618.590082] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 03:59:06 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xffffff8c, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:59:06 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 6) [ 1618.760708] FAULT_INJECTION: forcing a failure. [ 1618.760708] name failslab, interval 1, probability 0, space 0, times 0 [ 1618.762554] CPU: 1 PID: 9640 Comm: syz-executor.6 Not tainted 5.10.213 #1 [ 1618.763492] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1618.764636] Call Trace: [ 1618.765010] dump_stack+0x107/0x167 [ 1618.765521] should_fail.cold+0x5/0xa [ 1618.766052] ? create_object.isra.0+0x3a/0xa20 [ 1618.766659] should_failslab+0x5/0x20 [ 1618.767186] kmem_cache_alloc+0x5b/0x310 [ 1618.767712] create_object.isra.0+0x3a/0xa20 [ 1618.768336] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1618.769043] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 1618.769688] ? netlink_sendmsg+0x998/0xdf0 [ 1618.770275] __alloc_skb+0xb1/0x5b0 [ 1618.770747] netlink_sendmsg+0x998/0xdf0 [ 1618.771319] ? netlink_unicast+0x7f0/0x7f0 [ 1618.771880] ? netlink_unicast+0x7f0/0x7f0 [ 1618.772462] __sock_sendmsg+0x154/0x190 [ 1618.772972] ____sys_sendmsg+0x70d/0x870 [ 1618.773534] ? sock_write_iter+0x3d0/0x3d0 [ 1618.774071] ? do_recvmmsg+0x6d0/0x6d0 [ 1618.774608] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1618.775276] ? lock_downgrade+0x6d0/0x6d0 [ 1618.775862] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1618.776536] ___sys_sendmsg+0xf3/0x170 [ 1618.777075] ? sendmsg_copy_msghdr+0x160/0x160 [ 1618.777707] ? lock_downgrade+0x6d0/0x6d0 [ 1618.778281] ? find_held_lock+0x2c/0x110 [ 1618.778850] ? __fget_files+0x296/0x4c0 [ 1618.779410] ? __fget_light+0xea/0x290 [ 1618.779967] __sys_sendmsg+0xe5/0x1b0 [ 1618.780492] ? __sys_sendmsg_sock+0x40/0x40 [ 1618.781046] ? rcu_read_lock_any_held+0x75/0xa0 [ 1618.781698] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1618.782364] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1618.783066] ? trace_hardirqs_on+0x5b/0x180 [ 1618.783621] do_syscall_64+0x33/0x40 [ 1618.784144] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1618.784824] RIP: 0033:0x7fa4f0967b19 [ 1618.785302] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1618.787730] RSP: 002b:00007fa4ededd188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1618.788712] RAX: ffffffffffffffda RBX: 00007fa4f0a7af60 RCX: 00007fa4f0967b19 [ 1618.789686] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1618.790661] RBP: 00007fa4ededd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1618.791634] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1618.792617] R13: 00007ffd65f736ff R14: 00007fa4ededd300 R15: 0000000000022000 03:59:22 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 10) 03:59:22 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfffffff0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:59:22 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x2e000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:59:22 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb07) 03:59:22 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x18000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:59:22 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020805000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:59:22 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1050) 03:59:22 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 7) [ 1634.262736] FAULT_INJECTION: forcing a failure. [ 1634.262736] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1634.265153] CPU: 0 PID: 9661 Comm: syz-executor.6 Not tainted 5.10.213 #1 [ 1634.266266] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1634.267597] Call Trace: [ 1634.268042] dump_stack+0x107/0x167 [ 1634.268635] should_fail.cold+0x5/0xa [ 1634.269261] _copy_from_iter_full+0x201/0xa60 [ 1634.269994] ? __virt_addr_valid+0x170/0x5c0 [ 1634.270709] ? __check_object_size+0x319/0x440 [ 1634.271455] netlink_sendmsg+0x879/0xdf0 [ 1634.272133] ? netlink_unicast+0x7f0/0x7f0 [ 1634.272833] ? netlink_unicast+0x7f0/0x7f0 [ 1634.273520] __sock_sendmsg+0x154/0x190 [ 1634.274170] ____sys_sendmsg+0x70d/0x870 [ 1634.274830] ? sock_write_iter+0x3d0/0x3d0 [ 1634.275517] ? do_recvmmsg+0x6d0/0x6d0 [ 1634.276161] ? perf_trace_lock+0xac/0x490 [ 1634.276840] ? __lockdep_reset_lock+0x180/0x180 [ 1634.277590] ? perf_trace_lock+0xac/0x490 [ 1634.278271] ___sys_sendmsg+0xf3/0x170 [ 1634.278906] ? sendmsg_copy_msghdr+0x160/0x160 [ 1634.279652] ? lock_downgrade+0x6d0/0x6d0 [ 1634.280334] ? find_held_lock+0x2c/0x110 [ 1634.281005] ? __fget_files+0x296/0x4c0 [ 1634.281659] ? __fget_light+0xea/0x290 [ 1634.282303] __sys_sendmsg+0xe5/0x1b0 [ 1634.282923] ? __sys_sendmsg_sock+0x40/0x40 [ 1634.283621] ? rcu_read_lock_any_held+0x75/0xa0 [ 1634.284403] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1634.285246] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1634.286073] ? trace_hardirqs_on+0x5b/0x180 [ 1634.286777] do_syscall_64+0x33/0x40 [ 1634.287384] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1634.288223] RIP: 0033:0x7fa4f0967b19 [ 1634.288824] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1634.291768] RSP: 002b:00007fa4ededd188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1634.293010] RAX: ffffffffffffffda RBX: 00007fa4f0a7af60 RCX: 00007fa4f0967b19 [ 1634.294155] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1634.295301] RBP: 00007fa4ededd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1634.296477] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1634.297629] R13: 00007ffd65f736ff R14: 00007fa4ededd300 R15: 0000000000022000 [ 1634.332690] FAULT_INJECTION: forcing a failure. [ 1634.332690] name failslab, interval 1, probability 0, space 0, times 0 [ 1634.334718] CPU: 1 PID: 9662 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1634.335903] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1634.348920] Call Trace: [ 1634.349387] dump_stack+0x107/0x167 [ 1634.350011] should_fail.cold+0x5/0xa [ 1634.350665] ? create_object.isra.0+0x3a/0xa20 [ 1634.351450] should_failslab+0x5/0x20 [ 1634.352111] kmem_cache_alloc+0x5b/0x310 [ 1634.352815] create_object.isra.0+0x3a/0xa20 [ 1634.353569] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1634.354442] kmem_cache_alloc+0x159/0x310 [ 1634.355166] jbd2__journal_start+0x190/0x7e0 [ 1634.355908] __ext4_journal_start_sb+0x214/0x390 [ 1634.356757] ext4_dirty_inode+0xbc/0x130 [ 1634.357473] ? ext4_setattr+0x2160/0x2160 [ 1634.358160] __mark_inode_dirty+0x492/0xd40 [ 1634.358893] ? setattr_prepare+0x135/0x7c0 [ 1634.359604] ext4_setattr+0xc19/0x2160 [ 1634.360289] ? igrab+0xc0/0xc0 [ 1634.360838] ? ext4_xattr_security_set+0x40/0x40 [ 1634.361660] ? ext4_journalled_write_end+0x1190/0x1190 [ 1634.362553] notify_change+0xc28/0x10d0 [ 1634.363251] file_remove_privs+0x364/0x520 [ 1634.363970] ? inode_set_ctime_current+0xa0/0xa0 [ 1634.364793] ? generic_write_checks+0x2ad/0x390 [ 1634.365597] ? down_write+0xe0/0x160 [ 1634.366234] ? down_write_killable+0x180/0x180 [ 1634.367016] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1634.367881] file_modified+0x14/0xa0 [ 1634.368523] ext4_file_write_iter+0x906/0x18d0 [ 1634.369299] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1634.370076] ? __lockdep_reset_lock+0x180/0x180 [ 1634.370854] ? __lockdep_reset_lock+0x180/0x180 [ 1634.371644] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1634.372559] new_sync_write+0x42c/0x660 [ 1634.373242] ? new_sync_read+0x6f0/0x6f0 [ 1634.373931] ? ksys_write+0x12d/0x260 [ 1634.374593] ? lock_release+0x680/0x680 [ 1634.375276] ? selinux_file_permission+0x92/0x520 [ 1634.376106] ? __fget_files+0x296/0x4c0 [ 1634.376780] vfs_write+0x747/0xa70 [ 1634.377398] ksys_write+0x12d/0x260 [ 1634.378021] ? __ia32_sys_read+0xb0/0xb0 [ 1634.378715] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1634.379603] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1634.380496] do_syscall_64+0x33/0x40 [ 1634.381132] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1634.381995] RIP: 0033:0x7f21b1e90b19 [ 1634.382634] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1634.385727] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1634.387006] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1634.388209] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1634.389395] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1634.390595] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1634.391778] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 03:59:22 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb48) 03:59:22 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfffffdf9, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:59:22 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 11) [ 1634.642606] FAULT_INJECTION: forcing a failure. [ 1634.642606] name failslab, interval 1, probability 0, space 0, times 0 [ 1634.644711] CPU: 0 PID: 9678 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1634.645806] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1634.647085] Call Trace: [ 1634.647508] dump_stack+0x107/0x167 [ 1634.648093] should_fail.cold+0x5/0xa [ 1634.648697] ? jbd2__journal_start+0x190/0x7e0 [ 1634.649413] should_failslab+0x5/0x20 [ 1634.650009] kmem_cache_alloc+0x5b/0x310 [ 1634.650655] jbd2__journal_start+0x190/0x7e0 [ 1634.651361] __ext4_journal_start_sb+0x214/0x390 [ 1634.652117] ext4_dirty_inode+0xbc/0x130 [ 1634.652750] ? ext4_setattr+0x2160/0x2160 [ 1634.653392] __mark_inode_dirty+0x492/0xd40 [ 1634.654084] generic_update_time+0x21c/0x370 [ 1634.654790] file_update_time+0x43a/0x520 [ 1634.655461] ? evict_inodes+0x420/0x420 [ 1634.656123] ? down_write_killable+0x180/0x180 [ 1634.656864] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1634.657721] file_modified+0x7d/0xa0 [ 1634.658304] ext4_file_write_iter+0x906/0x18d0 [ 1634.659064] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1634.659818] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1634.660687] new_sync_write+0x42c/0x660 [ 1634.661335] ? new_sync_read+0x6f0/0x6f0 [ 1634.661997] ? ksys_write+0x12d/0x260 [ 1634.662628] ? lock_release+0x680/0x680 [ 1634.663248] ? selinux_file_permission+0x92/0x520 [ 1634.664046] ? __fget_files+0x296/0x4c0 [ 1634.664673] vfs_write+0x747/0xa70 [ 1634.665264] ksys_write+0x12d/0x260 [ 1634.665861] ? __ia32_sys_read+0xb0/0xb0 [ 1634.666530] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1634.667375] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1634.668214] do_syscall_64+0x33/0x40 [ 1634.668814] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1634.669641] RIP: 0033:0x7f21b1e90b19 [ 1634.670247] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1634.673193] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1634.674422] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1634.675568] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1634.676720] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1634.677843] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1634.678995] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 03:59:37 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 12) 03:59:37 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020807000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:59:37 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x8000) 03:59:37 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1649.592471] FAULT_INJECTION: forcing a failure. [ 1649.592471] name failslab, interval 1, probability 0, space 0, times 0 [ 1649.593727] CPU: 1 PID: 9697 Comm: syz-executor.6 Not tainted 5.10.213 #1 [ 1649.594270] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1649.594948] Call Trace: [ 1649.595177] dump_stack+0x107/0x167 [ 1649.595463] should_fail.cold+0x5/0xa 03:59:37 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x2f000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:59:37 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 8) 03:59:37 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1051) 03:59:37 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb4c) [ 1649.595780] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xdb/0x280 [ 1649.596548] should_failslab+0x5/0x20 [ 1649.596881] __kmalloc+0x72/0x390 [ 1649.597198] genl_family_rcv_msg_attrs_parse.constprop.0+0xdb/0x280 [ 1649.597745] genl_family_rcv_msg_doit+0xda/0x330 [ 1649.598166] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1649.598702] ? cap_capable+0x1cd/0x230 [ 1649.599074] ? security_capable+0x95/0xc0 [ 1649.599548] ? ns_capable+0xe2/0x110 [ 1649.599937] genl_rcv_msg+0x33c/0x5a0 [ 1649.600375] ? genl_get_cmd+0x480/0x480 [ 1649.600708] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1649.601198] ? lock_release+0x680/0x680 [ 1649.601525] ? netlink_deliver_tap+0xf4/0xcc0 [ 1649.601895] netlink_rcv_skb+0x14b/0x430 [ 1649.602235] ? genl_get_cmd+0x480/0x480 [ 1649.602563] ? netlink_ack+0xab0/0xab0 [ 1649.602882] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1649.603284] ? is_vmalloc_addr+0x7b/0xb0 [ 1649.603612] genl_rcv+0x24/0x40 [ 1649.603880] netlink_unicast+0x549/0x7f0 [ 1649.604228] ? netlink_attachskb+0x870/0x870 [ 1649.604594] netlink_sendmsg+0x90f/0xdf0 [ 1649.604932] ? netlink_unicast+0x7f0/0x7f0 [ 1649.605313] ? netlink_unicast+0x7f0/0x7f0 [ 1649.605658] __sock_sendmsg+0x154/0x190 [ 1649.606003] ____sys_sendmsg+0x70d/0x870 [ 1649.606344] ? sock_write_iter+0x3d0/0x3d0 [ 1649.606713] ? do_recvmmsg+0x6d0/0x6d0 [ 1649.607051] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1649.607511] ? lock_downgrade+0x6d0/0x6d0 [ 1649.607860] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1649.608336] ___sys_sendmsg+0xf3/0x170 [ 1649.608685] ? sendmsg_copy_msghdr+0x160/0x160 [ 1649.609084] ? lock_downgrade+0x6d0/0x6d0 [ 1649.609448] ? find_held_lock+0x2c/0x110 [ 1649.609815] ? __fget_files+0x296/0x4c0 [ 1649.610191] ? __fget_light+0xea/0x290 [ 1649.610517] __sys_sendmsg+0xe5/0x1b0 [ 1649.610834] ? __sys_sendmsg_sock+0x40/0x40 [ 1649.611228] ? rcu_read_lock_any_held+0x75/0xa0 [ 1649.611609] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1649.612083] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1649.612551] ? trace_hardirqs_on+0x5b/0x180 [ 1649.612928] do_syscall_64+0x33/0x40 [ 1649.613251] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1649.613689] RIP: 0033:0x7fa4f0967b19 [ 1649.614032] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1649.615623] RSP: 002b:00007fa4ededd188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1649.616305] RAX: ffffffffffffffda RBX: 00007fa4f0a7af60 RCX: 00007fa4f0967b19 [ 1649.616925] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1649.617531] RBP: 00007fa4ededd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1649.618156] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1649.618764] R13: 00007ffd65f736ff R14: 00007fa4ededd300 R15: 0000000000022000 03:59:37 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1649.679796] FAULT_INJECTION: forcing a failure. [ 1649.679796] name failslab, interval 1, probability 0, space 0, times 0 [ 1649.682278] CPU: 0 PID: 9704 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1649.683381] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1649.684709] Call Trace: [ 1649.685143] dump_stack+0x107/0x167 [ 1649.685734] should_fail.cold+0x5/0xa [ 1649.686352] ? create_object.isra.0+0x3a/0xa20 [ 1649.687094] should_failslab+0x5/0x20 [ 1649.687708] kmem_cache_alloc+0x5b/0x310 [ 1649.688380] create_object.isra.0+0x3a/0xa20 [ 1649.689087] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1649.689906] kmem_cache_alloc+0x159/0x310 [ 1649.690555] jbd2__journal_start+0x190/0x7e0 [ 1649.691287] __ext4_journal_start_sb+0x214/0x390 [ 1649.692017] ext4_dirty_inode+0xbc/0x130 [ 1649.692678] ? ext4_setattr+0x2160/0x2160 [ 1649.693303] __mark_inode_dirty+0x492/0xd40 [ 1649.694005] generic_update_time+0x21c/0x370 [ 1649.694675] file_update_time+0x43a/0x520 [ 1649.695340] ? evict_inodes+0x420/0x420 [ 1649.695984] ? down_write_killable+0x180/0x180 [ 1649.696727] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1649.697590] file_modified+0x7d/0xa0 [ 1649.698207] ext4_file_write_iter+0x906/0x18d0 [ 1649.698977] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1649.699715] ? __lockdep_reset_lock+0x180/0x180 [ 1649.700446] ? __lockdep_reset_lock+0x180/0x180 [ 1649.701206] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1649.702010] new_sync_write+0x42c/0x660 [ 1649.702658] ? new_sync_read+0x6f0/0x6f0 [ 1649.703290] ? ksys_write+0x12d/0x260 [ 1649.703907] ? lock_release+0x680/0x680 [ 1649.704531] ? selinux_file_permission+0x92/0x520 [ 1649.705323] ? __fget_files+0x296/0x4c0 [ 1649.705938] vfs_write+0x747/0xa70 [ 1649.706532] ksys_write+0x12d/0x260 [ 1649.707094] ? __ia32_sys_read+0xb0/0xb0 [ 1649.707748] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1649.708559] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1649.709407] do_syscall_64+0x33/0x40 [ 1649.709972] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1649.710797] RIP: 0033:0x7f21b1e90b19 [ 1649.711376] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1649.714326] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1649.715555] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1649.716708] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1649.717856] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1649.719005] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1649.720155] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 03:59:37 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb68) 03:59:37 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x40000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:59:37 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 9) 03:59:37 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e6661740002080f000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:59:37 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfffffffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:59:37 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb6c) 03:59:37 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1052) [ 1649.982178] FAULT_INJECTION: forcing a failure. [ 1649.982178] name failslab, interval 1, probability 0, space 0, times 0 [ 1649.984353] CPU: 0 PID: 9720 Comm: syz-executor.6 Not tainted 5.10.213 #1 [ 1649.985458] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1649.986791] Call Trace: [ 1649.987229] dump_stack+0x107/0x167 [ 1649.987824] should_fail.cold+0x5/0xa [ 1649.988455] ? create_object.isra.0+0x3a/0xa20 [ 1649.989196] should_failslab+0x5/0x20 [ 1649.989809] kmem_cache_alloc+0x5b/0x310 [ 1649.990464] ? __mutex_lock+0x5af/0x10b0 [ 1649.991127] create_object.isra.0+0x3a/0xa20 [ 1649.991790] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1649.992623] __kmalloc+0x16e/0x390 [ 1649.993177] genl_family_rcv_msg_attrs_parse.constprop.0+0xdb/0x280 [ 1649.994203] genl_family_rcv_msg_doit+0xda/0x330 [ 1649.994925] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1649.995974] ? cap_capable+0x1cd/0x230 [ 1649.996579] ? security_capable+0x95/0xc0 [ 1649.997259] ? ns_capable+0xe2/0x110 [ 1649.997836] genl_rcv_msg+0x33c/0x5a0 [ 1649.998458] ? genl_get_cmd+0x480/0x480 [ 1649.999060] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1649.999896] ? lock_release+0x680/0x680 [ 1650.000505] ? netlink_deliver_tap+0xf4/0xcc0 [ 1650.001236] netlink_rcv_skb+0x14b/0x430 [ 1650.001850] ? genl_get_cmd+0x480/0x480 [ 1650.002495] ? netlink_ack+0xab0/0xab0 [ 1650.003097] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1650.003831] ? is_vmalloc_addr+0x7b/0xb0 [ 1650.004461] genl_rcv+0x24/0x40 [ 1650.004994] netlink_unicast+0x549/0x7f0 [ 1650.005615] ? netlink_attachskb+0x870/0x870 [ 1650.006342] netlink_sendmsg+0x90f/0xdf0 [ 1650.006963] ? netlink_unicast+0x7f0/0x7f0 [ 1650.007660] ? netlink_unicast+0x7f0/0x7f0 [ 1650.008310] __sock_sendmsg+0x154/0x190 [ 1650.008952] ____sys_sendmsg+0x70d/0x870 [ 1650.009610] ? sock_write_iter+0x3d0/0x3d0 [ 1650.010291] ? do_recvmmsg+0x6d0/0x6d0 [ 1650.010926] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1650.011766] ? lock_downgrade+0x6d0/0x6d0 [ 1650.012407] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1650.013256] ___sys_sendmsg+0xf3/0x170 [ 1650.013846] ? sendmsg_copy_msghdr+0x160/0x160 [ 1650.014589] ? lock_downgrade+0x6d0/0x6d0 [ 1650.015217] ? find_held_lock+0x2c/0x110 [ 1650.015885] ? __fget_files+0x296/0x4c0 [ 1650.016515] ? __fget_light+0xea/0x290 [ 1650.017160] __sys_sendmsg+0xe5/0x1b0 [ 1650.017735] ? __sys_sendmsg_sock+0x40/0x40 [ 1650.018427] ? rcu_read_lock_any_held+0x75/0xa0 [ 1650.019154] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1650.019992] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1650.020766] ? trace_hardirqs_on+0x5b/0x180 [ 1650.021467] do_syscall_64+0x33/0x40 [ 1650.022028] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1650.022844] RIP: 0033:0x7fa4f0967b19 [ 1650.023407] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1650.026117] RSP: 002b:00007fa4ededd188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1650.027246] RAX: ffffffffffffffda RBX: 00007fa4f0a7af60 RCX: 00007fa4f0967b19 [ 1650.028311] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1650.029367] RBP: 00007fa4ededd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1650.030421] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1650.031475] R13: 00007ffd65f736ff R14: 00007fa4ededd300 R15: 0000000000022000 03:59:38 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 13) [ 1650.094145] FAULT_INJECTION: forcing a failure. [ 1650.094145] name failslab, interval 1, probability 0, space 0, times 0 [ 1650.095133] CPU: 1 PID: 9735 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1650.095688] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1650.096364] Call Trace: [ 1650.096582] dump_stack+0x107/0x167 [ 1650.096873] should_fail.cold+0x5/0xa [ 1650.097202] ? jbd2__journal_start+0x190/0x7e0 [ 1650.097572] should_failslab+0x5/0x20 [ 1650.097882] kmem_cache_alloc+0x5b/0x310 [ 1650.112853] jbd2__journal_start+0x190/0x7e0 [ 1650.113251] __ext4_journal_start_sb+0x214/0x390 [ 1650.113631] ext4_file_write_iter+0xdbf/0x18d0 [ 1650.114039] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1650.114437] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1650.114868] new_sync_write+0x42c/0x660 [ 1650.115211] ? new_sync_read+0x6f0/0x6f0 [ 1650.115542] ? ksys_write+0x12d/0x260 [ 1650.115851] ? lock_release+0x680/0x680 [ 1650.116219] ? selinux_file_permission+0x92/0x520 [ 1650.116615] ? __fget_files+0x296/0x4c0 [ 1650.116972] vfs_write+0x747/0xa70 [ 1650.117292] ksys_write+0x12d/0x260 [ 1650.117589] ? __ia32_sys_read+0xb0/0xb0 [ 1650.117928] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1650.118360] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1650.118780] do_syscall_64+0x33/0x40 [ 1650.119089] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1650.119501] RIP: 0033:0x7f21b1e90b19 [ 1650.119805] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1650.121354] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1650.121971] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1650.122544] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1650.123121] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1650.123699] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1650.124319] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 03:59:38 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x48000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:59:38 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 1) 03:59:38 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xedc000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:59:38 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e6661740002081b000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:59:38 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x4c000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:59:38 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 14) [ 1650.256420] FAULT_INJECTION: forcing a failure. [ 1650.256420] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1650.257466] CPU: 1 PID: 9742 Comm: syz-executor.3 Not tainted 5.10.213 #1 [ 1650.258025] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1650.258692] Call Trace: [ 1650.258920] dump_stack+0x107/0x167 [ 1650.259220] should_fail.cold+0x5/0xa [ 1650.259544] _copy_from_user+0x2e/0x1b0 [ 1650.259881] __copy_msghdr_from_user+0x91/0x4b0 [ 1650.260286] ? __ia32_sys_shutdown+0x80/0x80 [ 1650.260642] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1650.261077] ? __lock_acquire+0x1657/0x5b00 [ 1650.261456] ? __lock_acquire+0xbb1/0x5b00 [ 1650.261807] sendmsg_copy_msghdr+0xa1/0x160 [ 1650.262197] ? do_recvmmsg+0x6d0/0x6d0 [ 1650.262511] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1650.262944] ? lock_downgrade+0x6d0/0x6d0 [ 1650.263288] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1650.263715] ___sys_sendmsg+0xc6/0x170 [ 1650.264041] ? sendmsg_copy_msghdr+0x160/0x160 [ 1650.264425] ? __fget_files+0x26d/0x4c0 [ 1650.264749] ? lock_downgrade+0x6d0/0x6d0 [ 1650.265119] ? find_held_lock+0x2c/0x110 [ 1650.265450] ? __fget_files+0x296/0x4c0 [ 1650.265805] ? __fget_light+0xea/0x290 [ 1650.266154] __sys_sendmsg+0xe5/0x1b0 [ 1650.266463] ? __sys_sendmsg_sock+0x40/0x40 [ 1650.266813] ? rcu_read_lock_any_held+0x75/0xa0 [ 1650.267199] ? fput_many+0x2f/0x1a0 [ 1650.267497] ? ksys_write+0x1a9/0x260 [ 1650.267811] ? __ia32_sys_read+0xb0/0xb0 [ 1650.268146] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1650.268586] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1650.269010] ? trace_hardirqs_on+0x5b/0x180 [ 1650.269364] do_syscall_64+0x33/0x40 [ 1650.269661] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1650.270090] RIP: 0033:0x7f482b2f9b19 [ 1650.270383] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1650.271886] RSP: 002b:00007f482886f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1650.272549] RAX: ffffffffffffffda RBX: 00007f482b40cf60 RCX: 00007f482b2f9b19 [ 1650.273123] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1650.273689] RBP: 00007f482886f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1650.274268] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1650.274833] R13: 00007ffef22a59af R14: 00007f482886f300 R15: 0000000000022000 03:59:38 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1053) [ 1650.293833] FAULT_INJECTION: forcing a failure. [ 1650.293833] name failslab, interval 1, probability 0, space 0, times 0 [ 1650.295579] CPU: 0 PID: 9748 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1650.296526] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1650.297598] Call Trace: [ 1650.297955] dump_stack+0x107/0x167 [ 1650.298435] should_fail.cold+0x5/0xa [ 1650.298939] ? create_object.isra.0+0x3a/0xa20 [ 1650.299536] should_failslab+0x5/0x20 [ 1650.300035] kmem_cache_alloc+0x5b/0x310 [ 1650.300615] ? ext4_dirty_inode+0x107/0x130 [ 1650.301186] create_object.isra.0+0x3a/0xa20 [ 1650.301800] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1650.302469] kmem_cache_alloc+0x159/0x310 [ 1650.303049] jbd2__journal_start+0x190/0x7e0 [ 1650.303633] __ext4_journal_start_sb+0x214/0x390 [ 1650.304318] ext4_file_write_iter+0xdbf/0x18d0 [ 1650.304929] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1650.305579] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1650.306270] new_sync_write+0x42c/0x660 [ 1650.306832] ? new_sync_read+0x6f0/0x6f0 [ 1650.307368] ? ksys_write+0x12d/0x260 03:59:38 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x68000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1650.307908] ? lock_release+0x680/0x680 [ 1650.308559] ? selinux_file_permission+0x92/0x520 [ 1650.309242] ? __fget_files+0x296/0x4c0 [ 1650.309815] vfs_write+0x747/0xa70 [ 1650.310317] ksys_write+0x12d/0x260 [ 1650.310822] ? __ia32_sys_read+0xb0/0xb0 [ 1650.311393] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1650.312130] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1650.312861] do_syscall_64+0x33/0x40 [ 1650.313411] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1650.314143] RIP: 0033:0x7f21b1e90b19 [ 1650.314667] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1650.317235] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1650.318309] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1650.319297] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1650.320299] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1650.321281] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1650.322274] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 03:59:38 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb74) 03:59:38 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020827000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:59:53 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1054) 03:59:53 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 10) 03:59:53 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 15) 03:59:53 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 2) 03:59:53 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb7a) 03:59:53 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:59:53 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x6c000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:59:53 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020800050470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1665.912147] FAULT_INJECTION: forcing a failure. [ 1665.912147] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1665.914845] CPU: 0 PID: 9786 Comm: syz-executor.3 Not tainted 5.10.213 #1 [ 1665.916098] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1665.917595] Call Trace: [ 1665.918090] dump_stack+0x107/0x167 [ 1665.918752] should_fail.cold+0x5/0xa [ 1665.919463] _copy_from_user+0x2e/0x1b0 [ 1665.920196] iovec_from_user+0x141/0x400 [ 1665.920949] __import_iovec+0x67/0x590 [ 1665.921632] ? __ia32_sys_shutdown+0x80/0x80 [ 1665.922421] ? perf_trace_lock+0xac/0x490 [ 1665.923163] import_iovec+0x83/0xb0 [ 1665.923681] FAULT_INJECTION: forcing a failure. [ 1665.923681] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1665.923834] sendmsg_copy_msghdr+0x131/0x160 [ 1665.925724] ? do_recvmmsg+0x6d0/0x6d0 [ 1665.926371] ? perf_trace_lock+0xac/0x490 [ 1665.927031] ? __lockdep_reset_lock+0x180/0x180 [ 1665.927785] ? perf_trace_lock+0xac/0x490 [ 1665.928465] ___sys_sendmsg+0xc6/0x170 [ 1665.929118] ? sendmsg_copy_msghdr+0x160/0x160 [ 1665.929837] ? __fget_files+0x26d/0x4c0 [ 1665.930496] ? lock_downgrade+0x6d0/0x6d0 [ 1665.931165] ? find_held_lock+0x2c/0x110 [ 1665.931830] ? __fget_files+0x296/0x4c0 [ 1665.932492] ? __fget_light+0xea/0x290 [ 1665.933148] __sys_sendmsg+0xe5/0x1b0 [ 1665.933743] ? __sys_sendmsg_sock+0x40/0x40 [ 1665.934455] ? rcu_read_lock_any_held+0x75/0xa0 [ 1665.935196] ? fput_many+0x2f/0x1a0 [ 1665.935785] ? ksys_write+0x1a9/0x260 [ 1665.936416] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1665.937277] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1665.938090] ? trace_hardirqs_on+0x5b/0x180 [ 1665.938792] do_syscall_64+0x33/0x40 [ 1665.939389] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1665.940231] RIP: 0033:0x7f482b2f9b19 [ 1665.940816] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1665.943797] RSP: 002b:00007f482886f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1665.945016] RAX: ffffffffffffffda RBX: 00007f482b40cf60 RCX: 00007f482b2f9b19 [ 1665.946148] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1665.947261] RBP: 00007f482886f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1665.948386] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1665.949497] R13: 00007ffef22a59af R14: 00007f482886f300 R15: 0000000000022000 [ 1665.950629] CPU: 1 PID: 9772 Comm: syz-executor.6 Not tainted 5.10.213 #1 [ 1665.951392] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1665.952257] Call Trace: [ 1665.952541] dump_stack+0x107/0x167 [ 1665.952907] should_fail.cold+0x5/0xa [ 1665.953294] __alloc_pages_nodemask+0x182/0x600 [ 1665.953756] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 1665.954353] ? __is_insn_slot_addr+0x14c/0x290 [ 1665.954810] ? lock_chain_count+0x20/0x20 [ 1665.955225] ? __kernel_text_address+0x9/0x40 [ 1665.955665] ? __lockdep_reset_lock+0x180/0x180 [ 1665.956127] alloc_pages_current+0x187/0x280 [ 1665.956573] kmalloc_order+0x35/0x160 [ 1665.956956] kmalloc_order_trace+0x14/0xa0 [ 1665.957379] wiphy_new_nm+0x6f3/0x1e00 [ 1665.957770] ieee80211_alloc_hw_nm+0x37a/0x2320 [ 1665.958229] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1665.958745] ? __local_bh_enable_ip+0x9d/0x100 [ 1665.959193] ? trace_hardirqs_on+0x5b/0x180 [ 1665.959619] mac80211_hwsim_new_radio+0x1cd/0x4250 [ 1665.960103] ? ____sys_sendmsg+0x70d/0x870 [ 1665.960525] ? ___sys_sendmsg+0xf3/0x170 [ 1665.960926] ? __sys_sendmsg+0xe5/0x1b0 [ 1665.961324] ? do_syscall_64+0x33/0x40 [ 1665.961705] ? entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1665.962223] ? __lockdep_reset_lock+0x180/0x180 [ 1665.962675] ? lock_acquire+0x197/0x470 [ 1665.963071] ? create_object.isra.0+0x3ad/0xa20 [ 1665.963532] ? hwsim_send_nullfunc_ps+0x80/0x80 [ 1665.963994] ? __kmalloc+0x16e/0x390 [ 1665.964366] hwsim_new_radio_nl+0x991/0x1080 [ 1665.964807] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1665.965328] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 1665.965970] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 1665.966606] genl_family_rcv_msg_doit+0x22d/0x330 [ 1665.967082] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1665.967732] ? cap_capable+0x1cd/0x230 [ 1665.968138] ? ns_capable+0xe2/0x110 [ 1665.968515] genl_rcv_msg+0x33c/0x5a0 [ 1665.968891] ? genl_get_cmd+0x480/0x480 [ 1665.969284] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1665.969792] ? lock_release+0x680/0x680 [ 1665.970189] ? __lockdep_reset_lock+0x180/0x180 [ 1665.970646] netlink_rcv_skb+0x14b/0x430 [ 1665.971047] ? genl_get_cmd+0x480/0x480 [ 1665.971432] ? netlink_ack+0xab0/0xab0 [ 1665.971843] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1665.972299] ? is_vmalloc_addr+0x7b/0xb0 [ 1665.972713] genl_rcv+0x24/0x40 [ 1665.973043] netlink_unicast+0x549/0x7f0 [ 1665.973448] ? netlink_attachskb+0x870/0x870 [ 1665.973885] netlink_sendmsg+0x90f/0xdf0 [ 1665.974294] ? netlink_unicast+0x7f0/0x7f0 [ 1665.974712] ? netlink_unicast+0x7f0/0x7f0 [ 1665.975137] __sock_sendmsg+0x154/0x190 [ 1665.975521] ____sys_sendmsg+0x70d/0x870 [ 1665.975925] ? sock_write_iter+0x3d0/0x3d0 [ 1665.976344] ? do_recvmmsg+0x6d0/0x6d0 [ 1665.976739] ? perf_trace_lock+0xac/0x490 [ 1665.977150] ? __lockdep_reset_lock+0x180/0x180 [ 1665.977607] ? perf_trace_lock+0xac/0x490 [ 1665.978021] ___sys_sendmsg+0xf3/0x170 [ 1665.978409] ? sendmsg_copy_msghdr+0x160/0x160 [ 1665.978862] ? lock_downgrade+0x6d0/0x6d0 [ 1665.979277] ? find_held_lock+0x2c/0x110 [ 1665.979688] ? __fget_files+0x296/0x4c0 [ 1665.980091] ? __fget_light+0xea/0x290 [ 1665.980487] __sys_sendmsg+0xe5/0x1b0 [ 1665.980866] ? __sys_sendmsg_sock+0x40/0x40 [ 1665.981284] ? rcu_read_lock_any_held+0x75/0xa0 [ 1665.981756] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1665.982272] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1665.982775] ? trace_hardirqs_on+0x5b/0x180 [ 1665.983199] do_syscall_64+0x33/0x40 [ 1665.983566] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1665.984064] RIP: 0033:0x7fa4f0967b19 [ 1665.984440] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1665.986189] RSP: 002b:00007fa4ededd188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1665.986938] RAX: ffffffffffffffda RBX: 00007fa4f0a7af60 RCX: 00007fa4f0967b19 [ 1665.987614] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1665.988307] RBP: 00007fa4ededd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1665.989000] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1665.989697] R13: 00007ffd65f736ff R14: 00007fa4ededd300 R15: 0000000000022000 03:59:53 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 3) [ 1666.013874] FAULT_INJECTION: forcing a failure. [ 1666.013874] name failslab, interval 1, probability 0, space 0, times 0 [ 1666.015104] CPU: 1 PID: 9774 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1666.015798] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1666.016631] Call Trace: [ 1666.016913] dump_stack+0x107/0x167 [ 1666.017280] should_fail.cold+0x5/0xa [ 1666.017689] ? __iomap_dio_rw+0x1ee/0x1110 [ 1666.018117] should_failslab+0x5/0x20 [ 1666.018515] kmem_cache_alloc_trace+0x55/0x320 [ 1666.018982] __iomap_dio_rw+0x1ee/0x1110 [ 1666.019415] ? jbd2_journal_stop+0x188/0xdc0 [ 1666.019853] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1666.020335] ? ext4_orphan_add+0x253/0x9e0 [ 1666.020770] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 1666.021285] ? ext4_empty_dir+0xae0/0xae0 [ 1666.021694] ? jbd2__journal_start+0xf3/0x7e0 [ 1666.022168] iomap_dio_rw+0x31/0x90 [ 1666.022539] ext4_file_write_iter+0xb26/0x18d0 [ 1666.023025] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1666.023482] ? __lockdep_reset_lock+0x180/0x180 [ 1666.023967] ? __lockdep_reset_lock+0x180/0x180 [ 1666.024443] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1666.025002] new_sync_write+0x42c/0x660 [ 1666.025399] ? new_sync_read+0x6f0/0x6f0 [ 1666.025830] ? ksys_write+0x12d/0x260 [ 1666.026219] ? lock_release+0x680/0x680 [ 1666.026628] ? selinux_file_permission+0x92/0x520 [ 1666.027120] ? __fget_files+0x296/0x4c0 [ 1666.027540] vfs_write+0x747/0xa70 [ 1666.027900] ksys_write+0x12d/0x260 [ 1666.028275] ? __ia32_sys_read+0xb0/0xb0 [ 1666.028689] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1666.029231] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1666.029750] do_syscall_64+0x33/0x40 [ 1666.030134] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1666.030644] RIP: 0033:0x7f21b1e90b19 [ 1666.031033] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1666.032842] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1666.033631] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1666.034333] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1666.035056] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1666.035752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1666.036481] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 03:59:54 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0x6300) 03:59:54 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x74000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 03:59:54 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0x20000e40) [ 1666.166770] FAULT_INJECTION: forcing a failure. [ 1666.166770] name failslab, interval 1, probability 0, space 0, times 0 [ 1666.168215] CPU: 1 PID: 9797 Comm: syz-executor.3 Not tainted 5.10.213 #1 [ 1666.168881] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1666.169730] Call Trace: [ 1666.170001] dump_stack+0x107/0x167 [ 1666.170399] should_fail.cold+0x5/0xa [ 1666.170774] ? __alloc_skb+0x6d/0x5b0 [ 1666.171171] should_failslab+0x5/0x20 [ 1666.171543] kmem_cache_alloc_node+0x55/0x330 [ 1666.172010] __alloc_skb+0x6d/0x5b0 [ 1666.172366] netlink_sendmsg+0x998/0xdf0 [ 1666.172808] ? netlink_unicast+0x7f0/0x7f0 [ 1666.173224] ? netlink_unicast+0x7f0/0x7f0 [ 1666.173663] __sock_sendmsg+0x154/0x190 [ 1666.174055] ____sys_sendmsg+0x70d/0x870 [ 1666.174471] ? sock_write_iter+0x3d0/0x3d0 [ 1666.174877] ? do_recvmmsg+0x6d0/0x6d0 [ 1666.175289] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1666.175800] ? lock_downgrade+0x6d0/0x6d0 [ 1666.176237] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1666.176767] ___sys_sendmsg+0xf3/0x170 [ 1666.177189] ? sendmsg_copy_msghdr+0x160/0x160 [ 1666.177647] ? lock_downgrade+0x6d0/0x6d0 [ 1666.178094] ? find_held_lock+0x2c/0x110 [ 1666.178506] ? __fget_files+0x296/0x4c0 [ 1666.178933] ? __fget_light+0xea/0x290 [ 1666.179327] __sys_sendmsg+0xe5/0x1b0 [ 1666.179742] ? __sys_sendmsg_sock+0x40/0x40 [ 1666.180174] ? rcu_read_lock_any_held+0x75/0xa0 [ 1666.180665] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1666.181185] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1666.181727] ? trace_hardirqs_on+0x5b/0x180 [ 1666.182170] do_syscall_64+0x33/0x40 [ 1666.182561] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1666.183057] RIP: 0033:0x7f482b2f9b19 [ 1666.183439] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1666.185202] RSP: 002b:00007f482886f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1666.185984] RAX: ffffffffffffffda RBX: 00007f482b40cf60 RCX: 00007f482b2f9b19 [ 1666.186664] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1666.187388] RBP: 00007f482886f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1666.188114] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1666.188844] R13: 00007ffef22a59af R14: 00007f482886f300 R15: 0000000000022000 03:59:54 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 11) 03:59:54 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 16) [ 1666.222649] FAULT_INJECTION: forcing a failure. [ 1666.222649] name failslab, interval 1, probability 0, space 0, times 0 [ 1666.223619] CPU: 1 PID: 9802 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1666.224170] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1666.224865] Call Trace: [ 1666.225101] dump_stack+0x107/0x167 [ 1666.225417] should_fail.cold+0x5/0xa [ 1666.225741] ? create_object.isra.0+0x3a/0xa20 [ 1666.226128] should_failslab+0x5/0x20 [ 1666.226448] kmem_cache_alloc+0x5b/0x310 [ 1666.226793] create_object.isra.0+0x3a/0xa20 [ 1666.227157] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1666.227570] kmem_cache_alloc_trace+0x151/0x320 [ 1666.227962] __iomap_dio_rw+0x1ee/0x1110 [ 1666.228300] ? jbd2_journal_stop+0x188/0xdc0 [ 1666.228658] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1666.229041] ? ext4_orphan_add+0x253/0x9e0 [ 1666.229373] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 1666.229770] ? ext4_empty_dir+0xae0/0xae0 [ 1666.230094] ? jbd2__journal_start+0xf3/0x7e0 [ 1666.230473] iomap_dio_rw+0x31/0x90 [ 1666.230764] ext4_file_write_iter+0xb26/0x18d0 [ 1666.231160] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1666.231526] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1666.231959] new_sync_write+0x42c/0x660 [ 1666.232275] ? new_sync_read+0x6f0/0x6f0 [ 1666.232620] ? ksys_write+0x12d/0x260 [ 1666.232928] ? lock_release+0x680/0x680 [ 1666.233251] ? selinux_file_permission+0x92/0x520 [ 1666.233631] ? __fget_files+0x296/0x4c0 [ 1666.233960] vfs_write+0x747/0xa70 [ 1666.234248] ksys_write+0x12d/0x260 [ 1666.234541] ? __ia32_sys_read+0xb0/0xb0 [ 1666.234862] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1666.235297] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1666.235709] do_syscall_64+0x33/0x40 [ 1666.236018] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1666.236426] RIP: 0033:0x7f21b1e90b19 [ 1666.236737] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1666.238177] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1666.238797] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1666.239358] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1666.239944] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1666.240506] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1666.241083] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 [ 1666.290374] FAULT_INJECTION: forcing a failure. [ 1666.290374] name failslab, interval 1, probability 0, space 0, times 0 [ 1666.291618] CPU: 1 PID: 9807 Comm: syz-executor.6 Not tainted 5.10.213 #1 [ 1666.292145] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1666.292820] Call Trace: [ 1666.293034] dump_stack+0x107/0x167 [ 1666.293323] should_fail.cold+0x5/0xa [ 1666.293613] ? create_object.isra.0+0x3a/0xa20 [ 1666.293973] should_failslab+0x5/0x20 [ 1666.294271] kmem_cache_alloc+0x5b/0x310 [ 1666.294583] create_object.isra.0+0x3a/0xa20 [ 1666.294926] ? kasan_unpoison_shadow+0x33/0x50 [ 1666.295275] kmalloc_order+0xfe/0x160 [ 1666.295577] kmalloc_order_trace+0x14/0xa0 [ 1666.295909] wiphy_new_nm+0x6f3/0x1e00 [ 1666.296218] ieee80211_alloc_hw_nm+0x37a/0x2320 [ 1666.296609] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1666.297023] ? __local_bh_enable_ip+0x9d/0x100 [ 1666.297388] ? trace_hardirqs_on+0x5b/0x180 [ 1666.297717] mac80211_hwsim_new_radio+0x1cd/0x4250 [ 1666.298098] ? ____sys_sendmsg+0x70d/0x870 [ 1666.298418] ? ___sys_sendmsg+0xf3/0x170 [ 1666.298734] ? __sys_sendmsg+0xe5/0x1b0 [ 1666.299040] ? do_syscall_64+0x33/0x40 [ 1666.299344] ? entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1666.299747] ? lock_acquire+0x197/0x470 [ 1666.300073] ? create_object.isra.0+0x3ad/0xa20 [ 1666.300455] ? hwsim_send_nullfunc_ps+0x80/0x80 [ 1666.300845] ? __kmalloc+0x16e/0x390 [ 1666.301150] hwsim_new_radio_nl+0x991/0x1080 [ 1666.301515] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1666.301948] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 1666.302474] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 1666.302966] genl_family_rcv_msg_doit+0x22d/0x330 [ 1666.303345] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1666.303952] ? cap_capable+0x1cd/0x230 [ 1666.304332] ? ns_capable+0xe2/0x110 [ 1666.304625] genl_rcv_msg+0x33c/0x5a0 [ 1666.304925] ? genl_get_cmd+0x480/0x480 [ 1666.305225] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1666.305629] ? lock_release+0x680/0x680 [ 1666.305934] ? netlink_deliver_tap+0xf4/0xcc0 [ 1666.306306] netlink_rcv_skb+0x14b/0x430 [ 1666.306614] ? genl_get_cmd+0x480/0x480 [ 1666.306924] ? netlink_ack+0xab0/0xab0 [ 1666.307224] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1666.307581] ? is_vmalloc_addr+0x7b/0xb0 [ 1666.307889] genl_rcv+0x24/0x40 [ 1666.308150] netlink_unicast+0x549/0x7f0 [ 1666.308465] ? netlink_attachskb+0x870/0x870 [ 1666.308816] netlink_sendmsg+0x90f/0xdf0 [ 1666.309129] ? netlink_unicast+0x7f0/0x7f0 [ 1666.309467] ? netlink_unicast+0x7f0/0x7f0 [ 1666.309787] __sock_sendmsg+0x154/0x190 [ 1666.310098] ____sys_sendmsg+0x70d/0x870 [ 1666.310408] ? sock_write_iter+0x3d0/0x3d0 [ 1666.310737] ? do_recvmmsg+0x6d0/0x6d0 [ 1666.311035] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1666.311441] ? lock_downgrade+0x6d0/0x6d0 [ 1666.311757] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1666.312171] ___sys_sendmsg+0xf3/0x170 [ 1666.312476] ? sendmsg_copy_msghdr+0x160/0x160 [ 1666.312835] ? lock_downgrade+0x6d0/0x6d0 [ 1666.313152] ? find_held_lock+0x2c/0x110 [ 1666.313473] ? __fget_files+0x296/0x4c0 [ 1666.313781] ? __fget_light+0xea/0x290 [ 1666.314097] __sys_sendmsg+0xe5/0x1b0 [ 1666.314387] ? __sys_sendmsg_sock+0x40/0x40 [ 1666.314723] ? rcu_read_lock_any_held+0x75/0xa0 [ 1666.315093] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1666.315499] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1666.315887] ? trace_hardirqs_on+0x5b/0x180 [ 1666.316227] do_syscall_64+0x33/0x40 [ 1666.316516] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1666.316914] RIP: 0033:0x7fa4f0967b19 [ 1666.317199] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1666.318615] RSP: 002b:00007fa4ededd188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1666.319187] RAX: ffffffffffffffda RBX: 00007fa4f0a7af60 RCX: 00007fa4f0967b19 [ 1666.319738] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1666.320289] RBP: 00007fa4ededd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1666.320841] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1666.321389] R13: 00007ffd65f736ff R14: 00007fa4ededd300 R15: 0000000000022000 04:00:12 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 12) 04:00:12 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1055) 04:00:12 executing program 5: syslog(0x0, &(0x7f0000001200)=""/4123, 0x1020) syslog(0x2, &(0x7f0000000100)=""/22, 0x16) syslog(0x1, &(0x7f00000000c0)=""/21, 0x15) syslog(0xa, &(0x7f0000000140)=""/87, 0x57) syslog(0x3, &(0x7f0000000000)=""/142, 0x8e) syslog(0x1, 0x0, 0x0) syslog(0xc, 0x0, 0x0) 04:00:12 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801020470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:00:12 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x4000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:00:12 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 4) 04:00:12 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x78000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:00:12 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 17) [ 1684.637837] FAULT_INJECTION: forcing a failure. [ 1684.637837] name failslab, interval 1, probability 0, space 0, times 0 [ 1684.640214] CPU: 1 PID: 9819 Comm: syz-executor.6 Not tainted 5.10.213 #1 [ 1684.641077] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1684.642061] Call Trace: [ 1684.642392] dump_stack+0x107/0x167 [ 1684.642842] should_fail.cold+0x5/0xa [ 1684.643316] should_failslab+0x5/0x20 [ 1684.643795] __kmalloc_track_caller+0x79/0x370 [ 1684.644379] ? kvasprintf_const+0x60/0x1a0 [ 1684.644941] kvasprintf+0xb5/0x150 [ 1684.645380] ? bust_spinlocks+0xe0/0xe0 [ 1684.645867] ? lock_release+0x680/0x680 [ 1684.646498] ? find_held_lock+0x2c/0x110 [ 1684.647004] kvasprintf_const+0x60/0x1a0 [ 1684.647648] kobject_set_name_vargs+0x56/0x150 [ 1684.648232] dev_set_name+0xbb/0xf0 [ 1684.648686] ? device_initialize+0x620/0x620 [ 1684.649212] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1684.649852] ? kmalloc_order+0xfe/0x160 [ 1684.650346] wiphy_new_nm+0x805/0x1e00 [ 1684.650823] ieee80211_alloc_hw_nm+0x37a/0x2320 [ 1684.651392] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1684.652028] ? __local_bh_enable_ip+0x9d/0x100 [ 1684.652557] ? trace_hardirqs_on+0x5b/0x180 [ 1684.653074] mac80211_hwsim_new_radio+0x1cd/0x4250 [ 1684.653637] ? ____sys_sendmsg+0x70d/0x870 [ 1684.654126] ? ___sys_sendmsg+0xf3/0x170 [ 1684.654593] ? __sys_sendmsg+0xe5/0x1b0 [ 1684.655056] ? do_syscall_64+0x33/0x40 [ 1684.655505] ? entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1684.656117] ? __lockdep_reset_lock+0x180/0x180 [ 1684.656664] ? lock_acquire+0x197/0x470 [ 1684.657129] ? create_object.isra.0+0x3ad/0xa20 [ 1684.657668] ? hwsim_send_nullfunc_ps+0x80/0x80 [ 1684.658210] ? __kmalloc+0x16e/0x390 [ 1684.658648] hwsim_new_radio_nl+0x991/0x1080 [ 1684.659162] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1684.659769] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 1684.660519] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 1684.661284] genl_family_rcv_msg_doit+0x22d/0x330 [ 1684.661839] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1684.662581] ? cap_capable+0x1cd/0x230 [ 1684.663049] ? ns_capable+0xe2/0x110 [ 1684.663486] genl_rcv_msg+0x33c/0x5a0 [ 1684.663932] ? genl_get_cmd+0x480/0x480 [ 1684.664389] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1684.664995] ? lock_release+0x680/0x680 [ 1684.665453] ? __lockdep_reset_lock+0x180/0x180 [ 1684.665990] netlink_rcv_skb+0x14b/0x430 [ 1684.666481] ? genl_get_cmd+0x480/0x480 [ 1684.666952] ? netlink_ack+0xab0/0xab0 [ 1684.667433] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1684.667957] ? is_vmalloc_addr+0x7b/0xb0 [ 1684.668589] genl_rcv+0x24/0x40 [ 1684.669039] netlink_unicast+0x549/0x7f0 [ 1684.669547] ? netlink_attachskb+0x870/0x870 [ 1684.670103] netlink_sendmsg+0x90f/0xdf0 [ 1684.670751] ? netlink_unicast+0x7f0/0x7f0 [ 1684.671279] ? netlink_unicast+0x7f0/0x7f0 [ 1684.671431] FAULT_INJECTION: forcing a failure. [ 1684.671431] name failslab, interval 1, probability 0, space 0, times 0 [ 1684.671805] __sock_sendmsg+0x154/0x190 [ 1684.671822] ____sys_sendmsg+0x70d/0x870 [ 1684.671847] ? sock_write_iter+0x3d0/0x3d0 [ 1684.675083] ? do_recvmmsg+0x6d0/0x6d0 [ 1684.675538] ? perf_trace_lock+0xac/0x490 [ 1684.676052] ? __lockdep_reset_lock+0x180/0x180 [ 1684.676624] ? perf_trace_lock+0xac/0x490 [ 1684.677148] ___sys_sendmsg+0xf3/0x170 [ 1684.677617] ? sendmsg_copy_msghdr+0x160/0x160 [ 1684.678191] ? lock_downgrade+0x6d0/0x6d0 [ 1684.678690] ? find_held_lock+0x2c/0x110 [ 1684.679208] ? __fget_files+0x296/0x4c0 [ 1684.679692] ? __fget_light+0xea/0x290 [ 1684.680189] __sys_sendmsg+0xe5/0x1b0 [ 1684.680656] ? __sys_sendmsg_sock+0x40/0x40 [ 1684.681192] ? rcu_read_lock_any_held+0x75/0xa0 [ 1684.681764] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1684.682421] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1684.683043] ? trace_hardirqs_on+0x5b/0x180 [ 1684.683571] do_syscall_64+0x33/0x40 [ 1684.684022] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1684.684644] RIP: 0033:0x7fa4f0967b19 [ 1684.685100] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1684.687297] RSP: 002b:00007fa4ededd188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1684.688229] RAX: ffffffffffffffda RBX: 00007fa4f0a7af60 RCX: 00007fa4f0967b19 [ 1684.689088] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1684.689936] RBP: 00007fa4ededd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1684.690792] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1684.691671] R13: 00007ffd65f736ff R14: 00007fa4ededd300 R15: 0000000000022000 [ 1684.692575] CPU: 0 PID: 9829 Comm: syz-executor.3 Not tainted 5.10.213 #1 [ 1684.693794] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1684.695221] Call Trace: [ 1684.695665] dump_stack+0x107/0x167 [ 1684.696314] should_fail.cold+0x5/0xa [ 1684.696987] ? create_object.isra.0+0x3a/0xa20 [ 1684.697741] should_failslab+0x5/0x20 [ 1684.698387] kmem_cache_alloc+0x5b/0x310 [ 1684.699083] create_object.isra.0+0x3a/0xa20 [ 1684.699812] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1684.700708] kmem_cache_alloc_node+0x169/0x330 [ 1684.701495] __alloc_skb+0x6d/0x5b0 [ 1684.702118] netlink_sendmsg+0x998/0xdf0 [ 1684.702803] ? netlink_unicast+0x7f0/0x7f0 [ 1684.703546] ? netlink_unicast+0x7f0/0x7f0 [ 1684.704248] __sock_sendmsg+0x154/0x190 [ 1684.704947] ____sys_sendmsg+0x70d/0x870 [ 1684.705645] ? sock_write_iter+0x3d0/0x3d0 [ 1684.706370] ? do_recvmmsg+0x6d0/0x6d0 [ 1684.707026] ? perf_trace_lock+0xac/0x490 [ 1684.707701] ? __lockdep_reset_lock+0x180/0x180 [ 1684.708495] ? perf_trace_lock+0xac/0x490 [ 1684.709220] ___sys_sendmsg+0xf3/0x170 [ 1684.709855] ? sendmsg_copy_msghdr+0x160/0x160 [ 1684.710638] ? lock_downgrade+0x6d0/0x6d0 [ 1684.711331] ? find_held_lock+0x2c/0x110 [ 1684.712028] ? __fget_files+0x296/0x4c0 [ 1684.712702] ? __fget_light+0xea/0x290 [ 1684.713361] __sys_sendmsg+0xe5/0x1b0 [ 1684.713997] ? __sys_sendmsg_sock+0x40/0x40 [ 1684.714695] ? rcu_read_lock_any_held+0x75/0xa0 [ 1684.715484] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1684.716345] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1684.717219] ? trace_hardirqs_on+0x5b/0x180 [ 1684.717938] do_syscall_64+0x33/0x40 [ 1684.718540] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1684.719373] RIP: 0033:0x7f482b2f9b19 [ 1684.719993] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1684.723201] RSP: 002b:00007f482886f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1684.724711] RAX: ffffffffffffffda RBX: 00007f482b40cf60 RCX: 00007f482b2f9b19 [ 1684.725914] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1684.727129] RBP: 00007f482886f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1684.728283] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1684.729457] R13: 00007ffef22a59af R14: 00007f482886f300 R15: 0000000000022000 [ 1684.771003] FAULT_INJECTION: forcing a failure. [ 1684.771003] name failslab, interval 1, probability 0, space 0, times 0 [ 1684.772437] CPU: 1 PID: 9831 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1684.773176] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1684.774005] Call Trace: [ 1684.774292] dump_stack+0x107/0x167 [ 1684.774664] should_fail.cold+0x5/0xa [ 1684.775056] ? jbd2__journal_start+0x190/0x7e0 [ 1684.775537] should_failslab+0x5/0x20 [ 1684.775920] kmem_cache_alloc+0x5b/0x310 [ 1684.776350] ? __kernel_text_address+0x9/0x40 [ 1684.776794] jbd2__journal_start+0x190/0x7e0 [ 1684.777248] __ext4_journal_start_sb+0x214/0x390 [ 1684.777892] ext4_iomap_begin+0x485/0x700 [ 1684.778356] ? ext4_iomap_begin_report+0x5a0/0x5a0 [ 1684.778963] ? kasan_save_stack+0x1b/0x40 [ 1684.779403] ? ext4_file_write_iter+0xb26/0x18d0 [ 1684.780004] ? truncate_exceptional_pvec_entries.part.0+0x510/0x510 [ 1684.780705] ? lock_chain_count+0x20/0x20 [ 1684.781237] ? osq_unlock+0x1a0/0x1a0 [ 1684.781683] iomap_apply+0x164/0x810 [ 1684.782174] ? iomap_dio_rw+0x90/0x90 [ 1684.782604] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 1684.783377] ? mark_held_locks+0x9e/0xe0 [ 1684.783818] ? filemap_check_errors+0xa5/0x150 [ 1684.784412] __iomap_dio_rw+0x6cd/0x1110 [ 1684.784828] ? iomap_dio_rw+0x90/0x90 [ 1684.785237] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1684.785705] ? ext4_orphan_add+0x253/0x9e0 [ 1684.786142] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 1684.786653] ? ext4_empty_dir+0xae0/0xae0 [ 1684.787071] ? jbd2__journal_start+0xf3/0x7e0 [ 1684.787549] iomap_dio_rw+0x31/0x90 [ 1684.787920] ext4_file_write_iter+0xb26/0x18d0 [ 1684.788412] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1684.788896] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1684.789439] new_sync_write+0x42c/0x660 [ 1684.789842] ? new_sync_read+0x6f0/0x6f0 [ 1684.790251] ? ksys_write+0x12d/0x260 [ 1684.790639] ? lock_release+0x680/0x680 [ 1684.791046] ? selinux_file_permission+0x92/0x520 [ 1684.791551] ? __fget_files+0x296/0x4c0 [ 1684.791964] vfs_write+0x747/0xa70 [ 1684.792345] ksys_write+0x12d/0x260 [ 1684.792825] ? __ia32_sys_read+0xb0/0xb0 [ 1684.793256] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1684.793771] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1684.794429] do_syscall_64+0x33/0x40 [ 1684.794826] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1684.795497] RIP: 0033:0x7f21b1e90b19 [ 1684.795862] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1684.797681] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1684.797726] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1684.797733] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1684.797740] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1684.797747] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1684.797773] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 04:00:27 executing program 5: syslog(0x3, &(0x7f0000000000)=""/21, 0x15) syslog(0x1, &(0x7f0000000040)=""/136, 0x88) 04:00:27 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 5) 04:00:27 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x7a000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:00:27 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x8000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:00:27 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 13) 04:00:27 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 18) 04:00:27 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801030470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:00:27 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1056) [ 1699.987070] FAULT_INJECTION: forcing a failure. [ 1699.987070] name failslab, interval 1, probability 0, space 0, times 0 [ 1699.989198] CPU: 0 PID: 9850 Comm: syz-executor.6 Not tainted 5.10.213 #1 [ 1699.990243] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1699.991540] Call Trace: [ 1699.991964] dump_stack+0x107/0x167 [ 1699.992540] should_fail.cold+0x5/0xa [ 1699.993160] ? create_object.isra.0+0x3a/0xa20 [ 1699.993881] ? create_object.isra.0+0x3a/0xa20 [ 1699.994589] should_failslab+0x5/0x20 [ 1699.995200] kmem_cache_alloc+0x5b/0x310 [ 1699.995811] ? vsnprintf+0x4ba/0x1600 [ 1699.996433] create_object.isra.0+0x3a/0xa20 [ 1699.997134] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1699.997947] __kmalloc_track_caller+0x177/0x370 [ 1699.998653] ? kvasprintf_const+0x60/0x1a0 [ 1699.999340] kvasprintf+0xb5/0x150 [ 1699.999882] ? bust_spinlocks+0xe0/0xe0 [ 1700.000518] ? lock_release+0x680/0x680 [ 1700.001135] ? find_held_lock+0x2c/0x110 [ 1700.001785] kvasprintf_const+0x60/0x1a0 [ 1700.002423] kobject_set_name_vargs+0x56/0x150 [ 1700.003165] dev_set_name+0xbb/0xf0 [ 1700.003711] ? device_initialize+0x620/0x620 [ 1700.004380] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1700.005233] ? kmalloc_order+0xfe/0x160 [ 1700.005840] wiphy_new_nm+0x805/0x1e00 [ 1700.006489] ieee80211_alloc_hw_nm+0x37a/0x2320 [ 1700.007197] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1700.008027] ? __local_bh_enable_ip+0x9d/0x100 [ 1700.008705] ? trace_hardirqs_on+0x5b/0x180 [ 1700.009413] mac80211_hwsim_new_radio+0x1cd/0x4250 [ 1700.010156] ? ____sys_sendmsg+0x70d/0x870 [ 1700.010809] ? ___sys_sendmsg+0xf3/0x170 [ 1700.011437] ? __sys_sendmsg+0xe5/0x1b0 [ 1700.012083] ? do_syscall_64+0x33/0x40 [ 1700.012662] ? entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1700.013518] ? lock_acquire+0x197/0x470 [ 1700.014125] ? create_object.isra.0+0x3ad/0xa20 [ 1700.014858] ? hwsim_send_nullfunc_ps+0x80/0x80 [ 1700.015570] ? __kmalloc+0x16e/0x390 [ 1700.016191] hwsim_new_radio_nl+0x991/0x1080 [ 1700.016870] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1700.017724] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 1700.018733] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 1700.019759] genl_family_rcv_msg_doit+0x22d/0x330 [ 1700.020501] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1700.021555] ? cap_capable+0x1cd/0x230 [ 1700.022181] ? ns_capable+0xe2/0x110 [ 1700.022766] genl_rcv_msg+0x33c/0x5a0 [ 1700.023357] ? genl_get_cmd+0x480/0x480 [ 1700.023997] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1700.024772] ? lock_release+0x680/0x680 [ 1700.025423] ? netlink_deliver_tap+0xf4/0xcc0 [ 1700.026152] netlink_rcv_skb+0x14b/0x430 [ 1700.026781] ? genl_get_cmd+0x480/0x480 [ 1700.027388] ? netlink_ack+0xab0/0xab0 [ 1700.028019] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1700.028702] ? is_vmalloc_addr+0x7b/0xb0 [ 1700.029364] genl_rcv+0x24/0x40 [ 1700.029860] netlink_unicast+0x549/0x7f0 [ 1700.030527] ? netlink_attachskb+0x870/0x870 [ 1700.031217] netlink_sendmsg+0x90f/0xdf0 [ 1700.031858] ? netlink_unicast+0x7f0/0x7f0 [ 1700.032514] ? netlink_unicast+0x7f0/0x7f0 [ 1700.033201] __sock_sendmsg+0x154/0x190 [ 1700.033800] ____sys_sendmsg+0x70d/0x870 [ 1700.034468] ? sock_write_iter+0x3d0/0x3d0 [ 1700.035116] ? do_recvmmsg+0x6d0/0x6d0 [ 1700.035725] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1700.036519] ? lock_downgrade+0x6d0/0x6d0 [ 1700.037201] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1700.038005] ___sys_sendmsg+0xf3/0x170 [ 1700.038614] ? sendmsg_copy_msghdr+0x160/0x160 [ 1700.039326] ? lock_downgrade+0x6d0/0x6d0 [ 1700.039992] ? find_held_lock+0x2c/0x110 [ 1700.040609] ? __fget_files+0x296/0x4c0 [ 1700.041275] ? __fget_light+0xea/0x290 [ 1700.041910] __sys_sendmsg+0xe5/0x1b0 [ 1700.042520] ? __sys_sendmsg_sock+0x40/0x40 [ 1700.043221] ? rcu_read_lock_any_held+0x75/0xa0 [ 1700.043982] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1700.044807] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1700.045626] ? trace_hardirqs_on+0x5b/0x180 [ 1700.046315] do_syscall_64+0x33/0x40 [ 1700.046914] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1700.047727] RIP: 0033:0x7fa4f0967b19 [ 1700.048326] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1700.051207] RSP: 002b:00007fa4ededd188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1700.052415] RAX: ffffffffffffffda RBX: 00007fa4f0a7af60 RCX: 00007fa4f0967b19 [ 1700.053547] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1700.054686] RBP: 00007fa4ededd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1700.055803] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1700.056965] R13: 00007ffd65f736ff R14: 00007fa4ededd300 R15: 0000000000022000 [ 1700.077766] FAULT_INJECTION: forcing a failure. [ 1700.077766] name failslab, interval 1, probability 0, space 0, times 0 [ 1700.080197] CPU: 0 PID: 9864 Comm: syz-executor.3 Not tainted 5.10.213 #1 [ 1700.081306] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1700.082686] Call Trace: [ 1700.083202] dump_stack+0x107/0x167 [ 1700.083896] should_fail.cold+0x5/0xa [ 1700.084624] should_failslab+0x5/0x20 [ 1700.085351] __kmalloc_node_track_caller+0x74/0x3b0 [ 1700.086272] ? netlink_sendmsg+0x998/0xdf0 [ 1700.087011] __alloc_skb+0xb1/0x5b0 [ 1700.087588] netlink_sendmsg+0x998/0xdf0 [ 1700.088228] ? netlink_unicast+0x7f0/0x7f0 [ 1700.088903] ? netlink_unicast+0x7f0/0x7f0 [ 1700.089540] __sock_sendmsg+0x154/0x190 [ 1700.090151] ____sys_sendmsg+0x70d/0x870 [ 1700.090759] ? sock_write_iter+0x3d0/0x3d0 [ 1700.091399] ? do_recvmmsg+0x6d0/0x6d0 [ 1700.091996] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1700.092772] ? lock_downgrade+0x6d0/0x6d0 [ 1700.093435] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1700.094270] ___sys_sendmsg+0xf3/0x170 [ 1700.094862] ? sendmsg_copy_msghdr+0x160/0x160 [ 1700.095578] ? lock_downgrade+0x6d0/0x6d0 [ 1700.096221] ? find_held_lock+0x2c/0x110 [ 1700.096846] ? __fget_files+0x296/0x4c0 [ 1700.097461] ? __fget_light+0xea/0x290 [ 1700.098073] __sys_sendmsg+0xe5/0x1b0 [ 1700.098644] ? __sys_sendmsg_sock+0x40/0x40 [ 1700.099303] ? rcu_read_lock_any_held+0x75/0xa0 [ 1700.100057] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1700.100850] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1700.101628] ? trace_hardirqs_on+0x5b/0x180 [ 1700.102293] do_syscall_64+0x33/0x40 [ 1700.102849] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1700.103635] RIP: 0033:0x7f482b2f9b19 [ 1700.104203] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1700.106963] RSP: 002b:00007f482886f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1700.108100] RAX: ffffffffffffffda RBX: 00007f482b40cf60 RCX: 00007f482b2f9b19 [ 1700.109178] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1700.110242] RBP: 00007f482886f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1700.111318] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1700.112384] R13: 00007ffef22a59af R14: 00007f482886f300 R15: 0000000000022000 04:00:28 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1700.136585] FAULT_INJECTION: forcing a failure. [ 1700.136585] name failslab, interval 1, probability 0, space 0, times 0 [ 1700.137747] CPU: 1 PID: 9862 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1700.138595] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1700.139618] Call Trace: [ 1700.139954] dump_stack+0x107/0x167 [ 1700.140411] should_fail.cold+0x5/0xa [ 1700.140906] ? create_object.isra.0+0x3a/0xa20 [ 1700.141475] should_failslab+0x5/0x20 [ 1700.141955] kmem_cache_alloc+0x5b/0x310 [ 1700.142458] ? entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1700.143120] create_object.isra.0+0x3a/0xa20 [ 1700.143669] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1700.144311] kmem_cache_alloc+0x159/0x310 [ 1700.144761] ? __kernel_text_address+0x9/0x40 [ 1700.145351] jbd2__journal_start+0x190/0x7e0 [ 1700.145910] __ext4_journal_start_sb+0x214/0x390 [ 1700.146507] ext4_iomap_begin+0x485/0x700 [ 1700.147032] ? ext4_iomap_begin_report+0x5a0/0x5a0 [ 1700.147647] ? kasan_save_stack+0x1b/0x40 [ 1700.148164] ? ext4_file_write_iter+0xb26/0x18d0 [ 1700.148757] ? truncate_exceptional_pvec_entries.part.0+0x510/0x510 [ 1700.149405] ? lock_chain_count+0x20/0x20 [ 1700.149943] iomap_apply+0x164/0x810 [ 1700.150415] ? iomap_dio_rw+0x90/0x90 [ 1700.150890] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 1700.151610] ? mark_held_locks+0x9e/0xe0 [ 1700.152130] ? filemap_check_errors+0xa5/0x150 [ 1700.152702] __iomap_dio_rw+0x6cd/0x1110 [ 1700.153219] ? iomap_dio_rw+0x90/0x90 [ 1700.153721] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1700.154292] ? ext4_orphan_add+0x253/0x9e0 [ 1700.154743] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 1700.155364] ? ext4_empty_dir+0xae0/0xae0 [ 1700.155876] ? jbd2__journal_start+0xf3/0x7e0 [ 1700.156453] iomap_dio_rw+0x31/0x90 [ 1700.156913] ext4_file_write_iter+0xb26/0x18d0 [ 1700.157497] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1700.158074] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1700.158733] new_sync_write+0x42c/0x660 [ 1700.159232] ? new_sync_read+0x6f0/0x6f0 [ 1700.159744] ? ksys_write+0x12d/0x260 [ 1700.160130] ? lock_release+0x680/0x680 [ 1700.160629] ? selinux_file_permission+0x92/0x520 [ 1700.161154] ? __fget_files+0x296/0x4c0 [ 1700.161657] vfs_write+0x747/0xa70 [ 1700.162112] ksys_write+0x12d/0x260 [ 1700.162569] ? __ia32_sys_read+0xb0/0xb0 [ 1700.163086] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1700.163741] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1700.164393] do_syscall_64+0x33/0x40 [ 1700.164862] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1700.165494] RIP: 0033:0x7f21b1e90b19 [ 1700.165964] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1700.168263] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1700.169220] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1700.170112] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1700.171004] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1700.171889] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1700.172790] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 04:00:28 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xc0ed0000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:00:28 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1057) 04:00:28 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xe000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:00:28 executing program 5: syslog(0x9, &(0x7f0000000000)=""/4094, 0xffe) 04:00:28 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 6) 04:00:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xc) fcntl$dupfd(r0, 0x0, r0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_UPDATE_FT_IES(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0x844}, @NL80211_ATTR_MDID={0x6, 0xb1, 0x800}]}, 0x24}, 0x1, 0x0, 0x0, 0x4004005}, 0x20) syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) 04:00:28 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801040470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1700.367312] FAULT_INJECTION: forcing a failure. [ 1700.367312] name failslab, interval 1, probability 0, space 0, times 0 [ 1700.368381] CPU: 1 PID: 9886 Comm: syz-executor.3 Not tainted 5.10.213 #1 [ 1700.368894] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1700.369516] Call Trace: [ 1700.369723] dump_stack+0x107/0x167 [ 1700.370004] should_fail.cold+0x5/0xa [ 1700.370295] ? create_object.isra.0+0x3a/0xa20 [ 1700.370636] ? create_object.isra.0+0x3a/0xa20 [ 1700.370985] should_failslab+0x5/0x20 [ 1700.371344] kmem_cache_alloc+0x5b/0x310 [ 1700.371736] create_object.isra.0+0x3a/0xa20 [ 1700.372079] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1700.372471] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 1700.372863] ? netlink_sendmsg+0x998/0xdf0 [ 1700.373193] __alloc_skb+0xb1/0x5b0 [ 1700.373471] netlink_sendmsg+0x998/0xdf0 [ 1700.373784] ? netlink_unicast+0x7f0/0x7f0 [ 1700.374117] ? netlink_unicast+0x7f0/0x7f0 [ 1700.374440] __sock_sendmsg+0x154/0x190 [ 1700.374739] ____sys_sendmsg+0x70d/0x870 [ 1700.375051] ? sock_write_iter+0x3d0/0x3d0 [ 1700.375373] ? do_recvmmsg+0x6d0/0x6d0 [ 1700.375685] ? perf_trace_lock+0xac/0x490 [ 1700.376004] ? __lockdep_reset_lock+0x180/0x180 [ 1700.376348] ? perf_trace_lock+0xac/0x490 [ 1700.376669] ___sys_sendmsg+0xf3/0x170 [ 1700.376975] ? sendmsg_copy_msghdr+0x160/0x160 [ 1700.377326] ? lock_downgrade+0x6d0/0x6d0 [ 1700.377648] ? find_held_lock+0x2c/0x110 [ 1700.377964] ? __fget_files+0x296/0x4c0 [ 1700.378285] ? __fget_light+0xea/0x290 [ 1700.378589] __sys_sendmsg+0xe5/0x1b0 [ 1700.378878] ? __sys_sendmsg_sock+0x40/0x40 [ 1700.379208] ? rcu_read_lock_any_held+0x75/0xa0 [ 1700.379569] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1700.379970] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1700.380359] ? trace_hardirqs_on+0x5b/0x180 [ 1700.380691] do_syscall_64+0x33/0x40 [ 1700.380999] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1700.381392] RIP: 0033:0x7f482b2f9b19 [ 1700.381674] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1700.383065] RSP: 002b:00007f482886f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1700.383667] RAX: ffffffffffffffda RBX: 00007f482b40cf60 RCX: 00007f482b2f9b19 [ 1700.384335] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1700.384873] RBP: 00007f482886f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1700.385411] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1700.385946] R13: 00007ffef22a59af R14: 00007f482886f300 R15: 0000000000022000 04:00:28 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xf0ffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:00:28 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:00:28 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xf32f0000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:00:28 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 14) 04:00:28 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x101000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:00:28 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 19) 04:00:28 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801050470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:00:28 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:00:28 executing program 5: openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, &(0x7f0000000000)=0x7) ioctl$BTRFS_IOC_SET_FEATURES(r2, 0x40309439, &(0x7f0000000040)={0x3, 0x3, 0x4}) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW2(r3, 0x402c542c, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "e35e91852b1941028300000000000000002000"}) ioctl$TCXONC(r3, 0x540a, 0x2) ioctl$VT_RESIZE(r3, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001080)=ANY=[@ANYBLOB="001800210c000000ddfefff7ff020000400800fe06000000000000008005000000da000000000000"], 0x28}}, 0x0) openat2(r5, 0x0, &(0x7f0000000340)={0x52ac0, 0x107, 0x14}, 0x18) getdents64(r5, &(0x7f0000000140)=""/255, 0xff) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000100)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0x4000007ffffffc) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000240)=0x19) syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) [ 1700.650777] FAULT_INJECTION: forcing a failure. [ 1700.650777] name failslab, interval 1, probability 0, space 0, times 0 [ 1700.651949] CPU: 1 PID: 9908 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1700.652613] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1700.653292] Call Trace: [ 1700.653521] dump_stack+0x107/0x167 [ 1700.653888] should_fail.cold+0x5/0xa [ 1700.654265] ? jbd2__journal_start+0x190/0x7e0 [ 1700.654720] should_failslab+0x5/0x20 [ 1700.655108] kmem_cache_alloc+0x5b/0x310 [ 1700.655514] jbd2__journal_start+0x190/0x7e0 [ 1700.655959] __ext4_journal_start_sb+0x214/0x390 [ 1700.656377] ext4_file_write_iter+0x1138/0x18d0 [ 1700.656860] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1700.657264] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1700.657793] new_sync_write+0x42c/0x660 [ 1700.658193] ? new_sync_read+0x6f0/0x6f0 [ 1700.658595] ? ksys_write+0x12d/0x260 [ 1700.658974] ? lock_release+0x680/0x680 [ 1700.659368] ? selinux_file_permission+0x92/0x520 [ 1700.659849] ? __fget_files+0x296/0x4c0 [ 1700.660246] vfs_write+0x747/0xa70 [ 1700.660601] ksys_write+0x12d/0x260 [ 1700.660926] ? __ia32_sys_read+0xb0/0xb0 [ 1700.661331] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1700.661849] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1700.662295] do_syscall_64+0x33/0x40 [ 1700.662662] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1700.663112] RIP: 0033:0x7f21b1e90b19 [ 1700.663485] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1700.665045] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1700.665814] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1700.666501] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1700.667198] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1700.667890] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1700.668582] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 [ 1700.827759] FAULT_INJECTION: forcing a failure. [ 1700.827759] name failslab, interval 1, probability 0, space 0, times 0 [ 1700.829781] CPU: 1 PID: 9909 Comm: syz-executor.6 Not tainted 5.10.213 #1 [ 1700.830836] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1700.832085] Call Trace: [ 1700.832499] dump_stack+0x107/0x167 [ 1700.833078] should_fail.cold+0x5/0xa [ 1700.833665] ? rfkill_alloc+0xa6/0x2c0 [ 1700.834277] should_failslab+0x5/0x20 [ 1700.834862] __kmalloc+0x72/0x390 [ 1700.835407] rfkill_alloc+0xa6/0x2c0 [ 1700.835989] wiphy_new_nm+0x12a3/0x1e00 [ 1700.836603] ieee80211_alloc_hw_nm+0x37a/0x2320 [ 1700.837333] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1700.838135] ? __local_bh_enable_ip+0x9d/0x100 [ 1700.838830] ? trace_hardirqs_on+0x5b/0x180 [ 1700.839495] mac80211_hwsim_new_radio+0x1cd/0x4250 [ 1700.840249] ? ____sys_sendmsg+0x70d/0x870 [ 1700.840907] ? ___sys_sendmsg+0xf3/0x170 [ 1700.841532] ? __sys_sendmsg+0xe5/0x1b0 [ 1700.842150] ? do_syscall_64+0x33/0x40 [ 1700.842753] ? entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1700.843578] ? lock_acquire+0x197/0x470 [ 1700.844192] ? create_object.isra.0+0x3ad/0xa20 [ 1700.844935] ? hwsim_send_nullfunc_ps+0x80/0x80 [ 1700.845667] ? __kmalloc+0x16e/0x390 [ 1700.846255] hwsim_new_radio_nl+0x991/0x1080 [ 1700.846942] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1700.847752] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 1700.848759] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 1700.849771] genl_family_rcv_msg_doit+0x22d/0x330 [ 1700.850519] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1700.851525] ? cap_capable+0x1cd/0x230 [ 1700.852139] ? ns_capable+0xe2/0x110 [ 1700.852719] genl_rcv_msg+0x33c/0x5a0 [ 1700.853320] ? genl_get_cmd+0x480/0x480 [ 1700.853935] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1700.854732] ? lock_release+0x680/0x680 [ 1700.855344] ? netlink_deliver_tap+0xf4/0xcc0 [ 1700.856040] netlink_rcv_skb+0x14b/0x430 [ 1700.856665] ? genl_get_cmd+0x480/0x480 [ 1700.857293] ? netlink_ack+0xab0/0xab0 [ 1700.857902] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1700.858603] ? is_vmalloc_addr+0x7b/0xb0 [ 1700.859238] genl_rcv+0x24/0x40 [ 1700.859745] netlink_unicast+0x549/0x7f0 [ 1700.860384] ? netlink_attachskb+0x870/0x870 [ 1700.861079] netlink_sendmsg+0x90f/0xdf0 [ 1700.861711] ? netlink_unicast+0x7f0/0x7f0 [ 1700.862375] ? netlink_unicast+0x7f0/0x7f0 [ 1700.863032] __sock_sendmsg+0x154/0x190 [ 1700.863649] ____sys_sendmsg+0x70d/0x870 [ 1700.864285] ? sock_write_iter+0x3d0/0x3d0 [ 1700.864945] ? do_recvmmsg+0x6d0/0x6d0 [ 1700.865551] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1700.866358] ? lock_downgrade+0x6d0/0x6d0 [ 1700.867000] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1700.867812] ___sys_sendmsg+0xf3/0x170 [ 1700.868423] ? sendmsg_copy_msghdr+0x160/0x160 [ 1700.869141] ? lock_downgrade+0x6d0/0x6d0 [ 1700.869781] ? find_held_lock+0x2c/0x110 [ 1700.870424] ? __fget_files+0x296/0x4c0 [ 1700.871047] ? __fget_light+0xea/0x290 [ 1700.871661] __sys_sendmsg+0xe5/0x1b0 [ 1700.872256] ? __sys_sendmsg_sock+0x40/0x40 [ 1700.872931] ? rcu_read_lock_any_held+0x75/0xa0 [ 1700.873665] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1700.874463] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1700.875245] ? trace_hardirqs_on+0x5b/0x180 [ 1700.875911] do_syscall_64+0x33/0x40 [ 1700.876482] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1700.877275] RIP: 0033:0x7fa4f0967b19 [ 1700.877847] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1700.880634] RSP: 002b:00007fa4ededd188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1700.881805] RAX: ffffffffffffffda RBX: 00007fa4f0a7af60 RCX: 00007fa4f0967b19 [ 1700.882896] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1700.883985] RBP: 00007fa4ededd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1700.885082] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1700.886169] R13: 00007ffd65f736ff R14: 00007fa4ededd300 R15: 0000000000022000 04:00:43 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1058) 04:00:43 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 15) 04:00:43 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 7) 04:00:43 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xf52f0000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:00:43 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 20) 04:00:43 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:00:43 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801060470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:00:43 executing program 5: syslog(0x3, &(0x7f0000000000)=""/4079, 0xfef) 04:00:43 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801070470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1715.900630] FAULT_INJECTION: forcing a failure. [ 1715.900630] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1715.901844] CPU: 0 PID: 9939 Comm: syz-executor.3 Not tainted 5.10.213 #1 [ 1715.902426] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1715.903119] Call Trace: [ 1715.903345] dump_stack+0x107/0x167 [ 1715.903641] should_fail.cold+0x5/0xa [ 1715.903951] _copy_from_iter_full+0x201/0xa60 [ 1715.904315] ? __virt_addr_valid+0x170/0x5c0 [ 1715.904667] ? __check_object_size+0x319/0x440 [ 1715.905047] netlink_sendmsg+0x879/0xdf0 [ 1715.905378] ? netlink_unicast+0x7f0/0x7f0 [ 1715.905730] ? netlink_unicast+0x7f0/0x7f0 [ 1715.906069] __sock_sendmsg+0x154/0x190 [ 1715.906384] ____sys_sendmsg+0x70d/0x870 [ 1715.906713] ? sock_write_iter+0x3d0/0x3d0 [ 1715.907049] ? do_recvmmsg+0x6d0/0x6d0 [ 1715.907365] ? perf_trace_lock+0xac/0x490 [ 1715.907696] ? __lockdep_reset_lock+0x180/0x180 [ 1715.908071] ? perf_trace_lock+0xac/0x490 [ 1715.908407] ___sys_sendmsg+0xf3/0x170 [ 1715.908726] ? sendmsg_copy_msghdr+0x160/0x160 [ 1715.909118] ? lock_downgrade+0x6d0/0x6d0 [ 1715.909448] ? find_held_lock+0x2c/0x110 [ 1715.909776] ? __fget_files+0x296/0x4c0 [ 1715.910102] ? __fget_light+0xea/0x290 [ 1715.910419] __sys_sendmsg+0xe5/0x1b0 [ 1715.910725] ? __sys_sendmsg_sock+0x40/0x40 [ 1715.911081] ? rcu_read_lock_any_held+0x75/0xa0 [ 1715.911463] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1715.911888] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1715.912306] ? trace_hardirqs_on+0x5b/0x180 [ 1715.912658] do_syscall_64+0x33/0x40 [ 1715.912960] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1715.913386] RIP: 0033:0x7f482b2f9b19 [ 1715.913687] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1715.915162] RSP: 002b:00007f482886f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1715.915766] RAX: ffffffffffffffda RBX: 00007f482b40cf60 RCX: 00007f482b2f9b19 [ 1715.916347] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1715.916924] RBP: 00007f482886f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1715.917507] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1715.918076] R13: 00007ffef22a59af R14: 00007f482886f300 R15: 0000000000022000 [ 1715.962812] FAULT_INJECTION: forcing a failure. [ 1715.962812] name failslab, interval 1, probability 0, space 0, times 0 [ 1715.964404] CPU: 1 PID: 9927 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1715.965624] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1715.966749] Call Trace: [ 1715.967233] dump_stack+0x107/0x167 [ 1715.967741] should_fail.cold+0x5/0xa [ 1715.968421] ? create_object.isra.0+0x3a/0xa20 [ 1715.969067] should_failslab+0x5/0x20 [ 1715.969750] kmem_cache_alloc+0x5b/0x310 [ 1715.970336] create_object.isra.0+0x3a/0xa20 [ 1715.971110] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1715.971800] kmem_cache_alloc+0x159/0x310 [ 1715.972534] jbd2__journal_start+0x190/0x7e0 [ 1715.973299] __ext4_journal_start_sb+0x214/0x390 [ 1715.974118] ext4_file_write_iter+0x1138/0x18d0 [ 1715.974762] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1715.975555] ? __lockdep_reset_lock+0x180/0x180 [ 1715.976194] ? __lockdep_reset_lock+0x180/0x180 [ 1715.977040] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1715.977767] new_sync_write+0x42c/0x660 [ 1715.978481] ? new_sync_read+0x6f0/0x6f0 [ 1715.979036] ? ksys_write+0x12d/0x260 [ 1715.979742] ? lock_release+0x680/0x680 [ 1715.980296] ? selinux_file_permission+0x92/0x520 [ 1715.981152] ? __fget_files+0x296/0x4c0 [ 1715.981715] vfs_write+0x747/0xa70 [ 1715.982338] ksys_write+0x12d/0x260 [ 1715.982834] ? __ia32_sys_read+0xb0/0xb0 [ 1715.983568] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1715.984268] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1715.985188] do_syscall_64+0x33/0x40 [ 1715.985690] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1715.986595] RIP: 0033:0x7f21b1e90b19 [ 1715.987111] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1715.990314] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1715.991322] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1715.992578] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1715.993575] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1715.994839] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1715.995874] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 04:00:58 executing program 5: syslog(0x3, &(0x7f0000001340)=""/4096, 0x1000) 04:00:58 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) [ 1730.711844] FAULT_INJECTION: forcing a failure. [ 1730.711844] name failslab, interval 1, probability 0, space 0, times 0 [ 1730.713325] CPU: 0 PID: 9961 Comm: syz-executor.3 Not tainted 5.10.213 #1 [ 1730.714015] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1730.714844] Call Trace: [ 1730.715159] dump_stack+0x107/0x167 [ 1730.715547] should_fail.cold+0x5/0xa [ 1730.715950] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xdb/0x280 [ 1730.716619] should_failslab+0x5/0x20 [ 1730.717010] __kmalloc+0x72/0x390 [ 1730.717379] genl_family_rcv_msg_attrs_parse.constprop.0+0xdb/0x280 [ 1730.718171] genl_family_rcv_msg_doit+0xda/0x330 [ 1730.718691] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1730.719389] ? cap_capable+0x1cd/0x230 [ 1730.719791] ? security_capable+0x95/0xc0 [ 1730.720243] ? ns_capable+0xe2/0x110 [ 1730.720620] genl_rcv_msg+0x33c/0x5a0 [ 1730.721021] ? genl_get_cmd+0x480/0x480 [ 1730.721468] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1730.722086] ? lock_release+0x680/0x680 [ 1730.722584] ? netlink_deliver_tap+0xf4/0xcc0 [ 1730.723147] netlink_rcv_skb+0x14b/0x430 [ 1730.723634] ? genl_get_cmd+0x480/0x480 [ 1730.724140] ? netlink_ack+0xab0/0xab0 [ 1730.724616] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1730.725176] ? is_vmalloc_addr+0x7b/0xb0 [ 1730.725690] genl_rcv+0x24/0x40 [ 1730.726112] netlink_unicast+0x549/0x7f0 [ 1730.726635] ? netlink_attachskb+0x870/0x870 [ 1730.727168] netlink_sendmsg+0x90f/0xdf0 [ 1730.727656] ? netlink_unicast+0x7f0/0x7f0 [ 1730.728219] ? netlink_unicast+0x7f0/0x7f0 [ 1730.728761] __sock_sendmsg+0x154/0x190 [ 1730.729273] ____sys_sendmsg+0x70d/0x870 [ 1730.729761] ? sock_write_iter+0x3d0/0x3d0 [ 1730.730297] ? do_recvmmsg+0x6d0/0x6d0 [ 1730.730805] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1730.731451] ? lock_downgrade+0x6d0/0x6d0 [ 1730.731958] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1730.732600] ___sys_sendmsg+0xf3/0x170 [ 1730.733095] ? sendmsg_copy_msghdr+0x160/0x160 [ 1730.733658] ? lock_downgrade+0x6d0/0x6d0 [ 1730.734163] ? find_held_lock+0x2c/0x110 [ 1730.734688] ? __fget_files+0x296/0x4c0 [ 1730.735193] ? __fget_light+0xea/0x290 [ 1730.735669] __sys_sendmsg+0xe5/0x1b0 [ 1730.736162] ? __sys_sendmsg_sock+0x40/0x40 [ 1730.736684] ? rcu_read_lock_any_held+0x75/0xa0 [ 1730.737265] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1730.737898] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1730.738511] ? trace_hardirqs_on+0x5b/0x180 [ 1730.739033] do_syscall_64+0x33/0x40 [ 1730.739478] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1730.740089] RIP: 0033:0x7f482b2f9b19 [ 1730.740536] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1730.742752] RSP: 002b:00007f482886f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1730.743662] RAX: ffffffffffffffda RBX: 00007f482b40cf60 RCX: 00007f482b2f9b19 [ 1730.744511] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1730.745374] RBP: 00007f482886f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1730.746225] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1730.747075] R13: 00007ffef22a59af R14: 00007f482886f300 R15: 0000000000022000 04:00:58 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:00:58 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1059) 04:00:58 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:00:58 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 8) 04:00:58 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801080470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:00:58 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 21) [ 1730.825227] FAULT_INJECTION: forcing a failure. [ 1730.825227] name failslab, interval 1, probability 0, space 0, times 0 [ 1730.826650] CPU: 0 PID: 9958 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1730.827352] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1730.828194] Call Trace: [ 1730.828470] dump_stack+0x107/0x167 [ 1730.828843] should_fail.cold+0x5/0xa [ 1730.829244] ? jbd2__journal_start+0x190/0x7e0 [ 1730.829716] should_failslab+0x5/0x20 [ 1730.830102] kmem_cache_alloc+0x5b/0x310 [ 1730.830524] jbd2__journal_start+0x190/0x7e0 [ 1730.830987] __ext4_journal_start_sb+0x214/0x390 [ 1730.831476] ext4_dirty_inode+0xbc/0x130 [ 1730.831913] ? ext4_setattr+0x2160/0x2160 [ 1730.832341] __mark_inode_dirty+0x492/0xd40 [ 1730.832790] generic_update_time+0x21c/0x370 [ 1730.833256] file_update_time+0x43a/0x520 [ 1730.833710] ? evict_inodes+0x420/0x420 [ 1730.834171] ? down_write_killable+0x180/0x180 [ 1730.834742] file_modified+0x7d/0xa0 [ 1730.835193] ext4_buffered_write_iter+0xf9/0x4a0 [ 1730.835773] ext4_file_write_iter+0xc11/0x18d0 [ 1730.836271] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1730.836735] ? __lockdep_reset_lock+0x180/0x180 [ 1730.837238] ? __lockdep_reset_lock+0x180/0x180 [ 1730.837712] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1730.838274] new_sync_write+0x42c/0x660 [ 1730.838673] ? new_sync_read+0x6f0/0x6f0 [ 1730.839107] ? ksys_write+0x12d/0x260 [ 1730.839494] ? lock_release+0x680/0x680 [ 1730.839901] ? selinux_file_permission+0x92/0x520 [ 1730.840404] ? __fget_files+0x296/0x4c0 [ 1730.840807] vfs_write+0x747/0xa70 [ 1730.841200] ksys_write+0x12d/0x260 [ 1730.841566] ? __ia32_sys_read+0xb0/0xb0 [ 1730.841989] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1730.842527] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1730.843084] do_syscall_64+0x33/0x40 [ 1730.843460] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1730.843989] RIP: 0033:0x7f21b1e90b19 [ 1730.844378] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1730.846268] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1730.847053] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1730.847772] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1730.848508] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1730.849250] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1730.849970] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 04:00:58 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x500000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:00:58 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 9) 04:00:58 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e666174000208010b0470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:00:58 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 22) 04:00:58 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xf9fdffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:00:58 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) [ 1731.038690] FAULT_INJECTION: forcing a failure. [ 1731.038690] name failslab, interval 1, probability 0, space 0, times 0 [ 1731.040070] CPU: 0 PID: 9986 Comm: syz-executor.3 Not tainted 5.10.213 #1 [ 1731.040757] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1731.041604] Call Trace: [ 1731.041879] dump_stack+0x107/0x167 [ 1731.042253] should_fail.cold+0x5/0xa [ 1731.042640] ? create_object.isra.0+0x3a/0xa20 [ 1731.043106] should_failslab+0x5/0x20 [ 1731.043484] kmem_cache_alloc+0x5b/0x310 [ 1731.043897] ? lock_release+0x680/0x680 [ 1731.044295] create_object.isra.0+0x3a/0xa20 [ 1731.044745] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1731.045255] __kmalloc+0x16e/0x390 [ 1731.045618] genl_family_rcv_msg_attrs_parse.constprop.0+0xdb/0x280 [ 1731.046267] genl_family_rcv_msg_doit+0xda/0x330 [ 1731.046744] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1731.047410] ? cap_capable+0x1cd/0x230 [ 1731.047794] ? security_capable+0x95/0xc0 [ 1731.048217] ? ns_capable+0xe2/0x110 [ 1731.048610] genl_rcv_msg+0x33c/0x5a0 [ 1731.048995] ? genl_get_cmd+0x480/0x480 [ 1731.049419] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1731.049928] ? lock_release+0x680/0x680 [ 1731.050330] ? netlink_deliver_tap+0xf4/0xcc0 [ 1731.050782] netlink_rcv_skb+0x14b/0x430 [ 1731.051188] ? genl_get_cmd+0x480/0x480 [ 1731.051597] ? netlink_ack+0xab0/0xab0 [ 1731.051988] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1731.052447] ? is_vmalloc_addr+0x7b/0xb0 [ 1731.052856] genl_rcv+0x24/0x40 [ 1731.053207] netlink_unicast+0x549/0x7f0 [ 1731.053604] ? netlink_attachskb+0x870/0x870 [ 1731.054064] netlink_sendmsg+0x90f/0xdf0 [ 1731.054524] ? netlink_unicast+0x7f0/0x7f0 [ 1731.054960] ? netlink_unicast+0x7f0/0x7f0 [ 1731.055370] __sock_sendmsg+0x154/0x190 [ 1731.055755] ____sys_sendmsg+0x70d/0x870 [ 1731.056170] ? sock_write_iter+0x3d0/0x3d0 [ 1731.056581] ? do_recvmmsg+0x6d0/0x6d0 [ 1731.056973] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1731.057516] ? lock_downgrade+0x6d0/0x6d0 [ 1731.057933] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1731.058458] ___sys_sendmsg+0xf3/0x170 [ 1731.058848] ? sendmsg_copy_msghdr+0x160/0x160 [ 1731.059312] ? lock_downgrade+0x6d0/0x6d0 [ 1731.059786] ? find_held_lock+0x2c/0x110 [ 1731.060314] ? __fget_files+0x296/0x4c0 [ 1731.060739] ? __fget_light+0xea/0x290 [ 1731.061127] __sys_sendmsg+0xe5/0x1b0 [ 1731.061525] ? __sys_sendmsg_sock+0x40/0x40 [ 1731.061947] ? rcu_read_lock_any_held+0x75/0xa0 [ 1731.062424] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1731.062944] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1731.063456] ? trace_hardirqs_on+0x5b/0x180 [ 1731.063891] do_syscall_64+0x33/0x40 [ 1731.064267] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1731.064734] RIP: 0033:0x7f482b2f9b19 [ 1731.065082] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1731.066778] RSP: 002b:00007f482886f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1731.067481] RAX: ffffffffffffffda RBX: 00007f482b40cf60 RCX: 00007f482b2f9b19 [ 1731.068126] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1731.068762] RBP: 00007f482886f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1731.069409] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1731.070046] R13: 00007ffef22a59af R14: 00007f482886f300 R15: 0000000000022000 [ 1731.105867] FAULT_INJECTION: forcing a failure. [ 1731.105867] name failslab, interval 1, probability 0, space 0, times 0 [ 1731.107180] CPU: 0 PID: 9991 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1731.107823] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1731.108679] Call Trace: [ 1731.108976] dump_stack+0x107/0x167 [ 1731.109366] should_fail.cold+0x5/0xa [ 1731.109732] ? xas_alloc+0x336/0x440 [ 1731.110093] should_failslab+0x5/0x20 [ 1731.110460] kmem_cache_alloc+0x5b/0x310 [ 1731.110851] xas_alloc+0x336/0x440 [ 1731.111196] xas_create+0x34a/0x10d0 [ 1731.111564] xas_store+0x8c/0x1c40 [ 1731.111913] ? xas_find_conflict+0x4b5/0xa70 [ 1731.112346] __add_to_page_cache_locked+0x708/0xc80 [ 1731.112837] ? file_write_and_wait_range+0x130/0x130 [ 1731.113375] ? memcg_drain_all_list_lrus+0x720/0x720 [ 1731.113861] ? find_get_entry+0x2c8/0x740 [ 1731.114369] ? entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1731.114885] add_to_page_cache_lru+0xe6/0x2e0 [ 1731.115314] ? add_to_page_cache_locked+0x40/0x40 [ 1731.115778] ? __page_cache_alloc+0x10d/0x360 [ 1731.116229] pagecache_get_page+0x38b/0xc80 [ 1731.116641] ? current_time+0x72/0x2c0 [ 1731.117022] grab_cache_page_write_begin+0x64/0xa0 [ 1731.117505] ext4_da_write_begin+0x2f3/0xd40 [ 1731.117935] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1731.118434] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1731.118928] ? ext4_write_begin+0x10f0/0x10f0 [ 1731.119359] ? copyout_mc+0x140/0x140 [ 1731.119723] ? current_time+0x1a3/0x2c0 [ 1731.120111] generic_perform_write+0x20a/0x4f0 [ 1731.120556] ? page_cache_prev_miss+0x310/0x310 [ 1731.121010] ? down_write_killable+0x180/0x180 [ 1731.121468] ext4_buffered_write_iter+0x232/0x4a0 [ 1731.121938] ext4_file_write_iter+0xc11/0x18d0 [ 1731.122390] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1731.122828] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1731.123340] new_sync_write+0x42c/0x660 [ 1731.123725] ? new_sync_read+0x6f0/0x6f0 [ 1731.124153] ? ksys_write+0x12d/0x260 [ 1731.124520] ? lock_release+0x680/0x680 [ 1731.124911] ? selinux_file_permission+0x92/0x520 [ 1731.125390] ? __fget_files+0x296/0x4c0 [ 1731.125778] vfs_write+0x747/0xa70 [ 1731.126128] ksys_write+0x12d/0x260 [ 1731.126484] ? __ia32_sys_read+0xb0/0xb0 [ 1731.126874] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1731.127373] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1731.127878] do_syscall_64+0x33/0x40 [ 1731.128240] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1731.128729] RIP: 0033:0x7f21b1e90b19 [ 1731.129091] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1731.130843] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1731.131568] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1731.132258] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1731.132941] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1731.133637] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1731.134322] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 04:01:13 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x2, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 04:01:13 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x505000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:01:13 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 10) 04:01:13 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801180470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:01:13 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) syslog(0x1, &(0x7f0000001340)=""/4096, 0x1000) 04:01:13 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x105a) 04:01:13 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfcfdffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:01:13 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 23) [ 1745.866650] FAULT_INJECTION: forcing a failure. [ 1745.866650] name failslab, interval 1, probability 0, space 0, times 0 [ 1745.868564] CPU: 1 PID: 10014 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1745.869720] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1745.871067] Call Trace: [ 1745.871497] dump_stack+0x107/0x167 [ 1745.872101] should_fail.cold+0x5/0xa [ 1745.872710] ? create_object.isra.0+0x3a/0xa20 [ 1745.873461] should_failslab+0x5/0x20 [ 1745.874085] kmem_cache_alloc+0x5b/0x310 [ 1745.874741] create_object.isra.0+0x3a/0xa20 [ 1745.875472] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1745.876302] kmem_cache_alloc+0x159/0x310 [ 1745.876997] xas_alloc+0x336/0x440 [ 1745.877586] xas_create+0x34a/0x10d0 [ 1745.878215] xas_store+0x8c/0x1c40 [ 1745.878781] ? xas_find_conflict+0x4b5/0xa70 [ 1745.879522] __add_to_page_cache_locked+0x708/0xc80 [ 1745.880339] ? file_write_and_wait_range+0x130/0x130 [ 1745.906855] ? memcg_drain_all_list_lrus+0x720/0x720 [ 1745.907680] ? find_get_entry+0x2c8/0x740 [ 1745.908352] ? entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1745.909219] add_to_page_cache_lru+0xe6/0x2e0 [ 1745.909962] ? add_to_page_cache_locked+0x40/0x40 [ 1745.910721] ? __page_cache_alloc+0x10d/0x360 [ 1745.911466] pagecache_get_page+0x38b/0xc80 [ 1745.912194] ? current_time+0x72/0x2c0 [ 1745.912811] grab_cache_page_write_begin+0x64/0xa0 [ 1745.913624] ext4_da_write_begin+0x2f3/0xd40 [ 1745.914336] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1745.915195] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1745.916036] ? ext4_write_begin+0x10f0/0x10f0 [ 1745.916743] ? copyout_mc+0x140/0x140 [ 1745.917374] ? current_time+0x1a3/0x2c0 [ 1745.918034] generic_perform_write+0x20a/0x4f0 [ 1745.918776] ? page_cache_prev_miss+0x310/0x310 [ 1745.919549] ? down_write_killable+0x180/0x180 [ 1745.920314] ext4_buffered_write_iter+0x232/0x4a0 [ 1745.921102] ext4_file_write_iter+0xc11/0x18d0 [ 1745.921870] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1745.922604] ? __lockdep_reset_lock+0x180/0x180 [ 1745.923373] ? __lockdep_reset_lock+0x180/0x180 [ 1745.924131] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1745.924995] new_sync_write+0x42c/0x660 [ 1745.925652] ? new_sync_read+0x6f0/0x6f0 [ 1745.926315] ? ksys_write+0x12d/0x260 [ 1745.926956] ? lock_release+0x680/0x680 [ 1745.927601] ? selinux_file_permission+0x92/0x520 [ 1745.928398] ? __fget_files+0x296/0x4c0 [ 1745.929070] vfs_write+0x747/0xa70 [ 1745.929661] ksys_write+0x12d/0x260 [ 1745.930256] ? __ia32_sys_read+0xb0/0xb0 [ 1745.930939] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1745.931775] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1745.932616] do_syscall_64+0x33/0x40 [ 1745.933225] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1745.934066] RIP: 0033:0x7f21b1e90b19 [ 1745.934658] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1745.937580] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1745.938787] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1745.939931] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1745.941050] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1745.942206] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1745.943340] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 04:01:14 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:01:14 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) syslog(0x2, &(0x7f0000000000)=""/187, 0xbb) 04:01:14 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 24) 04:01:14 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfdfdffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1746.176861] FAULT_INJECTION: forcing a failure. [ 1746.176861] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1746.179107] CPU: 0 PID: 10018 Comm: syz-executor.3 Not tainted 5.10.213 #1 [ 1746.180155] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1746.181412] Call Trace: [ 1746.181823] dump_stack+0x107/0x167 [ 1746.182378] should_fail.cold+0x5/0xa [ 1746.182969] __alloc_pages_nodemask+0x182/0x600 [ 1746.183640] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 1746.184552] ? __is_insn_slot_addr+0x14c/0x290 [ 1746.185258] ? lock_chain_count+0x20/0x20 [ 1746.185932] ? __kernel_text_address+0x9/0x40 [ 1746.186618] ? unwind_get_return_address+0x55/0xa0 [ 1746.187314] ? create_prof_cpu_mask+0x20/0x20 [ 1746.187995] ? arch_stack_walk+0x99/0xf0 [ 1746.188586] alloc_pages_current+0x187/0x280 [ 1746.189242] kmalloc_order+0x35/0x160 [ 1746.189714] kmalloc_order_trace+0x14/0xa0 [ 1746.190246] wiphy_new_nm+0x6f3/0x1e00 [ 1746.190736] ieee80211_alloc_hw_nm+0x37a/0x2320 [ 1746.191287] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1746.191949] ? __local_bh_enable_ip+0x9d/0x100 [ 1746.192482] ? trace_hardirqs_on+0x5b/0x180 [ 1746.193018] mac80211_hwsim_new_radio+0x1cd/0x4250 [ 1746.193601] ? ____sys_sendmsg+0x70d/0x870 [ 1746.194285] ? ___sys_sendmsg+0xf3/0x170 [ 1746.194792] ? __sys_sendmsg+0xe5/0x1b0 [ 1746.195288] ? do_syscall_64+0x33/0x40 [ 1746.195793] ? entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1746.196483] ? lock_acquire+0x197/0x470 [ 1746.196964] ? create_object.isra.0+0x3ad/0xa20 [ 1746.197615] ? hwsim_send_nullfunc_ps+0x80/0x80 [ 1746.198229] ? __kmalloc+0x16e/0x390 [ 1746.198691] hwsim_new_radio_nl+0x991/0x1080 [ 1746.199236] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1746.199929] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 1746.200742] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 1746.201599] genl_family_rcv_msg_doit+0x22d/0x330 [ 1746.202199] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1746.203077] ? cap_capable+0x1cd/0x230 [ 1746.203588] ? ns_capable+0xe2/0x110 [ 1746.204073] genl_rcv_msg+0x33c/0x5a0 [ 1746.204574] ? genl_get_cmd+0x480/0x480 [ 1746.205069] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1746.205829] ? lock_release+0x680/0x680 [ 1746.206305] ? __lockdep_reset_lock+0x180/0x180 [ 1746.206900] netlink_rcv_skb+0x14b/0x430 [ 1746.207402] ? genl_get_cmd+0x480/0x480 [ 1746.207890] ? netlink_ack+0xab0/0xab0 [ 1746.208380] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1746.208947] ? is_vmalloc_addr+0x7b/0xb0 [ 1746.209478] genl_rcv+0x24/0x40 [ 1746.209905] netlink_unicast+0x549/0x7f0 [ 1746.210403] ? netlink_attachskb+0x870/0x870 [ 1746.210959] netlink_sendmsg+0x90f/0xdf0 [ 1746.211437] ? netlink_unicast+0x7f0/0x7f0 [ 1746.211968] ? netlink_unicast+0x7f0/0x7f0 [ 1746.212469] __sock_sendmsg+0x154/0x190 [ 1746.212956] ____sys_sendmsg+0x70d/0x870 [ 1746.213483] ? sock_write_iter+0x3d0/0x3d0 [ 1746.214001] ? do_recvmmsg+0x6d0/0x6d0 [ 1746.214452] ? perf_trace_lock+0xac/0x490 [ 1746.214975] ? __lockdep_reset_lock+0x180/0x180 [ 1746.215520] ? perf_trace_lock+0xac/0x490 [ 1746.216031] ___sys_sendmsg+0xf3/0x170 [ 1746.216503] ? sendmsg_copy_msghdr+0x160/0x160 [ 1746.217065] ? lock_downgrade+0x6d0/0x6d0 [ 1746.217569] ? find_held_lock+0x2c/0x110 [ 1746.218079] ? __fget_files+0x296/0x4c0 [ 1746.218557] ? __fget_light+0xea/0x290 [ 1746.219048] __sys_sendmsg+0xe5/0x1b0 [ 1746.219516] ? __sys_sendmsg_sock+0x40/0x40 [ 1746.220031] ? rcu_read_lock_any_held+0x75/0xa0 [ 1746.220617] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1746.221234] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1746.221869] ? trace_hardirqs_on+0x5b/0x180 [ 1746.222388] do_syscall_64+0x33/0x40 [ 1746.222849] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1746.223445] RIP: 0033:0x7f482b2f9b19 [ 1746.223904] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1746.226120] RSP: 002b:00007f482886f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1746.227055] RAX: ffffffffffffffda RBX: 00007f482b40cf60 RCX: 00007f482b2f9b19 [ 1746.227933] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1746.228803] RBP: 00007f482886f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1746.229680] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1746.230554] R13: 00007ffef22a59af R14: 00007f482886f300 R15: 0000000000022000 [ 1746.232563] FAULT_INJECTION: forcing a failure. [ 1746.232563] name failslab, interval 1, probability 0, space 0, times 0 [ 1746.233954] CPU: 0 PID: 10029 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1746.234795] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1746.235803] Call Trace: [ 1746.236127] dump_stack+0x107/0x167 [ 1746.236579] should_fail.cold+0x5/0xa [ 1746.237049] ? xas_alloc+0x336/0x440 [ 1746.237733] should_failslab+0x5/0x20 [ 1746.238208] kmem_cache_alloc+0x5b/0x310 [ 1746.238713] xas_alloc+0x336/0x440 [ 1746.239139] xas_create+0x34a/0x10d0 [ 1746.239614] xas_store+0x8c/0x1c40 [ 1746.240057] ? xas_find_conflict+0x4b5/0xa70 [ 1746.240612] __add_to_page_cache_locked+0x708/0xc80 [ 1746.241204] ? file_write_and_wait_range+0x130/0x130 [ 1746.241850] ? memcg_drain_all_list_lrus+0x720/0x720 [ 1746.242451] ? find_get_entry+0x2c8/0x740 [ 1746.242960] ? entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1746.243596] add_to_page_cache_lru+0xe6/0x2e0 [ 1746.244153] ? add_to_page_cache_locked+0x40/0x40 [ 1746.244763] ? __page_cache_alloc+0x10d/0x360 [ 1746.245294] pagecache_get_page+0x38b/0xc80 [ 1746.245919] ? current_time+0x72/0x2c0 [ 1746.246383] grab_cache_page_write_begin+0x64/0xa0 [ 1746.246996] ext4_da_write_begin+0x2f3/0xd40 [ 1746.247516] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1746.248164] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1746.248809] ? ext4_write_begin+0x10f0/0x10f0 [ 1746.249352] ? copyout_mc+0x140/0x140 [ 1746.249822] ? current_time+0x1a3/0x2c0 [ 1746.250300] generic_perform_write+0x20a/0x4f0 [ 1746.250872] ? page_cache_prev_miss+0x310/0x310 [ 1746.251429] ? down_write_killable+0x180/0x180 [ 1746.252004] ext4_buffered_write_iter+0x232/0x4a0 [ 1746.252584] ext4_file_write_iter+0xc11/0x18d0 [ 1746.253168] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1746.253756] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1746.254414] new_sync_write+0x42c/0x660 [ 1746.254897] ? new_sync_read+0x6f0/0x6f0 [ 1746.255402] ? ksys_write+0x12d/0x260 [ 1746.255883] ? lock_release+0x680/0x680 [ 1746.256363] ? selinux_file_permission+0x92/0x520 [ 1746.256964] ? __fget_files+0x296/0x4c0 [ 1746.257450] vfs_write+0x747/0xa70 [ 1746.257895] ksys_write+0x12d/0x260 [ 1746.258323] ? __ia32_sys_read+0xb0/0xb0 [ 1746.258828] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1746.259444] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1746.260075] do_syscall_64+0x33/0x40 [ 1746.260518] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1746.261311] RIP: 0033:0x7f21b1e90b19 [ 1746.261924] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1746.264669] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1746.265731] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1746.266815] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1746.267899] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1746.268987] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1746.270081] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 04:01:14 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e666174000208011c0470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:01:14 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x105b) 04:01:28 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfe2f0000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:01:28 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x605000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:01:28 executing program 5: syslog(0x4, &(0x7f0000000000)=""/4109, 0x100d) syslog(0x3, &(0x7f0000001040)=""/73, 0x49) 04:01:28 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x105c) 04:01:28 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 04:01:29 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 11) 04:01:29 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801660470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:01:29 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 25) 04:01:29 executing program 5: prctl$PR_SET_FPEXC(0xc, 0x0) prctl$PR_SET_FPEXC(0xc, 0x10000) prctl$PR_SET_FPEXC(0xc, 0x40000) prctl$PR_SET_FPEXC(0xc, 0x80) prctl$PR_SET_FPEXC(0xc, 0x20000) [ 1761.127231] FAULT_INJECTION: forcing a failure. [ 1761.127231] name failslab, interval 1, probability 0, space 0, times 0 [ 1761.128166] CPU: 0 PID: 10066 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1761.128678] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1761.129358] Call Trace: [ 1761.129584] dump_stack+0x107/0x167 [ 1761.129886] should_fail.cold+0x5/0xa [ 1761.130204] ? create_object.isra.0+0x3a/0xa20 [ 1761.130576] should_failslab+0x5/0x20 [ 1761.130885] kmem_cache_alloc+0x5b/0x310 [ 1761.131218] create_object.isra.0+0x3a/0xa20 [ 1761.131568] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1761.131970] kmem_cache_alloc+0x159/0x310 [ 1761.132315] xas_alloc+0x336/0x440 [ 1761.132592] xas_create+0x34a/0x10d0 [ 1761.132917] xas_store+0x8c/0x1c40 [ 1761.133220] ? xas_find_conflict+0x4b5/0xa70 [ 1761.133570] __add_to_page_cache_locked+0x708/0xc80 [ 1761.133987] ? file_write_and_wait_range+0x130/0x130 [ 1761.134422] ? memcg_drain_all_list_lrus+0x720/0x720 [ 1761.134844] ? find_get_entry+0x2c8/0x740 [ 1761.135214] ? __kasan_slab_free+0x122/0x160 [ 1761.135570] add_to_page_cache_lru+0xe6/0x2e0 [ 1761.135946] ? add_to_page_cache_locked+0x40/0x40 [ 1761.136333] ? __page_cache_alloc+0x10d/0x360 [ 1761.136677] pagecache_get_page+0x38b/0xc80 [ 1761.137023] ? ext4_expand_extra_isize+0x5a0/0x5a0 [ 1761.137425] grab_cache_page_write_begin+0x64/0xa0 [ 1761.137822] ext4_da_write_begin+0x2f3/0xd40 [ 1761.138182] ? ext4_write_begin+0x10f0/0x10f0 [ 1761.138540] ? copyout_mc+0x140/0x140 [ 1761.138865] ? ext4_dirty_inode+0x107/0x130 [ 1761.139224] ? __mark_inode_dirty+0x12e/0xd40 [ 1761.139582] generic_perform_write+0x20a/0x4f0 [ 1761.139987] ? page_cache_prev_miss+0x310/0x310 [ 1761.140371] ? down_write_killable+0x180/0x180 [ 1761.140750] ext4_buffered_write_iter+0x232/0x4a0 [ 1761.141141] ext4_file_write_iter+0xc11/0x18d0 [ 1761.141538] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1761.141911] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1761.142353] new_sync_write+0x42c/0x660 [ 1761.142665] ? new_sync_read+0x6f0/0x6f0 [ 1761.143008] ? ksys_write+0x12d/0x260 [ 1761.143319] ? lock_release+0x680/0x680 [ 1761.143636] ? selinux_file_permission+0x92/0x520 [ 1761.144030] ? __fget_files+0x296/0x4c0 [ 1761.144358] vfs_write+0x747/0xa70 [ 1761.144678] ksys_write+0x12d/0x260 [ 1761.144981] ? __ia32_sys_read+0xb0/0xb0 [ 1761.145327] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1761.145757] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1761.146172] do_syscall_64+0x33/0x40 [ 1761.146475] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1761.146883] RIP: 0033:0x7f21b1e90b19 [ 1761.147183] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1761.148683] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1761.149297] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1761.149882] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1761.150446] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1761.151058] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1761.151606] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 [ 1761.171411] FAULT_INJECTION: forcing a failure. [ 1761.171411] name failslab, interval 1, probability 0, space 0, times 0 [ 1761.172400] CPU: 0 PID: 10067 Comm: syz-executor.3 Not tainted 5.10.213 #1 [ 1761.172950] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1761.173626] Call Trace: [ 1761.173848] dump_stack+0x107/0x167 [ 1761.174145] should_fail.cold+0x5/0xa [ 1761.174460] ? create_object.isra.0+0x3a/0xa20 [ 1761.174823] should_failslab+0x5/0x20 [ 1761.175135] kmem_cache_alloc+0x5b/0x310 [ 1761.175456] create_object.isra.0+0x3a/0xa20 [ 1761.175810] ? kasan_unpoison_shadow+0x33/0x50 [ 1761.176185] kmalloc_order+0xfe/0x160 [ 1761.176494] kmalloc_order_trace+0x14/0xa0 [ 1761.176840] wiphy_new_nm+0x6f3/0x1e00 [ 1761.177157] ? mac80211_hwsim_new_radio+0x14b/0x4250 [ 1761.177585] ieee80211_alloc_hw_nm+0x37a/0x2320 [ 1761.177968] ? __local_bh_enable_ip+0x9d/0x100 [ 1761.178338] mac80211_hwsim_new_radio+0x1cd/0x4250 [ 1761.178734] ? lock_chain_count+0x20/0x20 [ 1761.179071] ? ___sys_sendmsg+0xf3/0x170 [ 1761.179391] ? __sys_sendmsg+0xe5/0x1b0 [ 1761.179719] ? do_syscall_64+0x33/0x40 [ 1761.180036] ? entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1761.180472] ? hwsim_send_nullfunc_ps+0x80/0x80 [ 1761.180831] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1761.181273] ? trace_hardirqs_on+0x5b/0x180 [ 1761.181639] hwsim_new_radio_nl+0x991/0x1080 [ 1761.181997] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1761.182412] ? trace_hardirqs_on+0x5b/0x180 [ 1761.182783] genl_family_rcv_msg_doit+0x22d/0x330 [ 1761.183176] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1761.183705] ? cap_capable+0x1cd/0x230 [ 1761.184036] ? ns_capable+0xe2/0x110 [ 1761.184346] genl_rcv_msg+0x33c/0x5a0 [ 1761.184657] ? genl_get_cmd+0x480/0x480 [ 1761.184984] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1761.185403] ? lock_release+0x680/0x680 [ 1761.185738] ? netlink_deliver_tap+0xf4/0xcc0 [ 1761.186117] netlink_rcv_skb+0x14b/0x430 [ 1761.186439] ? genl_get_cmd+0x480/0x480 [ 1761.186777] ? netlink_ack+0xab0/0xab0 [ 1761.187121] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1761.187496] ? is_vmalloc_addr+0x7b/0xb0 [ 1761.187823] genl_rcv+0x24/0x40 [ 1761.188091] netlink_unicast+0x549/0x7f0 [ 1761.188423] ? netlink_attachskb+0x870/0x870 [ 1761.188780] netlink_sendmsg+0x90f/0xdf0 [ 1761.189113] ? netlink_unicast+0x7f0/0x7f0 [ 1761.189459] ? netlink_unicast+0x7f0/0x7f0 [ 1761.189813] __sock_sendmsg+0x154/0x190 [ 1761.190143] ____sys_sendmsg+0x70d/0x870 [ 1761.190469] ? sock_write_iter+0x3d0/0x3d0 [ 1761.190797] ? do_recvmmsg+0x6d0/0x6d0 [ 1761.191120] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1761.191559] ? lock_downgrade+0x6d0/0x6d0 [ 1761.191892] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1761.192326] ___sys_sendmsg+0xf3/0x170 [ 1761.192650] ? sendmsg_copy_msghdr+0x160/0x160 [ 1761.193021] ? lock_downgrade+0x6d0/0x6d0 [ 1761.193363] ? find_held_lock+0x2c/0x110 [ 1761.193719] ? __fget_files+0x296/0x4c0 [ 1761.194045] ? __fget_light+0xea/0x290 [ 1761.194367] __sys_sendmsg+0xe5/0x1b0 [ 1761.194683] ? __sys_sendmsg_sock+0x40/0x40 [ 1761.195039] ? rcu_read_lock_any_held+0x75/0xa0 [ 1761.195431] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1761.195861] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1761.196297] ? trace_hardirqs_on+0x5b/0x180 [ 1761.196655] do_syscall_64+0x33/0x40 [ 1761.196957] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1761.197367] RIP: 0033:0x7f482b2f9b19 [ 1761.197690] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1761.199162] RSP: 002b:00007f482886f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1761.199770] RAX: ffffffffffffffda RBX: 00007f482b40cf60 RCX: 00007f482b2f9b19 [ 1761.200350] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1761.200921] RBP: 00007f482886f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1761.201496] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1761.202103] R13: 00007ffef22a59af R14: 00007f482886f300 R15: 0000000000022000 04:01:29 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x105d) 04:01:29 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:01:29 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) syslog(0x2, 0x0, 0x0) 04:01:29 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfeffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:01:29 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000570000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:01:29 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x705000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:01:29 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x2, 0x2, 0x6985) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001080)=ANY=[@ANYBLOB="280000001800210c000000ddfeffffff020000000800fe06000000000000008005000000da000000"], 0x28}}, 0x0) openat2(r2, 0x0, &(0x7f0000000340)={0x52ac0, 0x107, 0x14}, 0x18) getdents64(r2, &(0x7f0000000140)=""/255, 0xff) splice(r0, &(0x7f0000000080)=0x8c, r2, &(0x7f0000000100)=0x993, 0xb0, 0x8) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r0, 0x8040942d, &(0x7f0000000000)) socket$inet_udp(0x2, 0x2, 0x0) syslog(0x3, &(0x7f0000001000)=""/48, 0x30) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000040)) [ 1761.374160] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1761.396175] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 04:01:42 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 04:01:42 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xff0f0000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:01:42 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 12) 04:01:42 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x800000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:01:42 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 26) 04:01:42 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x105e) 04:01:42 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000f70000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:01:42 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) syslog(0x3, &(0x7f0000000000)=""/124, 0x7c) syslog(0x0, 0x0, 0x0) syslog(0x0, &(0x7f0000000080)=""/193, 0xc1) [ 1774.835156] FAULT_INJECTION: forcing a failure. [ 1774.835156] name failslab, interval 1, probability 0, space 0, times 0 [ 1774.836301] CPU: 1 PID: 10107 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1774.836951] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1774.837829] Call Trace: [ 1774.838110] dump_stack+0x107/0x167 [ 1774.838480] should_fail.cold+0x5/0xa [ 1774.838867] ? xas_alloc+0x336/0x440 [ 1774.839279] should_failslab+0x5/0x20 [ 1774.839694] kmem_cache_alloc+0x5b/0x310 [ 1774.840139] xas_alloc+0x336/0x440 [ 1774.840549] xas_create+0x34a/0x10d0 [ 1774.840980] xas_store+0x8c/0x1c40 [ 1774.841391] ? xas_find_conflict+0x4b5/0xa70 [ 1774.841844] __add_to_page_cache_locked+0x708/0xc80 [ 1774.842431] ? file_write_and_wait_range+0x130/0x130 [ 1774.842999] ? memcg_drain_all_list_lrus+0x720/0x720 [ 1774.843575] ? find_get_entry+0x2c8/0x740 [ 1774.844028] ? __kasan_slab_free+0x122/0x160 [ 1774.844522] add_to_page_cache_lru+0xe6/0x2e0 [ 1774.845032] ? add_to_page_cache_locked+0x40/0x40 [ 1774.845503] ? __page_cache_alloc+0x10d/0x360 [ 1774.845996] pagecache_get_page+0x38b/0xc80 [ 1774.846420] ? ext4_expand_extra_isize+0x5a0/0x5a0 [ 1774.846905] grab_cache_page_write_begin+0x64/0xa0 [ 1774.847409] ext4_da_write_begin+0x2f3/0xd40 [ 1774.847875] ? ext4_write_begin+0x10f0/0x10f0 [ 1774.848322] ? copyout_mc+0x140/0x140 [ 1774.848709] ? ext4_dirty_inode+0x107/0x130 [ 1774.849141] ? __mark_inode_dirty+0x12e/0xd40 [ 1774.849610] generic_perform_write+0x20a/0x4f0 [ 1774.850084] ? page_cache_prev_miss+0x310/0x310 [ 1774.850557] ? down_write_killable+0x180/0x180 [ 1774.851021] ext4_buffered_write_iter+0x232/0x4a0 [ 1774.851514] ext4_file_write_iter+0xc11/0x18d0 [ 1774.851977] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1774.852442] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1774.852970] new_sync_write+0x42c/0x660 [ 1774.853363] ? new_sync_read+0x6f0/0x6f0 [ 1774.853780] ? ksys_write+0x12d/0x260 [ 1774.854163] ? lock_release+0x680/0x680 [ 1774.854541] ? selinux_file_permission+0x92/0x520 [ 1774.854999] ? __fget_files+0x296/0x4c0 [ 1774.855409] vfs_write+0x747/0xa70 [ 1774.855782] ksys_write+0x12d/0x260 [ 1774.856141] ? __ia32_sys_read+0xb0/0xb0 [ 1774.856564] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1774.857095] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1774.857627] do_syscall_64+0x33/0x40 [ 1774.858028] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1774.858516] RIP: 0033:0x7f21b1e90b19 [ 1774.858888] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 04:01:42 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801002070000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1774.860656] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1774.861630] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 04:01:42 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) syslog(0x1, &(0x7f0000000000)=""/41, 0x29) syslog(0x1, &(0x7f0000001340)=""/4096, 0x1000) syslog(0x4, &(0x7f0000000040)=""/73, 0x49) syslog(0x4, &(0x7f00000000c0)=""/34, 0x22) [ 1774.862342] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1774.863138] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1774.863846] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1774.864541] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 [ 1774.868490] FAULT_INJECTION: forcing a failure. [ 1774.868490] name failslab, interval 1, probability 0, space 0, times 0 [ 1774.869461] CPU: 0 PID: 10114 Comm: syz-executor.3 Not tainted 5.10.213 #1 [ 1774.870015] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1774.870793] Call Trace: [ 1774.871067] dump_stack+0x107/0x167 [ 1774.871431] should_fail.cold+0x5/0xa [ 1774.871754] should_failslab+0x5/0x20 [ 1774.872050] __kmalloc_track_caller+0x79/0x370 [ 1774.872415] ? kvasprintf_const+0x60/0x1a0 [ 1774.872745] kvasprintf+0xb5/0x150 [ 1774.873028] ? bust_spinlocks+0xe0/0xe0 [ 1774.873337] ? lock_release+0x680/0x680 [ 1774.873652] ? find_held_lock+0x2c/0x110 [ 1774.873986] kvasprintf_const+0x60/0x1a0 [ 1774.874313] kobject_set_name_vargs+0x56/0x150 [ 1774.874670] dev_set_name+0xbb/0xf0 [ 1774.874961] ? device_initialize+0x620/0x620 [ 1774.875335] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1774.875754] ? kmalloc_order+0xfe/0x160 [ 1774.876113] wiphy_new_nm+0x805/0x1e00 [ 1774.876452] ieee80211_alloc_hw_nm+0x37a/0x2320 [ 1774.876946] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1774.877379] ? __local_bh_enable_ip+0x9d/0x100 [ 1774.877794] ? trace_hardirqs_on+0x5b/0x180 [ 1774.878158] mac80211_hwsim_new_radio+0x1cd/0x4250 [ 1774.878576] ? ____sys_sendmsg+0x70d/0x870 [ 1774.878940] ? ___sys_sendmsg+0xf3/0x170 [ 1774.879277] ? __sys_sendmsg+0xe5/0x1b0 [ 1774.879602] ? do_syscall_64+0x33/0x40 [ 1774.879915] ? entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1774.880319] ? lock_acquire+0x197/0x470 [ 1774.880679] ? create_object.isra.0+0x3ad/0xa20 [ 1774.881080] ? hwsim_send_nullfunc_ps+0x80/0x80 [ 1774.881459] ? __kmalloc+0x16e/0x390 [ 1774.881767] hwsim_new_radio_nl+0x991/0x1080 [ 1774.882107] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1774.882516] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 1774.883043] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 1774.883538] genl_family_rcv_msg_doit+0x22d/0x330 [ 1774.883919] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1774.884416] ? cap_capable+0x1cd/0x230 [ 1774.884734] ? ns_capable+0xe2/0x110 [ 1774.885039] genl_rcv_msg+0x33c/0x5a0 [ 1774.885345] ? genl_get_cmd+0x480/0x480 [ 1774.885648] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1774.886075] ? lock_release+0x680/0x680 [ 1774.886379] ? netlink_deliver_tap+0xf4/0xcc0 [ 1774.886722] netlink_rcv_skb+0x14b/0x430 [ 1774.887034] ? genl_get_cmd+0x480/0x480 [ 1774.887359] ? netlink_ack+0xab0/0xab0 [ 1774.887660] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1774.888040] ? is_vmalloc_addr+0x7b/0xb0 [ 1774.888352] genl_rcv+0x24/0x40 [ 1774.888605] netlink_unicast+0x549/0x7f0 [ 1774.888917] ? netlink_attachskb+0x870/0x870 [ 1774.889256] netlink_sendmsg+0x90f/0xdf0 [ 1774.889585] ? netlink_unicast+0x7f0/0x7f0 [ 1774.889929] ? netlink_unicast+0x7f0/0x7f0 [ 1774.890263] __sock_sendmsg+0x154/0x190 [ 1774.890565] ____sys_sendmsg+0x70d/0x870 [ 1774.890888] ? sock_write_iter+0x3d0/0x3d0 [ 1774.891224] ? do_recvmmsg+0x6d0/0x6d0 [ 1774.891521] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1774.891940] ? lock_downgrade+0x6d0/0x6d0 [ 1774.892278] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1774.892694] ___sys_sendmsg+0xf3/0x170 [ 1774.893011] ? sendmsg_copy_msghdr+0x160/0x160 [ 1774.893361] ? lock_downgrade+0x6d0/0x6d0 [ 1774.893709] ? find_held_lock+0x2c/0x110 [ 1774.894028] ? __fget_files+0x296/0x4c0 [ 1774.894348] ? __fget_light+0xea/0x290 [ 1774.894657] __sys_sendmsg+0xe5/0x1b0 [ 1774.894960] ? __sys_sendmsg_sock+0x40/0x40 [ 1774.895311] ? rcu_read_lock_any_held+0x75/0xa0 [ 1774.895688] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1774.896116] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1774.896533] ? trace_hardirqs_on+0x5b/0x180 [ 1774.896876] do_syscall_64+0x33/0x40 [ 1774.897174] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1774.897563] RIP: 0033:0x7f482b2f9b19 [ 1774.897867] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1774.899301] RSP: 002b:00007f482886f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1774.899881] RAX: ffffffffffffffda RBX: 00007f482b40cf60 RCX: 00007f482b2f9b19 [ 1774.900444] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1774.901026] RBP: 00007f482886f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1774.901580] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1774.902152] R13: 00007ffef22a59af R14: 00007f482886f300 R15: 0000000000022000 04:01:42 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x805000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:01:42 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 27) 04:01:42 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 13) [ 1775.013740] FAULT_INJECTION: forcing a failure. [ 1775.013740] name failslab, interval 1, probability 0, space 0, times 0 [ 1775.014697] CPU: 0 PID: 10134 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1775.015251] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1775.015928] Call Trace: [ 1775.016157] dump_stack+0x107/0x167 [ 1775.016468] should_fail.cold+0x5/0xa [ 1775.016782] ? create_object.isra.0+0x3a/0xa20 [ 1775.017189] should_failslab+0x5/0x20 [ 1775.017501] kmem_cache_alloc+0x5b/0x310 [ 1775.017864] create_object.isra.0+0x3a/0xa20 [ 1775.018222] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1775.018641] kmem_cache_alloc+0x159/0x310 [ 1775.018984] xas_alloc+0x336/0x440 [ 1775.019279] xas_create+0x34a/0x10d0 [ 1775.019586] xas_store+0x8c/0x1c40 [ 1775.019878] ? xas_find_conflict+0x4b5/0xa70 [ 1775.020240] __add_to_page_cache_locked+0x708/0xc80 [ 1775.020644] ? file_write_and_wait_range+0x130/0x130 [ 1775.021058] ? memcg_drain_all_list_lrus+0x720/0x720 [ 1775.021477] ? find_get_entry+0x2c8/0x740 [ 1775.021824] ? entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1775.022265] add_to_page_cache_lru+0xe6/0x2e0 [ 1775.022644] ? add_to_page_cache_locked+0x40/0x40 [ 1775.023042] ? __page_cache_alloc+0x10d/0x360 [ 1775.023411] pagecache_get_page+0x38b/0xc80 [ 1775.023756] ? current_time+0x72/0x2c0 [ 1775.024082] grab_cache_page_write_begin+0x64/0xa0 [ 1775.024484] ext4_da_write_begin+0x2f3/0xd40 [ 1775.024839] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1775.025267] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1775.025711] ? ext4_write_begin+0x10f0/0x10f0 [ 1775.026086] ? copyout_mc+0x140/0x140 [ 1775.026399] ? current_time+0x1a3/0x2c0 [ 1775.026720] generic_perform_write+0x20a/0x4f0 [ 1775.027099] ? page_cache_prev_miss+0x310/0x310 [ 1775.027479] ? down_write_killable+0x180/0x180 [ 1775.027851] ext4_buffered_write_iter+0x232/0x4a0 [ 1775.028246] ext4_file_write_iter+0xc11/0x18d0 [ 1775.028624] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1775.028991] ? __lockdep_reset_lock+0x180/0x180 [ 1775.029367] ? __lockdep_reset_lock+0x180/0x180 [ 1775.029757] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1775.030183] new_sync_write+0x42c/0x660 [ 1775.030507] ? new_sync_read+0x6f0/0x6f0 [ 1775.030829] ? ksys_write+0x12d/0x260 [ 1775.031141] ? lock_release+0x680/0x680 [ 1775.031468] ? selinux_file_permission+0x92/0x520 [ 1775.031858] ? __fget_files+0x296/0x4c0 [ 1775.032189] vfs_write+0x747/0xa70 [ 1775.032485] ksys_write+0x12d/0x260 [ 1775.032791] ? __ia32_sys_read+0xb0/0xb0 [ 1775.033147] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1775.033560] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1775.033996] do_syscall_64+0x33/0x40 [ 1775.034290] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1775.034690] RIP: 0033:0x7f21b1e90b19 [ 1775.035016] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1775.036682] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1775.037319] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1775.037890] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1775.038474] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1775.039070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1775.039642] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 04:01:43 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xff2f0000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:01:43 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 28) 04:01:43 executing program 5: ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x4, 0x4, 0x3f, 0x464e, 0x26, @ipv4={'\x00', '\xff\xff', @multicast1}, @remote, 0x1, 0x8000, 0xffff, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f00000001c0)={'ip6_vti0\x00', r0, 0x2f, 0x7f, 0xff, 0x3, 0x50, @remote, @remote, 0x8000, 0x7820, 0x5, 0x6}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000280)={'syztnl2\x00', r1, 0x2f, 0x3, 0x0, 0x7fff, 0x10, @mcast2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x7800, 0x8000, 0x4, 0x2}}) syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001080)=ANY=[@ANYBLOB="280000001800210c000000ddfeffffff020000000800fe06000000000000008005000000da000000"], 0x28}}, 0x0) r4 = openat2(r3, 0x0, &(0x7f0000000340)={0x52ac0, 0x107, 0x14}, 0x18) ioctl$RNDZAPENTCNT(r4, 0x5204, &(0x7f0000000380)=0x7851669e) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r4, 0x89f9, &(0x7f00000013c0)={'ip6gre0\x00', &(0x7f0000001340)={'ip6_vti0\x00', r1, 0x4, 0x8, 0x0, 0x3, 0x0, @dev={0xfe, 0x80, '\x00', 0x2f}, @mcast1, 0x700, 0x8, 0x2, 0x5}}) syslog(0x0, &(0x7f00000000c0)=""/230, 0xe6) [ 1775.136433] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1775.138958] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1775.150825] FAULT_INJECTION: forcing a failure. [ 1775.150825] name failslab, interval 1, probability 0, space 0, times 0 [ 1775.152332] CPU: 1 PID: 10137 Comm: syz-executor.3 Not tainted 5.10.213 #1 [ 1775.153051] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1775.153283] FAULT_INJECTION: forcing a failure. [ 1775.153283] name failslab, interval 1, probability 0, space 0, times 0 [ 1775.153848] Call Trace: [ 1775.153869] dump_stack+0x107/0x167 [ 1775.153890] should_fail.cold+0x5/0xa [ 1775.155762] ? create_object.isra.0+0x3a/0xa20 [ 1775.156251] should_failslab+0x5/0x20 [ 1775.156633] kmem_cache_alloc+0x5b/0x310 [ 1775.157058] ? vsnprintf+0x4ba/0x1600 [ 1775.157446] create_object.isra.0+0x3a/0xa20 [ 1775.157919] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1775.158456] __kmalloc_track_caller+0x177/0x370 [ 1775.158935] ? kvasprintf_const+0x60/0x1a0 [ 1775.159387] kvasprintf+0xb5/0x150 [ 1775.159751] ? bust_spinlocks+0xe0/0xe0 [ 1775.160194] ? lock_release+0x680/0x680 [ 1775.160592] ? find_held_lock+0x2c/0x110 [ 1775.161019] kvasprintf_const+0x60/0x1a0 [ 1775.161434] kobject_set_name_vargs+0x56/0x150 [ 1775.161900] dev_set_name+0xbb/0xf0 [ 1775.162290] ? device_initialize+0x620/0x620 [ 1775.162719] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1775.163290] ? kmalloc_order+0xfe/0x160 [ 1775.163685] wiphy_new_nm+0x805/0x1e00 [ 1775.164116] ieee80211_alloc_hw_nm+0x37a/0x2320 [ 1775.164564] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1775.165133] ? __local_bh_enable_ip+0x9d/0x100 [ 1775.165588] ? trace_hardirqs_on+0x5b/0x180 [ 1775.166066] mac80211_hwsim_new_radio+0x1cd/0x4250 [ 1775.166553] ? ____sys_sendmsg+0x70d/0x870 [ 1775.166983] ? ___sys_sendmsg+0xf3/0x170 [ 1775.167393] ? __sys_sendmsg+0xe5/0x1b0 [ 1775.167789] ? do_syscall_64+0x33/0x40 [ 1775.168200] ? entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1775.168738] ? lock_acquire+0x197/0x470 [ 1775.169192] ? create_object.isra.0+0x3ad/0xa20 [ 1775.169681] ? hwsim_send_nullfunc_ps+0x80/0x80 [ 1775.170173] ? __kmalloc+0x16e/0x390 [ 1775.170557] hwsim_new_radio_nl+0x991/0x1080 [ 1775.171014] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1775.171554] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 1775.172201] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 1775.172845] genl_family_rcv_msg_doit+0x22d/0x330 [ 1775.173344] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1775.174053] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1775.174585] ? cap_capable+0x1cd/0x230 [ 1775.174995] ? ns_capable+0xe2/0x110 [ 1775.175379] genl_rcv_msg+0x33c/0x5a0 [ 1775.175760] ? genl_get_cmd+0x480/0x480 [ 1775.176186] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1775.176703] ? lock_release+0x680/0x680 [ 1775.177138] ? __lockdep_reset_lock+0x180/0x180 [ 1775.177617] netlink_rcv_skb+0x14b/0x430 [ 1775.178060] ? genl_get_cmd+0x480/0x480 [ 1775.178468] ? netlink_ack+0xab0/0xab0 [ 1775.178841] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1775.179334] ? is_vmalloc_addr+0x7b/0xb0 [ 1775.179743] genl_rcv+0x24/0x40 [ 1775.180114] netlink_unicast+0x549/0x7f0 [ 1775.180530] ? netlink_attachskb+0x870/0x870 [ 1775.180999] netlink_sendmsg+0x90f/0xdf0 [ 1775.181419] ? netlink_unicast+0x7f0/0x7f0 [ 1775.181873] ? netlink_unicast+0x7f0/0x7f0 [ 1775.182321] __sock_sendmsg+0x154/0x190 [ 1775.182718] ____sys_sendmsg+0x70d/0x870 [ 1775.183166] ? sock_write_iter+0x3d0/0x3d0 [ 1775.183589] ? do_recvmmsg+0x6d0/0x6d0 [ 1775.184000] ? perf_trace_lock+0xac/0x490 [ 1775.184426] ? __lockdep_reset_lock+0x180/0x180 [ 1775.184893] ? perf_trace_lock+0xac/0x490 [ 1775.185342] ___sys_sendmsg+0xf3/0x170 [ 1775.185744] ? sendmsg_copy_msghdr+0x160/0x160 [ 1775.186237] ? lock_downgrade+0x6d0/0x6d0 [ 1775.186650] ? find_held_lock+0x2c/0x110 [ 1775.187097] ? __fget_files+0x296/0x4c0 [ 1775.187507] ? __fget_light+0xea/0x290 [ 1775.187901] __sys_sendmsg+0xe5/0x1b0 [ 1775.188305] ? __sys_sendmsg_sock+0x40/0x40 [ 1775.188726] ? rcu_read_lock_any_held+0x75/0xa0 [ 1775.189245] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1775.189780] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1775.190323] ? trace_hardirqs_on+0x5b/0x180 [ 1775.190764] do_syscall_64+0x33/0x40 [ 1775.191149] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1775.191644] RIP: 0033:0x7f482b2f9b19 [ 1775.192030] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1775.193801] RSP: 002b:00007f482886f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1775.194570] RAX: ffffffffffffffda RBX: 00007f482b40cf60 RCX: 00007f482b2f9b19 [ 1775.195281] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1775.195978] RBP: 00007f482886f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1775.196694] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1775.197437] R13: 00007ffef22a59af R14: 00007f482886f300 R15: 0000000000022000 [ 1775.198194] CPU: 0 PID: 10147 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1775.198826] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1775.199514] Call Trace: [ 1775.199739] dump_stack+0x107/0x167 [ 1775.200066] should_fail.cold+0x5/0xa [ 1775.200393] ? jbd2__journal_start+0x190/0x7e0 [ 1775.200786] should_failslab+0x5/0x20 [ 1775.201129] kmem_cache_alloc+0x5b/0x310 [ 1775.201473] jbd2__journal_start+0x190/0x7e0 [ 1775.201853] __ext4_journal_start_sb+0x214/0x390 [ 1775.202282] ext4_da_write_begin+0x51f/0xd40 [ 1775.202661] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1775.203107] ? ext4_write_begin+0x10f0/0x10f0 [ 1775.203465] ? copyout_mc+0x140/0x140 [ 1775.203477] ? current_time+0x1a3/0x2c0 [ 1775.203497] generic_perform_write+0x20a/0x4f0 [ 1775.204609] ? page_cache_prev_miss+0x310/0x310 [ 1775.205005] ? down_write_killable+0x180/0x180 [ 1775.205409] ext4_buffered_write_iter+0x232/0x4a0 [ 1775.205808] ext4_file_write_iter+0xc11/0x18d0 [ 1775.206223] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1775.206593] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1775.207049] new_sync_write+0x42c/0x660 [ 1775.207372] ? new_sync_read+0x6f0/0x6f0 [ 1775.207698] ? ksys_write+0x12d/0x260 [ 1775.208023] ? lock_release+0x680/0x680 [ 1775.208354] ? selinux_file_permission+0x92/0x520 [ 1775.208738] ? __fget_files+0x296/0x4c0 [ 1775.209091] vfs_write+0x747/0xa70 [ 1775.209382] ksys_write+0x12d/0x260 [ 1775.209692] ? __ia32_sys_read+0xb0/0xb0 [ 1775.210041] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1775.210468] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1775.210886] do_syscall_64+0x33/0x40 [ 1775.211204] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1775.211611] RIP: 0033:0x7f21b1e90b19 [ 1775.211919] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1775.213385] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1775.214028] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1775.214589] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1775.215203] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1775.215768] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1775.216366] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 [ 1788.878580] FAULT_INJECTION: forcing a failure. [ 1788.878580] name failslab, interval 1, probability 0, space 0, times 0 [ 1788.880104] CPU: 0 PID: 10165 Comm: syz-executor.3 Not tainted 5.10.213 #1 [ 1788.880771] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1788.881576] Call Trace: [ 1788.881864] dump_stack+0x107/0x167 [ 1788.882240] should_fail.cold+0x5/0xa [ 1788.882627] ? rfkill_alloc+0xa6/0x2c0 [ 1788.883065] should_failslab+0x5/0x20 [ 1788.883479] __kmalloc+0x72/0x390 [ 1788.883834] rfkill_alloc+0xa6/0x2c0 [ 1788.884226] wiphy_new_nm+0x12a3/0x1e00 [ 1788.885794] ieee80211_alloc_hw_nm+0x37a/0x2320 [ 1788.886293] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1788.886815] ? __local_bh_enable_ip+0x9d/0x100 [ 1788.887301] ? trace_hardirqs_on+0x5b/0x180 [ 1788.887757] mac80211_hwsim_new_radio+0x1cd/0x4250 [ 1788.887966] FAULT_INJECTION: forcing a failure. [ 1788.887966] name failslab, interval 1, probability 0, space 0, times 0 [ 1788.888268] ? ____sys_sendmsg+0x70d/0x870 [ 1788.888288] ? ___sys_sendmsg+0xf3/0x170 [ 1788.890064] ? __sys_sendmsg+0xe5/0x1b0 [ 1788.890486] ? do_syscall_64+0x33/0x40 [ 1788.890879] ? entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1788.891440] ? __lockdep_reset_lock+0x180/0x180 [ 1788.891905] ? lock_acquire+0x197/0x470 [ 1788.892323] ? create_object.isra.0+0x3ad/0xa20 [ 1788.892794] ? hwsim_send_nullfunc_ps+0x80/0x80 [ 1788.893281] ? __kmalloc+0x16e/0x390 [ 1788.893659] hwsim_new_radio_nl+0x991/0x1080 [ 1788.894139] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1788.894670] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 1788.895354] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 1788.896003] genl_family_rcv_msg_doit+0x22d/0x330 [ 1788.896514] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1788.897168] ? cap_capable+0x1cd/0x230 [ 1788.897590] ? ns_capable+0xe2/0x110 [ 1788.898006] genl_rcv_msg+0x33c/0x5a0 [ 1788.898412] ? genl_get_cmd+0x480/0x480 [ 1788.898832] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1788.899374] ? lock_release+0x680/0x680 [ 1788.899789] ? __lockdep_reset_lock+0x180/0x180 [ 1788.900274] netlink_rcv_skb+0x14b/0x430 [ 1788.900697] ? genl_get_cmd+0x480/0x480 [ 1788.901113] ? netlink_ack+0xab0/0xab0 [ 1788.901531] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1788.902020] ? is_vmalloc_addr+0x7b/0xb0 [ 1788.902451] genl_rcv+0x24/0x40 [ 1788.902796] netlink_unicast+0x549/0x7f0 [ 1788.903210] ? netlink_attachskb+0x870/0x870 [ 1788.903680] netlink_sendmsg+0x90f/0xdf0 [ 1788.904097] ? netlink_unicast+0x7f0/0x7f0 [ 1788.904552] ? netlink_unicast+0x7f0/0x7f0 [ 1788.904978] __sock_sendmsg+0x154/0x190 [ 1788.905398] ____sys_sendmsg+0x70d/0x870 [ 1788.905809] ? sock_write_iter+0x3d0/0x3d0 [ 1788.906257] ? do_recvmmsg+0x6d0/0x6d0 [ 1788.906646] ? perf_trace_lock+0xac/0x490 [ 1788.907069] ? __lockdep_reset_lock+0x180/0x180 [ 1788.907532] ? perf_trace_lock+0xac/0x490 [ 1788.907952] ___sys_sendmsg+0xf3/0x170 [ 1788.908348] ? sendmsg_copy_msghdr+0x160/0x160 [ 1788.908809] ? lock_downgrade+0x6d0/0x6d0 [ 1788.909234] ? find_held_lock+0x2c/0x110 [ 1788.909654] ? __fget_files+0x296/0x4c0 [ 1788.910077] ? __fget_light+0xea/0x290 [ 1788.910478] __sys_sendmsg+0xe5/0x1b0 [ 1788.910861] ? __sys_sendmsg_sock+0x40/0x40 [ 1788.911300] ? rcu_read_lock_any_held+0x75/0xa0 [ 1788.911783] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1788.912306] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1788.912816] ? trace_hardirqs_on+0x5b/0x180 [ 1788.913252] do_syscall_64+0x33/0x40 [ 1788.913626] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1788.914143] RIP: 0033:0x7f482b2f9b19 [ 1788.914520] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1788.916318] RSP: 002b:00007f482886f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1788.917059] RAX: ffffffffffffffda RBX: 00007f482b40cf60 RCX: 00007f482b2f9b19 [ 1788.917769] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1788.918490] RBP: 00007f482886f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1788.919188] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1788.919895] R13: 00007ffef22a59af R14: 00007f482886f300 R15: 0000000000022000 [ 1788.920643] CPU: 1 PID: 10171 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1788.921289] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1788.921975] Call Trace: [ 1788.922208] dump_stack+0x107/0x167 [ 1788.922505] should_fail.cold+0x5/0xa [ 1788.922816] ? create_object.isra.0+0x3a/0xa20 [ 1788.923204] should_failslab+0x5/0x20 [ 1788.923510] kmem_cache_alloc+0x5b/0x310 [ 1788.923855] create_object.isra.0+0x3a/0xa20 [ 1788.924242] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1788.924684] kmem_cache_alloc+0x159/0x310 [ 1788.925220] xas_alloc+0x336/0x440 04:01:56 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x105f) 04:01:56 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 14) 04:01:56 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801004070000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:01:56 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 29) 04:01:56 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x900000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:01:56 executing program 5: syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x5, 0x4000, @fd_index=0x5, 0x8001, 0x0, 0x0, 0x1, 0x0, {0x8}}, 0x5) r0 = open$dir(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) lseek(r0, 0x0, 0x3) fsetxattr$trusted_overlay_upper(r0, 0x0, 0x0, 0x0, 0x3) execveat(r0, &(0x7f0000000100)='./file0\x00', &(0x7f0000002340)=[&(0x7f0000000140)='+y,@[\x82-\x00', &(0x7f0000000180)='@/\x00', &(0x7f0000000300)='\x00'], &(0x7f00000024c0)=[&(0x7f0000002380)='\x00', &(0x7f00000023c0)='\x00', &(0x7f0000002400)='{\x00', &(0x7f0000002440)='\x00', &(0x7f0000002480)='/\x00'], 0x1000) syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) syslog(0xa, &(0x7f0000000200)=""/31, 0x1f) syslog(0x1, &(0x7f0000000000)=""/179, 0xb3) syslog(0x3, &(0x7f0000000240)=""/138, 0x8a) syslog(0x4, &(0x7f00000000c0)=""/58, 0x3a) syslog(0x1, &(0x7f0000001340)=""/4096, 0x1000) r1 = fspick(0xffffffffffffffff, &(0x7f0000002500)='./file2\x00', 0x1) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000002540)={0x1f, 0x0, 0x3, 0x1f, 0x3}) 04:01:56 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfffdffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:01:56 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x5, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) [ 1788.925530] xas_create+0x34a/0x10d0 [ 1788.925972] xas_store+0x8c/0x1c40 [ 1788.926286] ? xas_find_conflict+0x4b5/0xa70 [ 1788.926660] __add_to_page_cache_locked+0x708/0xc80 [ 1788.927071] ? file_write_and_wait_range+0x130/0x130 [ 1788.927473] ? memcg_drain_all_list_lrus+0x720/0x720 [ 1788.927881] ? find_get_entry+0x2c8/0x740 [ 1788.928219] ? __kasan_slab_free+0x122/0x160 [ 1788.928570] add_to_page_cache_lru+0xe6/0x2e0 [ 1788.928962] ? add_to_page_cache_locked+0x40/0x40 [ 1788.929401] ? __page_cache_alloc+0x10d/0x360 [ 1788.929772] pagecache_get_page+0x38b/0xc80 [ 1788.930137] ? ext4_expand_extra_isize+0x5a0/0x5a0 [ 1788.930565] grab_cache_page_write_begin+0x64/0xa0 [ 1788.930959] ext4_da_write_begin+0x2f3/0xd40 [ 1788.931317] ? ext4_write_begin+0x10f0/0x10f0 [ 1788.931666] ? copyout_mc+0x140/0x140 [ 1788.931977] ? ext4_dirty_inode+0x107/0x130 [ 1788.932326] ? __mark_inode_dirty+0x12e/0xd40 [ 1788.932690] generic_perform_write+0x20a/0x4f0 [ 1788.933067] ? page_cache_prev_miss+0x310/0x310 [ 1788.933439] ? down_write_killable+0x180/0x180 [ 1788.933815] ext4_buffered_write_iter+0x232/0x4a0 [ 1788.934225] ext4_file_write_iter+0xc11/0x18d0 [ 1788.934599] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1788.934976] ? __lockdep_reset_lock+0x180/0x180 [ 1788.935339] ? __lockdep_reset_lock+0x180/0x180 [ 1788.935707] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1788.936139] new_sync_write+0x42c/0x660 [ 1788.936458] ? new_sync_read+0x6f0/0x6f0 [ 1788.936779] ? ksys_write+0x12d/0x260 [ 1788.937102] ? lock_release+0x680/0x680 [ 1788.937417] ? selinux_file_permission+0x92/0x520 [ 1788.937819] ? __fget_files+0x296/0x4c0 [ 1788.938170] vfs_write+0x747/0xa70 [ 1788.938474] ksys_write+0x12d/0x260 [ 1788.938766] ? __ia32_sys_read+0xb0/0xb0 [ 1788.939111] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1788.939528] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1788.939963] do_syscall_64+0x33/0x40 [ 1788.940275] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1788.940699] RIP: 0033:0x7f21b1e90b19 [ 1788.941009] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1788.942524] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1788.943152] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1788.943733] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1788.944321] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1788.944905] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1788.945489] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 04:01:56 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xffff1f00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:01:57 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1060) 04:01:57 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 30) 04:01:57 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 15) 04:01:57 executing program 5: syslog(0x1, &(0x7f0000000000)=""/4111, 0x100f) syslog(0x0, &(0x7f0000001040)=""/43, 0x2b) [ 1789.136328] FAULT_INJECTION: forcing a failure. [ 1789.136328] name failslab, interval 1, probability 0, space 0, times 0 [ 1789.137764] CPU: 0 PID: 10194 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1789.138509] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1789.139314] Call Trace: [ 1789.139594] dump_stack+0x107/0x167 [ 1789.139982] should_fail.cold+0x5/0xa [ 1789.140391] ? jbd2__journal_start+0x190/0x7e0 [ 1789.140856] should_failslab+0x5/0x20 [ 1789.141267] kmem_cache_alloc+0x5b/0x310 [ 1789.141717] jbd2__journal_start+0x190/0x7e0 [ 1789.142137] FAULT_INJECTION: forcing a failure. [ 1789.142137] name failslab, interval 1, probability 0, space 0, times 0 [ 1789.142213] __ext4_journal_start_sb+0x214/0x390 [ 1789.143619] ext4_da_write_begin+0x51f/0xd40 [ 1789.144108] ? ext4_write_begin+0x10f0/0x10f0 [ 1789.144558] ? copyout_mc+0x140/0x140 [ 1789.144956] ? ext4_dirty_inode+0x107/0x130 [ 1789.145407] ? __mark_inode_dirty+0x12e/0xd40 [ 1789.145866] generic_perform_write+0x20a/0x4f0 [ 1789.146362] ? page_cache_prev_miss+0x310/0x310 [ 1789.146840] ? down_write_killable+0x180/0x180 [ 1789.147311] ext4_buffered_write_iter+0x232/0x4a0 [ 1789.147802] ext4_file_write_iter+0xc11/0x18d0 [ 1789.148304] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1789.148760] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1789.149305] new_sync_write+0x42c/0x660 [ 1789.149698] ? new_sync_read+0x6f0/0x6f0 [ 1789.150136] ? ksys_write+0x12d/0x260 [ 1789.150520] ? lock_release+0x680/0x680 [ 1789.150930] ? selinux_file_permission+0x92/0x520 [ 1789.151414] ? __fget_files+0x296/0x4c0 [ 1789.151823] vfs_write+0x747/0xa70 [ 1789.152195] ksys_write+0x12d/0x260 [ 1789.152563] ? __ia32_sys_read+0xb0/0xb0 [ 1789.152984] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1789.153516] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1789.154043] do_syscall_64+0x33/0x40 [ 1789.154418] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1789.154913] RIP: 0033:0x7f21b1e90b19 [ 1789.155306] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1789.157129] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1789.157871] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1789.158574] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1789.159303] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1789.160023] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1789.160730] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 [ 1789.161487] CPU: 1 PID: 10192 Comm: syz-executor.3 Not tainted 5.10.213 #1 [ 1789.162180] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1789.162838] Call Trace: [ 1789.163067] dump_stack+0x107/0x167 [ 1789.163363] should_fail.cold+0x5/0xa [ 1789.163678] ? create_object.isra.0+0x3a/0xa20 [ 1789.164130] should_failslab+0x5/0x20 [ 1789.164440] kmem_cache_alloc+0x5b/0x310 [ 1789.164838] create_object.isra.0+0x3a/0xa20 [ 1789.165193] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1789.165689] __kmalloc+0x16e/0x390 [ 1789.166028] rfkill_alloc+0xa6/0x2c0 [ 1789.166392] wiphy_new_nm+0x12a3/0x1e00 [ 1789.166730] ieee80211_alloc_hw_nm+0x37a/0x2320 [ 1789.167194] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1789.167650] ? __local_bh_enable_ip+0x9d/0x100 [ 1789.168093] ? trace_hardirqs_on+0x5b/0x180 [ 1789.168478] mac80211_hwsim_new_radio+0x1cd/0x4250 [ 1789.168937] ? ____sys_sendmsg+0x70d/0x870 [ 1789.169285] ? ___sys_sendmsg+0xf3/0x170 [ 1789.169611] ? __sys_sendmsg+0xe5/0x1b0 [ 1789.169957] ? do_syscall_64+0x33/0x40 [ 1789.170258] ? entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1789.170670] ? hwsim_send_nullfunc_ps+0x80/0x80 [ 1789.171028] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1789.171438] ? trace_hardirqs_on+0x5b/0x180 [ 1789.171776] hwsim_new_radio_nl+0x991/0x1080 [ 1789.172143] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1789.172567] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 1789.173094] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 1789.173612] genl_family_rcv_msg_doit+0x22d/0x330 [ 1789.174019] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1789.174539] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1789.174976] ? cap_capable+0x1cd/0x230 [ 1789.175300] ? ns_capable+0xe2/0x110 [ 1789.175606] genl_rcv_msg+0x33c/0x5a0 [ 1789.175915] ? genl_get_cmd+0x480/0x480 [ 1789.176245] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1789.176697] ? lock_release+0x680/0x680 [ 1789.177087] ? __lockdep_reset_lock+0x180/0x180 [ 1789.177493] netlink_rcv_skb+0x14b/0x430 [ 1789.177907] ? genl_get_cmd+0x480/0x480 [ 1789.178311] ? netlink_ack+0xab0/0xab0 [ 1789.178645] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1789.179107] ? is_vmalloc_addr+0x7b/0xb0 [ 1789.179511] genl_rcv+0x24/0x40 [ 1789.179808] netlink_unicast+0x549/0x7f0 [ 1789.180168] ? netlink_attachskb+0x870/0x870 [ 1789.180530] netlink_sendmsg+0x90f/0xdf0 [ 1789.180935] ? netlink_unicast+0x7f0/0x7f0 [ 1789.181284] ? netlink_unicast+0x7f0/0x7f0 [ 1789.181703] __sock_sendmsg+0x154/0x190 [ 1789.182034] ____sys_sendmsg+0x70d/0x870 [ 1789.182430] ? sock_write_iter+0x3d0/0x3d0 [ 1789.182789] ? do_recvmmsg+0x6d0/0x6d0 [ 1789.183166] ? perf_trace_lock+0xac/0x490 [ 1789.183584] ? __lockdep_reset_lock+0x180/0x180 [ 1789.183984] ? perf_trace_lock+0xac/0x490 [ 1789.184399] ___sys_sendmsg+0xf3/0x170 [ 1789.184717] ? sendmsg_copy_msghdr+0x160/0x160 [ 1789.185177] ? lock_downgrade+0x6d0/0x6d0 [ 1789.185538] ? find_held_lock+0x2c/0x110 [ 1789.185956] ? __fget_files+0x296/0x4c0 [ 1789.186323] ? __fget_light+0xea/0x290 [ 1789.186716] __sys_sendmsg+0xe5/0x1b0 [ 1789.187024] ? __sys_sendmsg_sock+0x40/0x40 [ 1789.187448] ? rcu_read_lock_any_held+0x75/0xa0 [ 1789.187865] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1789.188377] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1789.188802] ? trace_hardirqs_on+0x5b/0x180 [ 1789.189243] do_syscall_64+0x33/0x40 [ 1789.189545] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1789.190057] RIP: 0033:0x7f482b2f9b19 [ 1789.190386] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1789.191849] RSP: 002b:00007f482886f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1789.192482] RAX: ffffffffffffffda RBX: 00007f482b40cf60 RCX: 00007f482b2f9b19 [ 1789.193122] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1789.193712] RBP: 00007f482886f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1789.194321] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1789.194877] R13: 00007ffef22a59af R14: 00007f482886f300 R15: 0000000000022000 04:01:57 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x900010000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:01:57 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000570000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:01:57 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1061) 04:02:10 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) syslog(0x3, 0x0, 0x0) 04:02:10 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000f70000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:02:10 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfffffdf9, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:02:10 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xa00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:02:10 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x6, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 04:02:10 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 16) 04:02:10 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1062) 04:02:10 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 31) [ 1802.724641] FAULT_INJECTION: forcing a failure. [ 1802.724641] name failslab, interval 1, probability 0, space 0, times 0 [ 1802.726906] CPU: 1 PID: 10232 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1802.728252] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1802.729854] Call Trace: [ 1802.730398] dump_stack+0x107/0x167 [ 1802.731126] should_fail.cold+0x5/0xa [ 1802.731879] ? create_object.isra.0+0x3a/0xa20 [ 1802.732783] should_failslab+0x5/0x20 [ 1802.733535] kmem_cache_alloc+0x5b/0x310 [ 1802.734351] ? lru_cache_add+0x45c/0x800 [ 1802.735161] create_object.isra.0+0x3a/0xa20 [ 1802.736023] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1802.737027] kmem_cache_alloc+0x159/0x310 [ 1802.737858] jbd2__journal_start+0x190/0x7e0 [ 1802.738756] __ext4_journal_start_sb+0x214/0x390 [ 1802.739710] ext4_da_write_begin+0x51f/0xd40 [ 1802.740609] ? ext4_write_begin+0x10f0/0x10f0 [ 1802.741489] ? copyout_mc+0x140/0x140 [ 1802.742265] ? ext4_dirty_inode+0x107/0x130 [ 1802.743116] ? __mark_inode_dirty+0x12e/0xd40 [ 1802.744004] generic_perform_write+0x20a/0x4f0 [ 1802.744927] ? page_cache_prev_miss+0x310/0x310 [ 1802.745851] ? down_write_killable+0x180/0x180 [ 1802.746787] ext4_buffered_write_iter+0x232/0x4a0 [ 1802.747751] ext4_file_write_iter+0xc11/0x18d0 [ 1802.748685] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1802.749603] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1802.750665] new_sync_write+0x42c/0x660 [ 1802.751461] ? new_sync_read+0x6f0/0x6f0 [ 1802.752272] ? ksys_write+0x12d/0x260 [ 1802.753036] ? lock_release+0x680/0x680 [ 1802.753821] ? selinux_file_permission+0x92/0x520 [ 1802.754797] ? __fget_files+0x296/0x4c0 [ 1802.755613] vfs_write+0x747/0xa70 [ 1802.756341] ksys_write+0x12d/0x260 [ 1802.757069] ? __ia32_sys_read+0xb0/0xb0 [ 1802.757879] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1802.758925] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1802.759951] do_syscall_64+0x33/0x40 [ 1802.760688] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1802.761696] RIP: 0033:0x7f21b1e90b19 [ 1802.762448] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1802.766015] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1802.767513] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1802.768906] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1802.770258] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1802.771368] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1802.772474] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 04:02:10 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xa00010000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:02:10 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) syslog(0x0, &(0x7f0000000000)=""/102, 0x66) syslog(0x4, 0x0, 0x0) syslog(0x1, 0x0, 0x0) syslog(0x3, &(0x7f0000000080)=""/194, 0xc2) syslog(0x3, &(0x7f0000000180)=""/206, 0xce) syslog(0x4, 0x0, 0x0) syslog(0x3, &(0x7f0000000280)=""/45, 0x2d) 04:02:10 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1063) [ 1802.899456] FAULT_INJECTION: forcing a failure. [ 1802.899456] name failslab, interval 1, probability 0, space 0, times 0 [ 1802.900942] CPU: 0 PID: 10224 Comm: syz-executor.3 Not tainted 5.10.213 #1 [ 1802.901463] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1802.902136] Call Trace: [ 1802.902343] dump_stack+0x107/0x167 [ 1802.902644] should_fail.cold+0x5/0xa [ 1802.902940] ? kvmalloc_node+0x119/0x170 [ 1802.903270] should_failslab+0x5/0x20 [ 1802.903564] __kmalloc_node+0x76/0x420 [ 1802.903882] kvmalloc_node+0x119/0x170 [ 1802.904183] bucket_table_alloc.isra.0+0x88/0x490 [ 1802.904567] rhashtable_init+0x341/0x760 [ 1802.904885] rhltable_init+0x1c/0x60 [ 1802.905189] sta_info_init+0x1f/0x110 [ 1802.905483] ieee80211_alloc_hw_nm+0x6a0/0x2320 [ 1802.905860] ? trace_hardirqs_on+0x5b/0x180 [ 1802.906201] mac80211_hwsim_new_radio+0x1cd/0x4250 [ 1802.906607] ? insn_get_prefixes.part.0+0xec1/0x1110 [ 1802.907002] ? hwsim_send_nullfunc_ps+0x80/0x80 [ 1802.907374] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1802.907785] ? trace_hardirqs_on+0x5b/0x180 [ 1802.908135] hwsim_new_radio_nl+0x991/0x1080 [ 1802.908469] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1802.908886] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 1802.911476] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 1802.912002] genl_family_rcv_msg_doit+0x22d/0x330 [ 1802.912370] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1802.912905] ? selinux_capable+0x45/0x70 [ 1802.913217] ? cap_capable+0x1cd/0x230 [ 1802.913538] ? ns_capable+0xe2/0x110 [ 1802.913828] genl_rcv_msg+0x33c/0x5a0 [ 1802.914153] ? genl_get_cmd+0x480/0x480 [ 1802.914450] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1802.914866] ? lock_release+0x680/0x680 [ 1802.915172] ? netlink_deliver_tap+0xf4/0xcc0 [ 1802.915536] netlink_rcv_skb+0x14b/0x430 [ 1802.915845] ? genl_get_cmd+0x480/0x480 [ 1802.916170] ? netlink_ack+0xab0/0xab0 [ 1802.916469] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1802.916831] ? is_vmalloc_addr+0x7b/0xb0 [ 1802.917145] genl_rcv+0x24/0x40 [ 1802.917412] netlink_unicast+0x549/0x7f0 [ 1802.917725] ? netlink_attachskb+0x870/0x870 [ 1802.918097] netlink_sendmsg+0x90f/0xdf0 [ 1802.918421] ? netlink_unicast+0x7f0/0x7f0 [ 1802.918777] ? netlink_unicast+0x7f0/0x7f0 [ 1802.919107] __sock_sendmsg+0x154/0x190 [ 1802.919441] ____sys_sendmsg+0x70d/0x870 [ 1802.919758] ? sock_write_iter+0x3d0/0x3d0 [ 1802.920099] ? do_recvmmsg+0x6d0/0x6d0 [ 1802.920405] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1802.920836] ? lock_downgrade+0x6d0/0x6d0 [ 1802.921164] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1802.921596] ___sys_sendmsg+0xf3/0x170 [ 1802.921903] ? sendmsg_copy_msghdr+0x160/0x160 [ 1802.922288] ? lock_downgrade+0x6d0/0x6d0 [ 1802.922609] ? find_held_lock+0x2c/0x110 [ 1802.922944] ? __fget_files+0x296/0x4c0 [ 1802.923256] ? __fget_light+0xea/0x290 [ 1802.923572] __sys_sendmsg+0xe5/0x1b0 [ 1802.923865] ? __sys_sendmsg_sock+0x40/0x40 [ 1802.924210] ? rcu_read_lock_any_held+0x75/0xa0 [ 1802.924576] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1802.924993] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1802.928311] ? trace_hardirqs_on+0x5b/0x180 [ 1802.928664] do_syscall_64+0x33/0x40 [ 1802.928951] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1802.929358] RIP: 0033:0x7f482b2f9b19 [ 1802.929645] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1802.931106] RSP: 002b:00007f482886f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1802.931680] RAX: ffffffffffffffda RBX: 00007f482b40cf60 RCX: 00007f482b2f9b19 [ 1802.932248] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1802.932833] RBP: 00007f482886f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1802.933394] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1802.933955] R13: 00007ffef22a59af R14: 00007f482886f300 R15: 0000000000022000 04:02:10 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470020000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:02:10 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfffffdfc, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:02:10 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:02:11 executing program 5: ioctl$BTRFS_IOC_SEND(0xffffffffffffffff, 0x40489426, &(0x7f0000000040)={{}, 0x7, &(0x7f0000000000)=[0x1000, 0x8, 0x6, 0x1, 0x0, 0x7, 0x401], 0xe5db, 0x1, [0x2, 0x800, 0x4, 0x1]}) 04:02:11 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1064) 04:02:11 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470030000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:02:11 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 32) 04:02:11 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 17) 04:02:11 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) [ 1803.235588] FAULT_INJECTION: forcing a failure. [ 1803.235588] name failslab, interval 1, probability 0, space 0, times 0 [ 1803.236948] CPU: 0 PID: 10268 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1803.237552] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1803.238352] Call Trace: [ 1803.238593] dump_stack+0x107/0x167 [ 1803.238948] should_fail.cold+0x5/0xa [ 1803.239297] ? create_object.isra.0+0x3a/0xa20 [ 1803.239736] should_failslab+0x5/0x20 [ 1803.240088] kmem_cache_alloc+0x5b/0x310 [ 1803.240485] create_object.isra.0+0x3a/0xa20 [ 1803.240873] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1803.241375] kmem_cache_alloc+0x159/0x310 [ 1803.241747] alloc_buffer_head+0x20/0x110 [ 1803.242164] alloc_page_buffers+0x14d/0x700 [ 1803.242551] create_empty_buffers+0x2c/0x640 [ 1803.242974] ? start_this_handle+0xfdd/0x1390 [ 1803.243373] ? start_this_handle+0xd57/0x1390 [ 1803.243804] create_page_buffers+0x1bb/0x230 [ 1803.244209] __block_write_begin_int+0x1d1/0x19c0 [ 1803.244671] ? ext4_da_release_space+0x480/0x480 [ 1803.245102] ? kmem_cache_alloc+0x2a6/0x310 [ 1803.245521] ? remove_inode_buffers+0x300/0x300 [ 1803.245931] ? jbd2__journal_start+0xf3/0x7e0 [ 1803.246391] ext4_da_write_begin+0x37d/0xd40 [ 1803.246789] ? ext4_write_begin+0x10f0/0x10f0 [ 1803.247227] ? copyout_mc+0x140/0x140 [ 1803.247567] ? ext4_dirty_inode+0x107/0x130 [ 1803.247989] ? __mark_inode_dirty+0x12e/0xd40 [ 1803.248393] generic_perform_write+0x20a/0x4f0 [ 1803.248838] ? page_cache_prev_miss+0x310/0x310 [ 1803.249304] ? down_write_killable+0x180/0x180 [ 1803.249748] ext4_buffered_write_iter+0x232/0x4a0 [ 1803.250202] ext4_file_write_iter+0xc11/0x18d0 [ 1803.250651] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1803.251107] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1803.251577] new_sync_write+0x42c/0x660 [ 1803.251937] ? new_sync_read+0x6f0/0x6f0 [ 1803.252336] ? ksys_write+0x12d/0x260 [ 1803.252683] ? lock_release+0x680/0x680 [ 1803.253078] ? selinux_file_permission+0x92/0x520 [ 1803.253544] ? __fget_files+0x296/0x4c0 [ 1803.253939] vfs_write+0x747/0xa70 [ 1803.254301] ksys_write+0x12d/0x260 [ 1803.254650] ? __ia32_sys_read+0xb0/0xb0 [ 1803.255053] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1803.255555] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1803.256058] do_syscall_64+0x33/0x40 [ 1803.256413] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1803.256899] RIP: 0033:0x7f21b1e90b19 [ 1803.257272] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1803.258977] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1803.259698] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1803.260364] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1803.261047] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1803.261714] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1803.262407] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 [ 1803.350840] FAULT_INJECTION: forcing a failure. [ 1803.350840] name failslab, interval 1, probability 0, space 0, times 0 [ 1803.352616] CPU: 1 PID: 10271 Comm: syz-executor.3 Not tainted 5.10.213 #1 [ 1803.353469] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1803.354630] Call Trace: [ 1803.355043] dump_stack+0x107/0x167 [ 1803.355607] should_fail.cold+0x5/0xa [ 1803.356198] ? create_object.isra.0+0x3a/0xa20 [ 1803.356910] should_failslab+0x5/0x20 [ 1803.357501] kmem_cache_alloc+0x5b/0x310 [ 1803.358135] create_object.isra.0+0x3a/0xa20 [ 1803.358820] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1803.359553] __kmalloc_node+0x1ae/0x420 [ 1803.360018] kvmalloc_node+0x119/0x170 [ 1803.360499] bucket_table_alloc.isra.0+0x88/0x490 [ 1803.361096] rhashtable_init+0x341/0x760 [ 1803.361625] rhltable_init+0x1c/0x60 [ 1803.362164] sta_info_init+0x1f/0x110 [ 1803.362680] ieee80211_alloc_hw_nm+0x6a0/0x2320 [ 1803.363304] ? trace_hardirqs_on+0x5b/0x180 [ 1803.363897] mac80211_hwsim_new_radio+0x1cd/0x4250 [ 1803.364525] ? ____sys_sendmsg+0x70d/0x870 [ 1803.365070] ? ___sys_sendmsg+0xf3/0x170 [ 1803.365589] ? __sys_sendmsg+0xe5/0x1b0 [ 1803.366119] ? do_syscall_64+0x33/0x40 [ 1803.366611] ? entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1803.367279] ? lock_acquire+0x197/0x470 [ 1803.367789] ? create_object.isra.0+0x3ad/0xa20 [ 1803.368430] ? hwsim_send_nullfunc_ps+0x80/0x80 [ 1803.369059] ? __kmalloc+0x16e/0x390 [ 1803.369584] hwsim_new_radio_nl+0x991/0x1080 [ 1803.370191] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1803.370870] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 1803.371714] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 1803.372539] genl_family_rcv_msg_doit+0x22d/0x330 [ 1803.373146] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1803.374087] ? cap_capable+0x1cd/0x230 [ 1803.374700] ? ns_capable+0xe2/0x110 [ 1803.375290] genl_rcv_msg+0x33c/0x5a0 [ 1803.375841] ? genl_get_cmd+0x480/0x480 [ 1803.376429] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1803.377311] ? lock_release+0x680/0x680 [ 1803.377908] ? __lockdep_reset_lock+0x180/0x180 [ 1803.378635] netlink_rcv_skb+0x14b/0x430 [ 1803.379270] ? genl_get_cmd+0x480/0x480 [ 1803.379903] ? netlink_ack+0xab0/0xab0 [ 1803.380517] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1803.381228] ? is_vmalloc_addr+0x7b/0xb0 [ 1803.381697] genl_rcv+0x24/0x40 [ 1803.382066] netlink_unicast+0x549/0x7f0 [ 1803.382509] ? netlink_attachskb+0x870/0x870 [ 1803.382992] netlink_sendmsg+0x90f/0xdf0 [ 1803.383466] ? netlink_unicast+0x7f0/0x7f0 [ 1803.383961] ? netlink_unicast+0x7f0/0x7f0 [ 1803.384451] __sock_sendmsg+0x154/0x190 [ 1803.384910] ____sys_sendmsg+0x70d/0x870 [ 1803.385380] ? sock_write_iter+0x3d0/0x3d0 [ 1803.385866] ? do_recvmmsg+0x6d0/0x6d0 [ 1803.386325] ? perf_trace_lock+0xac/0x490 [ 1803.386812] ? __lockdep_reset_lock+0x180/0x180 [ 1803.387343] ? perf_trace_lock+0xac/0x490 [ 1803.387827] ___sys_sendmsg+0xf3/0x170 [ 1803.388279] ? sendmsg_copy_msghdr+0x160/0x160 [ 1803.388809] ? lock_downgrade+0x6d0/0x6d0 [ 1803.389290] ? find_held_lock+0x2c/0x110 [ 1803.389763] ? __fget_files+0x296/0x4c0 [ 1803.390239] ? __fget_light+0xea/0x290 [ 1803.390692] __sys_sendmsg+0xe5/0x1b0 [ 1803.391154] ? __sys_sendmsg_sock+0x40/0x40 [ 1803.391642] ? rcu_read_lock_any_held+0x75/0xa0 [ 1803.392190] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1803.392787] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1803.393368] ? trace_hardirqs_on+0x5b/0x180 [ 1803.393873] do_syscall_64+0x33/0x40 [ 1803.394314] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1803.394900] RIP: 0033:0x7f482b2f9b19 [ 1803.395328] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1803.397414] RSP: 002b:00007f482886f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1803.398301] RAX: ffffffffffffffda RBX: 00007f482b40cf60 RCX: 00007f482b2f9b19 [ 1803.399109] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1803.399907] RBP: 00007f482886f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1803.400732] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1803.401540] R13: 00007ffef22a59af R14: 00007f482886f300 R15: 0000000000022000 04:02:27 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 18) 04:02:27 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x8, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 04:02:27 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfffffdfd, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:02:27 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470040000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:02:27 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xd00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:02:27 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000)={[0xec1b]}, 0x8, 0x81000) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3c000001", @ANYRES16=0x0, @ANYBLOB="00012cbd7000fbdbdf250600000008003400f7ffffff0800320003000000080034000100010008003c009c00000005003500cd000000"], 0x3c}, 0x1, 0x0, 0x0, 0x141}, 0x0) ftruncate(r0, 0x400) syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) 04:02:27 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1065) 04:02:27 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 33) [ 1819.444886] FAULT_INJECTION: forcing a failure. [ 1819.444886] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1819.446011] CPU: 1 PID: 10300 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1819.446653] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1819.447382] Call Trace: [ 1819.447632] dump_stack+0x107/0x167 [ 1819.447959] should_fail.cold+0x5/0xa [ 1819.448305] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 1819.448788] ? current_time+0x1a3/0x2c0 [ 1819.449156] generic_perform_write+0x279/0x4f0 [ 1819.449583] ? page_cache_prev_miss+0x310/0x310 [ 1819.450000] ? down_write_killable+0x180/0x180 [ 1819.450437] ext4_buffered_write_iter+0x232/0x4a0 [ 1819.450873] ext4_file_write_iter+0xc11/0x18d0 [ 1819.451305] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1819.451714] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1819.452199] new_sync_write+0x42c/0x660 [ 1819.452554] ? new_sync_read+0x6f0/0x6f0 [ 1819.452929] ? ksys_write+0x12d/0x260 [ 1819.453274] ? lock_release+0x680/0x680 [ 1819.453639] ? selinux_file_permission+0x92/0x520 [ 1819.454073] ? __fget_files+0x296/0x4c0 [ 1819.454462] vfs_write+0x747/0xa70 [ 1819.454785] ksys_write+0x12d/0x260 [ 1819.455125] ? __ia32_sys_read+0xb0/0xb0 [ 1819.455490] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1819.455966] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1819.456426] do_syscall_64+0x33/0x40 [ 1819.456768] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1819.457220] RIP: 0033:0x7f21b1e90b19 [ 1819.457565] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1819.459170] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1819.459864] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1819.460506] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1819.461154] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1819.461787] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1819.462440] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 04:02:27 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 34) 04:02:27 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xf00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:02:27 executing program 5: syslog(0x9, &(0x7f0000000340)=""/4096, 0xb2f) syslog(0x0, &(0x7f0000000000)=""/158, 0x9e) [ 1819.546746] FAULT_INJECTION: forcing a failure. [ 1819.546746] name failslab, interval 1, probability 0, space 0, times 0 [ 1819.548323] CPU: 0 PID: 10310 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1819.549001] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1819.549821] Call Trace: [ 1819.550104] dump_stack+0x107/0x167 [ 1819.550492] should_fail.cold+0x5/0xa [ 1819.550885] ? create_object.isra.0+0x3a/0xa20 [ 1819.551364] should_failslab+0x5/0x20 [ 1819.551756] kmem_cache_alloc+0x5b/0x310 [ 1819.552176] create_object.isra.0+0x3a/0xa20 [ 1819.552635] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1819.553168] kmem_cache_alloc+0x159/0x310 [ 1819.553607] __es_insert_extent+0xed1/0x1370 [ 1819.554066] ? do_raw_read_unlock+0x70/0x70 [ 1819.554474] ext4_es_insert_delayed_block+0x30d/0x6d0 [ 1819.555005] ? ext4_is_pending+0x210/0x210 [ 1819.555455] ? ext4_has_free_clusters+0x294/0x570 [ 1819.555943] ? percpu_counter_add_batch+0x8b/0x140 [ 1819.556459] ? do_raw_spin_unlock+0x4f/0x220 [ 1819.556906] ? _raw_spin_unlock+0x1a/0x30 [ 1819.557339] ? ext4_da_reserve_space+0xf8/0x3c0 [ 1819.557834] ext4_da_get_block_prep+0xd9c/0x11a0 [ 1819.558353] ? ext4_da_release_space+0x480/0x480 [ 1819.558854] ? lock_downgrade+0x6d0/0x6d0 [ 1819.559280] ? create_empty_buffers+0x4a3/0x640 [ 1819.559769] ? do_raw_spin_unlock+0x4f/0x220 [ 1819.560233] ? create_page_buffers+0x139/0x230 [ 1819.560715] __block_write_begin_int+0x3d1/0x19c0 [ 1819.561221] ? ext4_da_release_space+0x480/0x480 [ 1819.561731] ? remove_inode_buffers+0x300/0x300 [ 1819.562220] ? jbd2__journal_start+0xf3/0x7e0 [ 1819.562701] ext4_da_write_begin+0x37d/0xd40 [ 1819.563173] ? ext4_write_begin+0x10f0/0x10f0 [ 1819.563632] ? copyout_mc+0x140/0x140 [ 1819.564028] ? ext4_dirty_inode+0x107/0x130 [ 1819.564479] ? __mark_inode_dirty+0x12e/0xd40 [ 1819.564947] generic_perform_write+0x20a/0x4f0 [ 1819.565431] ? page_cache_prev_miss+0x310/0x310 [ 1819.565907] ? down_write_killable+0x180/0x180 [ 1819.566409] ext4_buffered_write_iter+0x232/0x4a0 [ 1819.566913] ext4_file_write_iter+0xc11/0x18d0 [ 1819.567413] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1819.567897] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1819.568454] new_sync_write+0x42c/0x660 [ 1819.568884] ? new_sync_read+0x6f0/0x6f0 [ 1819.569309] ? ksys_write+0x12d/0x260 [ 1819.569714] ? lock_release+0x680/0x680 [ 1819.570128] ? selinux_file_permission+0x92/0x520 [ 1819.570650] ? __fget_files+0x296/0x4c0 [ 1819.571084] vfs_write+0x747/0xa70 [ 1819.571454] ksys_write+0x12d/0x260 [ 1819.571832] ? __ia32_sys_read+0xb0/0xb0 [ 1819.572250] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1819.572787] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1819.573205] FAULT_INJECTION: forcing a failure. [ 1819.573205] name failslab, interval 1, probability 0, space 0, times 0 [ 1819.573310] do_syscall_64+0x33/0x40 [ 1819.574719] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1819.575227] RIP: 0033:0x7f21b1e90b19 [ 1819.575585] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1819.577340] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1819.578087] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1819.578771] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1819.579464] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1819.580155] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1819.580824] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 [ 1819.581537] CPU: 1 PID: 10286 Comm: syz-executor.3 Not tainted 5.10.213 #1 [ 1819.582267] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1819.583097] Call Trace: [ 1819.583369] dump_stack+0x107/0x167 [ 1819.583744] should_fail.cold+0x5/0xa [ 1819.584149] should_failslab+0x5/0x20 [ 1819.584544] __kmalloc_track_caller+0x79/0x370 [ 1819.585015] ? kasprintf+0xbb/0xf0 [ 1819.585390] kvasprintf+0xb5/0x150 [ 1819.585760] ? bust_spinlocks+0xe0/0xe0 [ 1819.586176] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1819.586730] ? get_random_u32+0x3cb/0x670 [ 1819.587153] kasprintf+0xbb/0xf0 [ 1819.587499] ? kvasprintf_const+0x1a0/0x1a0 [ 1819.587946] ? lockdep_init_map_type+0x2c7/0x780 [ 1819.588422] ? lockdep_init_map_type+0x2c7/0x780 [ 1819.588912] ieee80211_alloc_led_names+0x82/0x420 [ 1819.589406] ieee80211_alloc_hw_nm+0x1b51/0x2320 [ 1819.589896] ? trace_hardirqs_on+0x5b/0x180 [ 1819.590362] mac80211_hwsim_new_radio+0x1cd/0x4250 [ 1819.590871] ? lock_chain_count+0x20/0x20 [ 1819.591300] ? ___sys_sendmsg+0xf3/0x170 [ 1819.591720] ? __sys_sendmsg+0xe5/0x1b0 [ 1819.592135] ? do_syscall_64+0x33/0x40 [ 1819.592533] ? entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1819.593082] ? lock_acquire+0x197/0x470 [ 1819.593491] ? create_object.isra.0+0x3ad/0xa20 [ 1819.593976] ? hwsim_send_nullfunc_ps+0x80/0x80 [ 1819.594482] ? __kmalloc+0x16e/0x390 [ 1819.594873] hwsim_new_radio_nl+0x991/0x1080 [ 1819.595329] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1819.595853] ? trace_hardirqs_on+0x5b/0x180 [ 1819.596309] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1819.596848] genl_family_rcv_msg_doit+0x22d/0x330 [ 1819.597340] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 04:02:27 executing program 5: syslog(0x1, &(0x7f0000000000)=""/4089, 0xff9) [ 1819.598003] ? cap_capable+0x1cd/0x230 [ 1819.598619] ? ns_capable+0xe2/0x110 [ 1819.598989] genl_rcv_msg+0x33c/0x5a0 [ 1819.599369] ? genl_get_cmd+0x480/0x480 [ 1819.599761] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1819.600274] ? lock_release+0x680/0x680 [ 1819.600671] ? __lockdep_reset_lock+0x180/0x180 [ 1819.601133] netlink_rcv_skb+0x14b/0x430 04:02:27 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfffffdff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1819.601538] ? genl_get_cmd+0x480/0x480 [ 1819.605237] ? netlink_ack+0xab0/0xab0 [ 1819.605652] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1819.606110] ? is_vmalloc_addr+0x7b/0xb0 [ 1819.606532] genl_rcv+0x24/0x40 [ 1819.606861] netlink_unicast+0x549/0x7f0 [ 1819.607272] ? netlink_attachskb+0x870/0x870 [ 1819.607702] netlink_sendmsg+0x90f/0xdf0 [ 1819.608109] ? netlink_unicast+0x7f0/0x7f0 [ 1819.608537] ? netlink_unicast+0x7f0/0x7f0 [ 1819.608944] __sock_sendmsg+0x154/0x190 [ 1819.609345] ____sys_sendmsg+0x70d/0x870 [ 1819.609735] ? sock_write_iter+0x3d0/0x3d0 [ 1819.610157] ? do_recvmmsg+0x6d0/0x6d0 [ 1819.610546] ? perf_trace_lock+0xac/0x490 [ 1819.610963] ? __lockdep_reset_lock+0x180/0x180 [ 1819.611422] ? perf_trace_lock+0xac/0x490 [ 1819.611823] ___sys_sendmsg+0xf3/0x170 [ 1819.612213] ? sendmsg_copy_msghdr+0x160/0x160 [ 1819.612667] ? lock_downgrade+0x6d0/0x6d0 [ 1819.613062] ? find_held_lock+0x2c/0x110 [ 1819.613472] ? __fget_files+0x296/0x4c0 [ 1819.613877] ? __fget_light+0xea/0x290 [ 1819.614283] __sys_sendmsg+0xe5/0x1b0 [ 1819.614663] ? __sys_sendmsg_sock+0x40/0x40 [ 1819.615093] ? rcu_read_lock_any_held+0x75/0xa0 [ 1819.615574] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1819.616096] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1819.616605] ? trace_hardirqs_on+0x5b/0x180 [ 1819.617045] do_syscall_64+0x33/0x40 [ 1819.617419] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1819.617917] RIP: 0033:0x7f482b2f9b19 [ 1819.618298] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1819.620118] RSP: 002b:00007f482886f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1819.620919] RAX: ffffffffffffffda RBX: 00007f482b40cf60 RCX: 00007f482b2f9b19 [ 1819.621663] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1819.622390] RBP: 00007f482886f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1819.623113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1819.623849] R13: 00007ffef22a59af R14: 00007f482886f300 R15: 0000000000022000 04:02:27 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1100000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:02:27 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) syslog(0x1, 0x0, 0x0) 04:02:42 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 35) 04:02:42 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 19) 04:02:42 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x9, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 04:02:42 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470050000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1834.447569] FAULT_INJECTION: forcing a failure. [ 1834.447569] name failslab, interval 1, probability 0, space 0, times 0 [ 1834.449288] CPU: 0 PID: 10332 Comm: syz-executor.3 Not tainted 5.10.213 #1 [ 1834.449944] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1834.450733] Call Trace: [ 1834.450998] dump_stack+0x107/0x167 [ 1834.451350] should_fail.cold+0x5/0xa [ 1834.451718] ? create_object.isra.0+0x3a/0xa20 [ 1834.452163] should_failslab+0x5/0x20 [ 1834.452526] kmem_cache_alloc+0x5b/0x310 [ 1834.452916] ? vsnprintf+0x4ba/0x1600 [ 1834.453289] create_object.isra.0+0x3a/0xa20 [ 1834.453714] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1834.454201] __kmalloc_track_caller+0x177/0x370 [ 1834.454650] ? kasprintf+0xbb/0xf0 [ 1834.454997] kvasprintf+0xb5/0x150 [ 1834.455336] ? bust_spinlocks+0xe0/0xe0 [ 1834.455714] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1834.456216] ? get_random_u32+0x3cb/0x670 [ 1834.456620] kasprintf+0xbb/0xf0 [ 1834.456950] ? kvasprintf_const+0x1a0/0x1a0 [ 1834.457365] ? lockdep_init_map_type+0x2c7/0x780 [ 1834.457821] ? lockdep_init_map_type+0x2c7/0x780 [ 1834.458286] ieee80211_alloc_led_names+0x82/0x420 04:02:42 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1066) 04:02:42 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xffffff7f, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:02:42 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1201000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1834.458759] ieee80211_alloc_hw_nm+0x1b51/0x2320 [ 1834.459320] ? trace_hardirqs_on+0x5b/0x180 [ 1834.459731] mac80211_hwsim_new_radio+0x1cd/0x4250 [ 1834.460191] ? ____sys_sendmsg+0x70d/0x870 [ 1834.460588] ? ___sys_sendmsg+0xf3/0x170 [ 1834.460974] ? __sys_sendmsg+0xe5/0x1b0 [ 1834.461349] ? do_syscall_64+0x33/0x40 [ 1834.461715] ? entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1834.462211] ? lock_acquire+0x197/0x470 [ 1834.462601] ? create_object.isra.0+0x3ad/0xa20 [ 1834.463062] ? hwsim_send_nullfunc_ps+0x80/0x80 [ 1834.463523] ? __kmalloc+0x16e/0x390 [ 1834.463903] hwsim_new_radio_nl+0x991/0x1080 [ 1834.464335] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1834.464838] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 1834.465484] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 1834.466105] genl_family_rcv_msg_doit+0x22d/0x330 [ 1834.466590] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1834.467215] ? cap_capable+0x1cd/0x230 [ 1834.467611] ? ns_capable+0xe2/0x110 [ 1834.467971] genl_rcv_msg+0x33c/0x5a0 [ 1834.468347] ? genl_get_cmd+0x480/0x480 [ 1834.468727] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1834.469240] ? lock_release+0x680/0x680 [ 1834.469634] ? netlink_deliver_tap+0xf4/0xcc0 [ 1834.470065] netlink_rcv_skb+0x14b/0x430 [ 1834.470474] ? genl_get_cmd+0x480/0x480 [ 1834.470859] ? netlink_ack+0xab0/0xab0 [ 1834.471257] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1834.471711] ? is_vmalloc_addr+0x7b/0xb0 [ 1834.472111] genl_rcv+0x24/0x40 [ 1834.472440] netlink_unicast+0x549/0x7f0 [ 1834.472835] ? netlink_attachskb+0x870/0x870 [ 1834.473280] netlink_sendmsg+0x90f/0xdf0 [ 1834.473685] ? netlink_unicast+0x7f0/0x7f0 [ 1834.474147] ? netlink_unicast+0x7f0/0x7f0 [ 1834.474580] __sock_sendmsg+0x154/0x190 [ 1834.475012] ____sys_sendmsg+0x70d/0x870 [ 1834.475403] ? sock_write_iter+0x3d0/0x3d0 [ 1834.475834] ? do_recvmmsg+0x6d0/0x6d0 [ 1834.476208] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1834.476730] ? lock_downgrade+0x6d0/0x6d0 [ 1834.477131] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1834.477652] ___sys_sendmsg+0xf3/0x170 [ 1834.478035] ? sendmsg_copy_msghdr+0x160/0x160 [ 1834.478500] ? lock_downgrade+0x6d0/0x6d0 [ 1834.478902] ? find_held_lock+0x2c/0x110 [ 1834.479313] ? __fget_files+0x296/0x4c0 [ 1834.479703] ? __fget_light+0xea/0x290 [ 1834.480090] __sys_sendmsg+0xe5/0x1b0 [ 1834.480452] ? __sys_sendmsg_sock+0x40/0x40 [ 1834.480884] ? rcu_read_lock_any_held+0x75/0xa0 [ 1834.481365] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1834.481867] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1834.482380] ? trace_hardirqs_on+0x5b/0x180 [ 1834.482801] do_syscall_64+0x33/0x40 [ 1834.483173] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1834.483658] RIP: 0033:0x7f482b2f9b19 [ 1834.484027] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1834.485724] RSP: 002b:00007f482886f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1834.486489] RAX: ffffffffffffffda RBX: 00007f482b40cf60 RCX: 00007f482b2f9b19 [ 1834.487190] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1834.487891] RBP: 00007f482886f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1834.488584] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1834.489286] R13: 00007ffef22a59af R14: 00007f482886f300 R15: 0000000000022000 04:02:42 executing program 5: sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0xd8, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, [@ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5, 0x6, 0x1}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5, 0x6, 0x1}, @ETHTOOL_A_EEE_MODES_OURS={0xac, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xa5, 0x4, "95d60515f43d965b8e005bea9955b52339360be9a0482740f328a1a7800c72dfa64fcdebe2f56f40c967b959f4e9ff8a3ccde33c4b644a29c8814ba94fd408d2916363d9f70e81fcc7f689dc9fe0fa20c5afb73a7ecd1bce615b1fce7f578790270189ccf19d86a35a062fce2ccbe6481d250f9a22832cc38ea9f5d296c8a906521ab2a283a8d6c021f9b1351a090adadb1f1b10d1dc34983ee3a23755394d53be"}]}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5}]}, 0xd8}, 0x1, 0x0, 0x0, 0x44000}, 0x4000010) syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) syslog(0xa, 0x0, 0x0) [ 1834.524438] FAULT_INJECTION: forcing a failure. [ 1834.524438] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1834.525767] CPU: 1 PID: 10341 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1834.526549] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1834.527411] Call Trace: [ 1834.527721] dump_stack+0x107/0x167 [ 1834.528149] should_fail.cold+0x5/0xa [ 1834.528567] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 1834.529184] ? ext4_dirty_inode+0x107/0x130 [ 1834.529661] ? __mark_inode_dirty+0x12e/0xd40 [ 1834.530163] generic_perform_write+0x279/0x4f0 [ 1834.530674] ? page_cache_prev_miss+0x310/0x310 [ 1834.531184] ? down_write_killable+0x180/0x180 [ 1834.531662] ext4_buffered_write_iter+0x232/0x4a0 [ 1834.532208] ext4_file_write_iter+0xc11/0x18d0 [ 1834.532744] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1834.533234] ? __lockdep_reset_lock+0x180/0x180 [ 1834.533740] ? __lockdep_reset_lock+0x180/0x180 [ 1834.534255] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1834.534813] new_sync_write+0x42c/0x660 [ 1834.535253] ? new_sync_read+0x6f0/0x6f0 [ 1834.535675] ? ksys_write+0x12d/0x260 [ 1834.536105] ? lock_release+0x680/0x680 [ 1834.536513] ? selinux_file_permission+0x92/0x520 [ 1834.537036] ? __fget_files+0x296/0x4c0 [ 1834.537452] vfs_write+0x747/0xa70 [ 1834.537826] ksys_write+0x12d/0x260 [ 1834.538199] ? __ia32_sys_read+0xb0/0xb0 [ 1834.538630] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1834.539160] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1834.539715] do_syscall_64+0x33/0x40 [ 1834.540114] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1834.540633] RIP: 0033:0x7f21b1e90b19 [ 1834.541044] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1834.542899] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1834.543675] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1834.544426] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1834.545168] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1834.545880] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1834.546617] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 04:02:42 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 20) 04:02:42 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1600000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:02:42 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1067) 04:02:42 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 36) [ 1834.821174] FAULT_INJECTION: forcing a failure. [ 1834.821174] name failslab, interval 1, probability 0, space 0, times 0 [ 1834.822722] CPU: 1 PID: 10362 Comm: syz-executor.3 Not tainted 5.10.213 #1 [ 1834.823410] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1834.824225] Call Trace: [ 1834.824489] dump_stack+0x107/0x167 [ 1834.824866] should_fail.cold+0x5/0xa [ 1834.825263] ? create_object.isra.0+0x3a/0xa20 [ 1834.825734] should_failslab+0x5/0x20 [ 1834.826132] kmem_cache_alloc+0x5b/0x310 [ 1834.826561] ? vsnprintf+0x4ba/0x1600 [ 1834.826954] create_object.isra.0+0x3a/0xa20 [ 1834.827397] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1834.827926] __kmalloc_track_caller+0x177/0x370 [ 1834.828386] ? kasprintf+0xbb/0xf0 [ 1834.828748] kvasprintf+0xb5/0x150 [ 1834.829113] ? bust_spinlocks+0xe0/0xe0 [ 1834.829535] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1834.830096] ? get_random_u32+0x3cb/0x670 [ 1834.830553] kasprintf+0xbb/0xf0 [ 1834.830910] ? kvasprintf_const+0x1a0/0x1a0 [ 1834.831357] ? lockdep_init_map_type+0x2c7/0x780 [ 1834.831840] ? lockdep_init_map_type+0x2c7/0x780 [ 1834.832323] ieee80211_alloc_led_names+0x82/0x420 [ 1834.832811] ieee80211_alloc_hw_nm+0x1b51/0x2320 [ 1834.833293] ? trace_hardirqs_on+0x5b/0x180 [ 1834.833735] mac80211_hwsim_new_radio+0x1cd/0x4250 [ 1834.834231] ? ____sys_sendmsg+0x70d/0x870 [ 1834.834656] ? ___sys_sendmsg+0xf3/0x170 [ 1834.835060] ? __sys_sendmsg+0xe5/0x1b0 [ 1834.835456] ? do_syscall_64+0x33/0x40 [ 1834.835864] ? entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1834.836391] ? lock_acquire+0x197/0x470 [ 1834.836824] ? create_object.isra.0+0x3ad/0xa20 [ 1834.837302] ? hwsim_send_nullfunc_ps+0x80/0x80 [ 1834.837794] ? __kmalloc+0x16e/0x390 [ 1834.838191] hwsim_new_radio_nl+0x991/0x1080 [ 1834.838666] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1834.839208] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 1834.839875] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 1834.840537] genl_family_rcv_msg_doit+0x22d/0x330 [ 1834.841037] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1834.841699] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1834.842234] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1834.842806] ? genl_rcv_msg+0x4d7/0x5a0 [ 1834.843219] genl_rcv_msg+0x33c/0x5a0 [ 1834.843617] ? genl_get_cmd+0x480/0x480 [ 1834.844041] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1834.844555] ? lock_release+0x680/0x680 [ 1834.844963] ? netlink_deliver_tap+0xf4/0xcc0 [ 1834.845421] netlink_rcv_skb+0x14b/0x430 [ 1834.845829] ? genl_get_cmd+0x480/0x480 [ 1834.846236] ? netlink_ack+0xab0/0xab0 [ 1834.846656] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1834.847125] ? is_vmalloc_addr+0x7b/0xb0 [ 1834.847539] genl_rcv+0x24/0x40 [ 1834.847874] netlink_unicast+0x549/0x7f0 [ 1834.848296] ? netlink_attachskb+0x870/0x870 [ 1834.848750] netlink_sendmsg+0x90f/0xdf0 [ 1834.849168] ? netlink_unicast+0x7f0/0x7f0 [ 1834.849610] ? netlink_unicast+0x7f0/0x7f0 [ 1834.850060] __sock_sendmsg+0x154/0x190 [ 1834.850479] ____sys_sendmsg+0x70d/0x870 [ 1834.850903] ? sock_write_iter+0x3d0/0x3d0 [ 1834.851326] ? do_recvmmsg+0x6d0/0x6d0 [ 1834.851725] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1834.852248] ? lock_downgrade+0x6d0/0x6d0 [ 1834.852671] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1834.853213] ___sys_sendmsg+0xf3/0x170 [ 1834.853621] ? sendmsg_copy_msghdr+0x160/0x160 [ 1834.854091] ? lock_downgrade+0x6d0/0x6d0 [ 1834.854537] ? find_held_lock+0x2c/0x110 [ 1834.854971] ? __fget_files+0x296/0x4c0 [ 1834.855384] ? __fget_light+0xea/0x290 [ 1834.855788] __sys_sendmsg+0xe5/0x1b0 [ 1834.856182] ? __sys_sendmsg_sock+0x40/0x40 [ 1834.856617] ? rcu_read_lock_any_held+0x75/0xa0 [ 1834.857117] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1834.857637] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1834.858161] ? trace_hardirqs_on+0x5b/0x180 [ 1834.858608] do_syscall_64+0x33/0x40 [ 1834.859000] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1834.859512] RIP: 0033:0x7f482b2f9b19 [ 1834.859909] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1834.861686] RSP: 002b:00007f482886f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1834.862461] RAX: ffffffffffffffda RBX: 00007f482b40cf60 RCX: 00007f482b2f9b19 [ 1834.863173] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1834.863872] RBP: 00007f482886f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1834.864569] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1834.865283] R13: 00007ffef22a59af R14: 00007f482886f300 R15: 0000000000022000 [ 1834.910464] FAULT_INJECTION: forcing a failure. [ 1834.910464] name failslab, interval 1, probability 0, space 0, times 0 [ 1834.911640] CPU: 0 PID: 10368 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1834.912181] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1834.912819] Call Trace: [ 1834.913032] dump_stack+0x107/0x167 [ 1834.913319] should_fail.cold+0x5/0xa [ 1834.913618] ? ext4_init_io_end+0x23/0x180 [ 1834.913952] should_failslab+0x5/0x20 [ 1834.914249] kmem_cache_alloc+0x5b/0x310 [ 1834.914578] ext4_init_io_end+0x23/0x180 [ 1834.914898] ext4_writepages+0x8ec/0x3350 [ 1834.915236] ? mark_held_locks+0x9e/0xe0 [ 1834.915557] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1834.915964] ? quarantine_put+0x8b/0x1a0 [ 1834.916277] ? trace_hardirqs_on+0x5b/0x180 [ 1834.916617] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1834.917001] ? __kasan_slab_free+0x122/0x160 [ 1834.917346] ? jbd2_journal_stop+0x61f/0xdc0 [ 1834.917694] ? jbd2_journal_stop+0x188/0xdc0 [ 1834.918037] ? balance_dirty_pages_ratelimited+0x43e/0x1ff0 [ 1834.918485] ? __ext4_journal_stop+0x107/0x1f0 [ 1834.918842] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 1834.919222] ? __mark_inode_dirty+0x12e/0xd40 [ 1834.919581] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1834.919963] do_writepages+0xee/0x2a0 [ 1834.920264] ? page_writeback_cpu_online+0x20/0x20 [ 1834.920644] ? ext4_buffered_write_iter+0x26a/0x4a0 [ 1834.921038] ? lock_downgrade+0x6d0/0x6d0 [ 1834.921365] ? generic_perform_write+0x37d/0x4f0 [ 1834.921736] __filemap_fdatawrite_range+0x24b/0x2f0 [ 1834.922128] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1834.922559] filemap_write_and_wait_range+0x65/0x100 [ 1834.922959] ext4_file_write_iter+0xc87/0x18d0 [ 1834.923323] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1834.923680] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1834.924095] new_sync_write+0x42c/0x660 [ 1834.924407] ? new_sync_read+0x6f0/0x6f0 [ 1834.924729] ? ksys_write+0x12d/0x260 [ 1834.925032] ? lock_release+0x680/0x680 [ 1834.925342] ? selinux_file_permission+0x92/0x520 [ 1834.925719] ? __fget_files+0x296/0x4c0 [ 1834.926032] vfs_write+0x747/0xa70 [ 1834.926312] ksys_write+0x12d/0x260 [ 1834.926603] ? __ia32_sys_read+0xb0/0xb0 [ 1834.926926] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1834.927336] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1834.927739] do_syscall_64+0x33/0x40 [ 1834.928025] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1834.928420] RIP: 0033:0x7f21b1e90b19 [ 1834.928709] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1834.930109] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1834.930702] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1834.931251] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1834.931795] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1834.932338] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1834.932880] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 04:02:58 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 04:02:58 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1800000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:02:58 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470060000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:02:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001080)=ANY=[@ANYBLOB="280000001800210c000000ddfeffffff020000000800fe06000000000000008005000000da000000"], 0x28}}, 0x0) openat2(r1, 0x0, &(0x7f0000000340)={0x52ac0, 0x107, 0x14}, 0x18) getdents64(r1, &(0x7f0000000140)=""/255, 0xff) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x810, r1, 0x0) syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) [ 1850.535120] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1850.573068] FAULT_INJECTION: forcing a failure. [ 1850.573068] name failslab, interval 1, probability 0, space 0, times 0 [ 1850.574027] CPU: 1 PID: 10391 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1850.574596] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1850.575285] Call Trace: [ 1850.575512] dump_stack+0x107/0x167 [ 1850.575814] should_fail.cold+0x5/0xa [ 1850.576139] ? create_object.isra.0+0x3a/0xa20 [ 1850.576508] should_failslab+0x5/0x20 [ 1850.576826] kmem_cache_alloc+0x5b/0x310 [ 1850.577167] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1850.577534] create_object.isra.0+0x3a/0xa20 [ 1850.577897] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1850.578310] kmem_cache_alloc+0x159/0x310 [ 1850.578654] ext4_init_io_end+0x23/0x180 [ 1850.578996] ext4_writepages+0x8ec/0x3350 [ 1850.579342] ? mark_held_locks+0x9e/0xe0 [ 1850.579678] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1850.580121] ? quarantine_put+0x8b/0x1a0 [ 1850.580451] ? trace_hardirqs_on+0x5b/0x180 [ 1850.580796] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1850.581204] ? __kasan_slab_free+0x122/0x160 [ 1850.581570] ? jbd2_journal_stop+0x61f/0xdc0 [ 1850.581942] ? jbd2_journal_stop+0x188/0xdc0 [ 1850.582302] ? balance_dirty_pages_ratelimited+0x43e/0x1ff0 [ 1850.582774] ? __ext4_journal_stop+0x107/0x1f0 [ 1850.583154] ? perf_trace_lock+0xac/0x490 [ 1850.583489] ? __mark_inode_dirty+0x12e/0xd40 [ 1850.583868] ? __lockdep_reset_lock+0x180/0x180 [ 1850.584256] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1850.584642] do_writepages+0xee/0x2a0 [ 1850.584965] ? page_writeback_cpu_online+0x20/0x20 [ 1850.585353] ? ext4_buffered_write_iter+0x26a/0x4a0 [ 1850.585754] ? lock_downgrade+0x6d0/0x6d0 [ 1850.586099] ? generic_perform_write+0x37d/0x4f0 [ 1850.586489] __filemap_fdatawrite_range+0x24b/0x2f0 [ 1850.586909] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1850.587354] filemap_write_and_wait_range+0x65/0x100 [ 1850.587765] ext4_file_write_iter+0xc87/0x18d0 [ 1850.588164] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1850.588536] ? __lockdep_reset_lock+0x180/0x180 [ 1850.588922] ? __lockdep_reset_lock+0x180/0x180 [ 1850.589290] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1850.589726] new_sync_write+0x42c/0x660 [ 1850.590055] ? new_sync_read+0x6f0/0x6f0 [ 1850.590382] ? ksys_write+0x12d/0x260 [ 1850.590704] ? lock_release+0x680/0x680 [ 1850.591041] ? selinux_file_permission+0x92/0x520 [ 1850.591440] ? __fget_files+0x296/0x4c0 [ 1850.591771] vfs_write+0x747/0xa70 [ 1850.592081] ksys_write+0x12d/0x260 [ 1850.592376] ? __ia32_sys_read+0xb0/0xb0 [ 1850.592699] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1850.593126] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1850.593549] do_syscall_64+0x33/0x40 [ 1850.593859] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1850.594273] RIP: 0033:0x7f21b1e90b19 [ 1850.594588] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1850.596069] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1850.596663] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1850.597259] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1850.597845] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1850.598427] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1850.599026] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 04:02:58 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xffffff8c, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:02:58 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1068) 04:02:58 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 37) 04:02:58 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 21) [ 1850.649233] FAULT_INJECTION: forcing a failure. [ 1850.649233] name failslab, interval 1, probability 0, space 0, times 0 [ 1850.650255] CPU: 1 PID: 10388 Comm: syz-executor.3 Not tainted 5.10.213 #1 [ 1850.650822] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1850.651499] Call Trace: [ 1850.651722] dump_stack+0x107/0x167 [ 1850.652034] should_fail.cold+0x5/0xa [ 1850.652344] ? create_object.isra.0+0x3a/0xa20 [ 1850.652717] should_failslab+0x5/0x20 [ 1850.653039] kmem_cache_alloc+0x5b/0x310 [ 1850.653370] ? vsnprintf+0x4ba/0x1600 [ 1850.653683] create_object.isra.0+0x3a/0xa20 [ 1850.654058] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1850.654466] __kmalloc_track_caller+0x177/0x370 [ 1850.654854] ? kasprintf+0xbb/0xf0 [ 1850.655149] kvasprintf+0xb5/0x150 [ 1850.655436] ? bust_spinlocks+0xe0/0xe0 [ 1850.655765] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1850.656197] ? get_random_u32+0x3cb/0x670 [ 1850.656530] kasprintf+0xbb/0xf0 [ 1850.656804] ? kvasprintf_const+0x1a0/0x1a0 [ 1850.657163] ? lockdep_init_map_type+0x2c7/0x780 [ 1850.657551] ? lockdep_init_map_type+0x2c7/0x780 [ 1850.657942] ieee80211_alloc_led_names+0x117/0x420 [ 1850.658357] ieee80211_alloc_hw_nm+0x1b51/0x2320 [ 1850.658749] ? trace_hardirqs_on+0x5b/0x180 [ 1850.659108] mac80211_hwsim_new_radio+0x1cd/0x4250 [ 1850.659495] ? mark_held_locks+0x9e/0xe0 [ 1850.659815] ? do_syscall_64+0x33/0x40 [ 1850.660136] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1850.660556] ? __entry_text_end+0x40a4/0x1029a7 [ 1850.660930] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1850.661370] ? hwsim_send_nullfunc_ps+0x80/0x80 [ 1850.661750] hwsim_new_radio_nl+0x991/0x1080 [ 1850.662121] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1850.662533] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 1850.663086] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 1850.663647] genl_family_rcv_msg_doit+0x22d/0x330 [ 1850.664057] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1850.664591] genl_rcv_msg+0x33c/0x5a0 [ 1850.664916] ? genl_get_cmd+0x480/0x480 [ 1850.665259] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1850.665674] ? lock_release+0x680/0x680 [ 1850.666009] ? netlink_deliver_tap+0xf4/0xcc0 [ 1850.666410] netlink_rcv_skb+0x14b/0x430 [ 1850.666746] ? genl_get_cmd+0x480/0x480 [ 1850.667111] ? netlink_ack+0xab0/0xab0 [ 1850.667434] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1850.667799] ? is_vmalloc_addr+0x7b/0xb0 [ 1850.668149] genl_rcv+0x24/0x40 [ 1850.668415] netlink_unicast+0x549/0x7f0 [ 1850.668752] ? netlink_attachskb+0x870/0x870 [ 1850.669122] netlink_sendmsg+0x90f/0xdf0 [ 1850.669471] ? netlink_unicast+0x7f0/0x7f0 [ 1850.669817] ? netlink_unicast+0x7f0/0x7f0 [ 1850.670176] __sock_sendmsg+0x154/0x190 [ 1850.670509] ____sys_sendmsg+0x70d/0x870 [ 1850.670851] ? sock_write_iter+0x3d0/0x3d0 [ 1850.671202] ? do_recvmmsg+0x6d0/0x6d0 [ 1850.671513] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1850.671938] ? lock_downgrade+0x6d0/0x6d0 [ 1850.672286] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1850.672710] ___sys_sendmsg+0xf3/0x170 [ 1850.673044] ? sendmsg_copy_msghdr+0x160/0x160 [ 1850.673420] ? lock_downgrade+0x6d0/0x6d0 [ 1850.673757] ? find_held_lock+0x2c/0x110 [ 1850.674108] ? __fget_files+0x296/0x4c0 [ 1850.674439] ? __fget_light+0xea/0x290 [ 1850.674767] __sys_sendmsg+0xe5/0x1b0 [ 1850.675086] ? __sys_sendmsg_sock+0x40/0x40 [ 1850.675438] ? rcu_read_lock_any_held+0x75/0xa0 [ 1850.675831] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1850.676257] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1850.676675] ? trace_hardirqs_on+0x5b/0x180 [ 1850.677069] do_syscall_64+0x33/0x40 [ 1850.677387] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1850.677802] RIP: 0033:0x7f482b2f9b19 [ 1850.678169] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1850.679876] RSP: 002b:00007f482886f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1850.680568] RAX: ffffffffffffffda RBX: 00007f482b40cf60 RCX: 00007f482b2f9b19 [ 1850.681191] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1850.681840] RBP: 00007f482886f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1850.682489] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1850.683173] R13: 00007ffef22a59af R14: 00007f482886f300 R15: 0000000000022000 04:02:58 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1e30000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:02:58 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfffffff0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:02:58 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 38) 04:02:58 executing program 5: syslog(0x3, &(0x7f0000001340)=""/4083, 0xff3) syslog(0x3, &(0x7f0000000000)=""/108, 0x6c) syslog(0x9, &(0x7f0000000080)=""/203, 0xcb) 04:02:58 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1069) 04:02:58 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x2000000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1850.797595] FAULT_INJECTION: forcing a failure. [ 1850.797595] name failslab, interval 1, probability 0, space 0, times 0 [ 1850.798669] CPU: 0 PID: 10404 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1850.799232] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1850.799885] Call Trace: [ 1850.800106] dump_stack+0x107/0x167 [ 1850.800402] should_fail.cold+0x5/0xa [ 1850.800710] ? ext4_init_io_end+0x23/0x180 [ 1850.801053] should_failslab+0x5/0x20 [ 1850.801361] kmem_cache_alloc+0x5b/0x310 [ 1850.801686] ext4_init_io_end+0x23/0x180 [ 1850.802016] ext4_writepages+0xee9/0x3350 [ 1850.802367] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1850.802811] ? quarantine_put+0x8b/0x1a0 [ 1850.803135] ? trace_hardirqs_on+0x5b/0x180 [ 1850.803487] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1850.803881] ? __kasan_slab_free+0x122/0x160 [ 1850.804238] ? jbd2_journal_stop+0x61f/0xdc0 [ 1850.804598] ? jbd2_journal_stop+0x188/0xdc0 [ 1850.804955] ? balance_dirty_pages_ratelimited+0x43e/0x1ff0 [ 1850.805409] ? __ext4_journal_stop+0x107/0x1f0 [ 1850.805782] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 1850.806178] ? __mark_inode_dirty+0x12e/0xd40 [ 1850.806550] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1850.806960] do_writepages+0xee/0x2a0 [ 1850.807265] ? page_writeback_cpu_online+0x20/0x20 [ 1850.807654] ? ext4_buffered_write_iter+0x26a/0x4a0 [ 1850.808069] ? lock_downgrade+0x6d0/0x6d0 [ 1850.808396] ? generic_perform_write+0x37d/0x4f0 [ 1850.808779] __filemap_fdatawrite_range+0x24b/0x2f0 [ 1850.809174] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1850.809609] filemap_write_and_wait_range+0x65/0x100 [ 1850.810017] ext4_file_write_iter+0xc87/0x18d0 [ 1850.810395] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1850.810773] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1850.811206] new_sync_write+0x42c/0x660 [ 1850.811525] ? new_sync_read+0x6f0/0x6f0 [ 1850.811856] ? ksys_write+0x12d/0x260 [ 1850.812165] ? lock_release+0x680/0x680 [ 1850.812482] ? selinux_file_permission+0x92/0x520 [ 1850.812871] ? __fget_files+0x296/0x4c0 [ 1850.813195] vfs_write+0x747/0xa70 [ 1850.813490] ksys_write+0x12d/0x260 [ 1850.813783] ? __ia32_sys_read+0xb0/0xb0 [ 1850.814112] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1850.814545] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1850.814984] do_syscall_64+0x33/0x40 [ 1850.815285] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1850.815691] RIP: 0033:0x7f21b1e90b19 [ 1850.815997] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1850.817558] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1850.818152] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1850.818704] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1850.819244] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1850.819784] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1850.820326] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 04:02:58 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470070000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:02:58 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 39) [ 1851.018651] FAULT_INJECTION: forcing a failure. [ 1851.018651] name failslab, interval 1, probability 0, space 0, times 0 [ 1851.019569] CPU: 1 PID: 10423 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1851.020127] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1851.020766] Call Trace: [ 1851.020978] dump_stack+0x107/0x167 [ 1851.021270] should_fail.cold+0x5/0xa [ 1851.021570] ? create_object.isra.0+0x3a/0xa20 [ 1851.021927] should_failslab+0x5/0x20 [ 1851.022233] kmem_cache_alloc+0x5b/0x310 [ 1851.022580] create_object.isra.0+0x3a/0xa20 [ 1851.022924] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1851.023330] kmem_cache_alloc+0x159/0x310 [ 1851.023666] jbd2__journal_start+0x190/0x7e0 [ 1851.024018] __ext4_journal_start_sb+0x214/0x390 [ 1851.024396] ext4_writepages+0x102d/0x3350 [ 1851.024743] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1851.025146] ? quarantine_put+0x8b/0x1a0 [ 1851.025459] ? trace_hardirqs_on+0x5b/0x180 [ 1851.025792] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1851.026169] ? __kasan_slab_free+0x122/0x160 [ 1851.026512] ? jbd2_journal_stop+0x61f/0xdc0 [ 1851.026871] ? jbd2_journal_stop+0x188/0xdc0 [ 1851.027225] ? balance_dirty_pages_ratelimited+0x43e/0x1ff0 [ 1851.027695] ? __ext4_journal_stop+0x107/0x1f0 [ 1851.028057] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 1851.028447] ? __mark_inode_dirty+0x12e/0xd40 [ 1851.028804] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1851.029186] do_writepages+0xee/0x2a0 [ 1851.029481] ? page_writeback_cpu_online+0x20/0x20 [ 1851.029862] ? ext4_buffered_write_iter+0x26a/0x4a0 [ 1851.030246] ? lock_downgrade+0x6d0/0x6d0 [ 1851.030575] ? generic_perform_write+0x37d/0x4f0 [ 1851.030945] __filemap_fdatawrite_range+0x24b/0x2f0 [ 1851.031364] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1851.031783] filemap_write_and_wait_range+0x65/0x100 [ 1851.032170] ext4_file_write_iter+0xc87/0x18d0 [ 1851.032664] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1851.033029] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1851.033449] new_sync_write+0x42c/0x660 [ 1851.033763] ? new_sync_read+0x6f0/0x6f0 [ 1851.034096] ? ksys_write+0x12d/0x260 [ 1851.034412] ? lock_release+0x680/0x680 [ 1851.034759] ? selinux_file_permission+0x92/0x520 [ 1851.035155] ? __fget_files+0x296/0x4c0 [ 1851.035519] vfs_write+0x747/0xa70 [ 1851.035806] ksys_write+0x12d/0x260 [ 1851.036119] ? __ia32_sys_read+0xb0/0xb0 [ 1851.036454] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1851.036880] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1851.037306] do_syscall_64+0x33/0x40 [ 1851.037600] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1851.038033] RIP: 0033:0x7f21b1e90b19 [ 1851.038331] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1851.039834] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1851.040454] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1851.041016] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1851.041585] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1851.042149] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1851.042719] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 04:03:12 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 40) 04:03:12 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x2010000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:03:12 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 22) [ 1864.978810] FAULT_INJECTION: forcing a failure. [ 1864.978810] name failslab, interval 1, probability 0, space 0, times 0 [ 1864.980488] CPU: 1 PID: 10439 Comm: syz-executor.3 Not tainted 5.10.213 #1 [ 1864.981148] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1864.981982] Call Trace: [ 1864.982267] dump_stack+0x107/0x167 [ 1864.982623] should_fail.cold+0x5/0xa [ 1864.983017] should_failslab+0x5/0x20 [ 1864.983387] __kmalloc_track_caller+0x79/0x370 [ 1864.983826] ? kasprintf+0xbb/0xf0 [ 1864.984179] kvasprintf+0xb5/0x150 [ 1864.984521] ? bust_spinlocks+0xe0/0xe0 [ 1864.984901] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1864.985413] ? trace_hardirqs_on+0x5b/0x180 [ 1864.985815] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1864.986338] kasprintf+0xbb/0xf0 [ 1864.986670] ? kvasprintf_const+0x1a0/0x1a0 [ 1864.987114] ? debug_check_no_locks_freed+0x57/0x1a0 [ 1864.987608] ? lockdep_init_map_type+0x2c7/0x780 [ 1864.988071] ieee80211_alloc_led_names+0x1ac/0x420 [ 1864.988554] ieee80211_alloc_hw_nm+0x1b51/0x2320 [ 1864.989007] ? trace_hardirqs_on+0x5b/0x180 [ 1864.989440] mac80211_hwsim_new_radio+0x1cd/0x4250 [ 1864.989913] ? ____sys_sendmsg+0x70d/0x870 [ 1864.990327] ? ___sys_sendmsg+0xf3/0x170 04:03:12 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470080000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:03:12 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x106a) 04:03:12 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:03:12 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0xb, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) [ 1864.990711] ? __sys_sendmsg+0xe5/0x1b0 04:03:12 executing program 5: syslog(0x9, &(0x7f0000001340)=""/4096, 0x1000) syslog(0x0, 0x0, 0x0) [ 1864.991259] ? do_syscall_64+0x33/0x40 [ 1864.991700] ? entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1864.992222] ? __lockdep_reset_lock+0x180/0x180 [ 1864.992512] FAULT_INJECTION: forcing a failure. [ 1864.992512] name failslab, interval 1, probability 0, space 0, times 0 [ 1864.992663] ? lock_acquire+0x197/0x470 [ 1864.993903] ? create_object.isra.0+0x3ad/0xa20 [ 1864.994380] ? hwsim_send_nullfunc_ps+0x80/0x80 [ 1864.994848] ? __kmalloc+0x16e/0x390 [ 1864.995229] hwsim_new_radio_nl+0x991/0x1080 [ 1864.995650] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1864.996184] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 1864.996799] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 1864.997447] genl_family_rcv_msg_doit+0x22d/0x330 [ 1864.997912] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1864.998552] ? cap_capable+0x1cd/0x230 [ 1864.998960] ? ns_capable+0xe2/0x110 [ 1864.999332] genl_rcv_msg+0x33c/0x5a0 [ 1864.999706] ? genl_get_cmd+0x480/0x480 [ 1865.000094] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1865.000603] ? lock_release+0x680/0x680 [ 1865.000991] ? __lockdep_reset_lock+0x180/0x180 [ 1865.001442] netlink_rcv_skb+0x14b/0x430 [ 1865.001841] ? genl_get_cmd+0x480/0x480 [ 1865.002230] ? netlink_ack+0xab0/0xab0 [ 1865.002619] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1865.003081] ? is_vmalloc_addr+0x7b/0xb0 [ 1865.003481] genl_rcv+0x24/0x40 [ 1865.003796] netlink_unicast+0x549/0x7f0 [ 1865.004217] ? netlink_attachskb+0x870/0x870 [ 1865.004652] netlink_sendmsg+0x90f/0xdf0 [ 1865.005056] ? netlink_unicast+0x7f0/0x7f0 [ 1865.005481] ? netlink_unicast+0x7f0/0x7f0 [ 1865.005887] __sock_sendmsg+0x154/0x190 [ 1865.006288] ____sys_sendmsg+0x70d/0x870 [ 1865.006691] ? sock_write_iter+0x3d0/0x3d0 [ 1865.007113] ? do_recvmmsg+0x6d0/0x6d0 [ 1865.007496] ? perf_trace_lock+0xac/0x490 [ 1865.007899] ? __lockdep_reset_lock+0x180/0x180 [ 1865.008366] ? perf_trace_lock+0xac/0x490 [ 1865.008761] ___sys_sendmsg+0xf3/0x170 [ 1865.009155] ? sendmsg_copy_msghdr+0x160/0x160 [ 1865.009594] ? lock_downgrade+0x6d0/0x6d0 [ 1865.010014] ? find_held_lock+0x2c/0x110 [ 1865.010408] ? __fget_files+0x296/0x4c0 [ 1865.010823] ? __fget_light+0xea/0x290 [ 1865.011225] __sys_sendmsg+0xe5/0x1b0 [ 1865.011589] ? __sys_sendmsg_sock+0x40/0x40 [ 1865.012022] ? rcu_read_lock_any_held+0x75/0xa0 [ 1865.012478] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1865.013000] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1865.013492] ? trace_hardirqs_on+0x5b/0x180 [ 1865.013930] do_syscall_64+0x33/0x40 [ 1865.014320] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1865.014830] RIP: 0033:0x7f482b2f9b19 [ 1865.015225] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1865.016984] RSP: 002b:00007f482886f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1865.017743] RAX: ffffffffffffffda RBX: 00007f482b40cf60 RCX: 00007f482b2f9b19 [ 1865.018437] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1865.019170] RBP: 00007f482886f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1865.019891] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1865.020630] R13: 00007ffef22a59af R14: 00007f482886f300 R15: 0000000000022000 [ 1865.021394] CPU: 0 PID: 10434 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1865.022013] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1865.022710] Call Trace: [ 1865.022945] dump_stack+0x107/0x167 [ 1865.023232] should_fail.cold+0x5/0xa [ 1865.023534] ? jbd2__journal_start+0x190/0x7e0 [ 1865.023892] should_failslab+0x5/0x20 [ 1865.024188] kmem_cache_alloc+0x5b/0x310 [ 1865.024510] jbd2__journal_start+0x190/0x7e0 [ 1865.024862] __ext4_journal_start_sb+0x214/0x390 [ 1865.025244] ext4_writepages+0x102d/0x3350 [ 1865.025596] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1865.026026] ? quarantine_put+0x8b/0x1a0 [ 1865.026353] ? trace_hardirqs_on+0x5b/0x180 [ 1865.026754] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1865.027141] ? __kasan_slab_free+0x122/0x160 [ 1865.027499] ? jbd2_journal_stop+0x61f/0xdc0 [ 1865.027856] ? jbd2_journal_stop+0x188/0xdc0 [ 1865.028210] ? balance_dirty_pages_ratelimited+0x43e/0x1ff0 [ 1865.028668] ? __ext4_journal_stop+0x107/0x1f0 [ 1865.029040] ? perf_trace_lock+0xac/0x490 [ 1865.029360] ? __mark_inode_dirty+0x12e/0xd40 [ 1865.029720] ? __lockdep_reset_lock+0x180/0x180 [ 1865.030093] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1865.030484] do_writepages+0xee/0x2a0 [ 1865.030802] ? page_writeback_cpu_online+0x20/0x20 [ 1865.031210] ? ext4_buffered_write_iter+0x26a/0x4a0 [ 1865.031596] ? lock_downgrade+0x6d0/0x6d0 [ 1865.031940] ? generic_perform_write+0x37d/0x4f0 [ 1865.032331] __filemap_fdatawrite_range+0x24b/0x2f0 [ 1865.032758] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1865.033199] filemap_write_and_wait_range+0x65/0x100 [ 1865.033605] ext4_file_write_iter+0xc87/0x18d0 [ 1865.033983] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1865.034354] ? __lockdep_reset_lock+0x180/0x180 [ 1865.034767] ? __lockdep_reset_lock+0x180/0x180 [ 1865.035160] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1865.035607] new_sync_write+0x42c/0x660 [ 1865.035937] ? new_sync_read+0x6f0/0x6f0 [ 1865.036274] ? ksys_write+0x12d/0x260 [ 1865.036612] ? lock_release+0x680/0x680 [ 1865.036935] ? selinux_file_permission+0x92/0x520 [ 1865.037328] ? __fget_files+0x296/0x4c0 [ 1865.037684] vfs_write+0x747/0xa70 [ 1865.037970] ksys_write+0x12d/0x260 [ 1865.038263] ? __ia32_sys_read+0xb0/0xb0 [ 1865.038597] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1865.039030] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1865.039464] do_syscall_64+0x33/0x40 [ 1865.039770] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1865.040196] RIP: 0033:0x7f21b1e90b19 [ 1865.040512] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1865.042053] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1865.042674] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1865.043274] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1865.043876] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1865.044448] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1865.045016] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 [ 1865.045922] EXT4-fs (sda): ext4_writepages: jbd2_start: 9223372036854775807 pages, ino 15993; err -12 04:03:13 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) syslog(0x9, &(0x7f0000000000)=""/178, 0xb2) 04:03:13 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 41) 04:03:13 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x2e00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1865.335232] FAULT_INJECTION: forcing a failure. [ 1865.335232] name failslab, interval 1, probability 0, space 0, times 0 [ 1865.336383] CPU: 0 PID: 10459 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1865.337064] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1865.337876] Call Trace: [ 1865.338149] dump_stack+0x107/0x167 [ 1865.338517] should_fail.cold+0x5/0xa [ 1865.338910] ? create_object.isra.0+0x3a/0xa20 [ 1865.339364] should_failslab+0x5/0x20 [ 1865.339741] kmem_cache_alloc+0x5b/0x310 [ 1865.340150] create_object.isra.0+0x3a/0xa20 [ 1865.340583] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1865.341087] kmem_cache_alloc+0x159/0x310 [ 1865.341499] jbd2__journal_start+0x190/0x7e0 [ 1865.341941] __ext4_journal_start_sb+0x214/0x390 [ 1865.342429] ext4_writepages+0x102d/0x3350 [ 1865.342919] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1865.343432] ? quarantine_put+0x8b/0x1a0 [ 1865.343833] ? trace_hardirqs_on+0x5b/0x180 [ 1865.344262] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1865.344747] ? __kasan_slab_free+0x122/0x160 [ 1865.345180] ? jbd2_journal_stop+0x61f/0xdc0 [ 1865.345627] ? jbd2_journal_stop+0x188/0xdc0 [ 1865.346077] ? balance_dirty_pages_ratelimited+0x43e/0x1ff0 [ 1865.346637] ? __ext4_journal_stop+0x107/0x1f0 [ 1865.347091] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 1865.347580] ? __mark_inode_dirty+0x12e/0xd40 [ 1865.348025] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1865.348508] do_writepages+0xee/0x2a0 [ 1865.348885] ? page_writeback_cpu_online+0x20/0x20 [ 1865.349367] ? ext4_buffered_write_iter+0x26a/0x4a0 [ 1865.349853] ? lock_downgrade+0x6d0/0x6d0 [ 1865.350267] ? generic_perform_write+0x37d/0x4f0 [ 1865.350746] __filemap_fdatawrite_range+0x24b/0x2f0 [ 1865.351249] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1865.351778] filemap_write_and_wait_range+0x65/0x100 [ 1865.352280] ext4_file_write_iter+0xc87/0x18d0 [ 1865.352745] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1865.353205] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1865.353736] new_sync_write+0x42c/0x660 [ 1865.354149] ? new_sync_read+0x6f0/0x6f0 [ 1865.354560] ? ksys_write+0x12d/0x260 [ 1865.354965] ? lock_release+0x680/0x680 [ 1865.355367] ? selinux_file_permission+0x92/0x520 [ 1865.355849] ? __fget_files+0x296/0x4c0 [ 1865.356255] vfs_write+0x747/0xa70 [ 1865.356616] ksys_write+0x12d/0x260 [ 1865.356977] ? __ia32_sys_read+0xb0/0xb0 [ 1865.357386] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1865.357911] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1865.358431] do_syscall_64+0x33/0x40 [ 1865.358816] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1865.359323] RIP: 0033:0x7f21b1e90b19 [ 1865.359697] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1865.361420] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1865.362170] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1865.362886] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1865.363576] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1865.364267] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1865.364965] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 04:03:13 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x106b) 04:03:13 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 23) 04:03:13 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfffffffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:03:13 executing program 5: syslog(0x9, &(0x7f0000000000)=""/4099, 0x1003) 04:03:13 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 42) [ 1865.467510] FAULT_INJECTION: forcing a failure. [ 1865.467510] name failslab, interval 1, probability 0, space 0, times 0 [ 1865.468796] CPU: 1 PID: 10465 Comm: syz-executor.3 Not tainted 5.10.213 #1 [ 1865.469488] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1865.470318] Call Trace: [ 1865.470600] dump_stack+0x107/0x167 [ 1865.471002] should_fail.cold+0x5/0xa [ 1865.471389] ? create_object.isra.0+0x3a/0xa20 [ 1865.471864] should_failslab+0x5/0x20 [ 1865.472254] kmem_cache_alloc+0x5b/0x310 [ 1865.472665] ? vsnprintf+0x4ba/0x1600 [ 1865.473055] create_object.isra.0+0x3a/0xa20 [ 1865.473502] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1865.474018] __kmalloc_track_caller+0x177/0x370 [ 1865.474492] ? kasprintf+0xbb/0xf0 [ 1865.474878] kvasprintf+0xb5/0x150 [ 1865.475245] ? bust_spinlocks+0xe0/0xe0 [ 1865.475652] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1865.476177] ? get_random_u32+0x3cb/0x670 [ 1865.476588] kasprintf+0xbb/0xf0 [ 1865.476937] ? kvasprintf_const+0x1a0/0x1a0 [ 1865.477367] ? lockdep_init_map_type+0x2c7/0x780 [ 1865.477850] ? lockdep_init_map_type+0x2c7/0x780 [ 1865.478334] ieee80211_alloc_led_names+0x1ac/0x420 [ 1865.478859] ieee80211_alloc_hw_nm+0x1b51/0x2320 [ 1865.479331] ? trace_hardirqs_on+0x5b/0x180 [ 1865.479761] mac80211_hwsim_new_radio+0x1cd/0x4250 [ 1865.480243] ? ____sys_sendmsg+0x70d/0x870 [ 1865.480674] ? ___sys_sendmsg+0xf3/0x170 [ 1865.481083] ? __sys_sendmsg+0xe5/0x1b0 [ 1865.481497] ? do_syscall_64+0x33/0x40 [ 1865.481892] ? entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1865.482433] ? __lockdep_reset_lock+0x180/0x180 [ 1865.482909] ? lock_acquire+0x197/0x470 [ 1865.483314] ? create_object.isra.0+0x3ad/0xa20 [ 1865.483787] ? hwsim_send_nullfunc_ps+0x80/0x80 [ 1865.484262] ? __kmalloc+0x16e/0x390 [ 1865.484636] hwsim_new_radio_nl+0x991/0x1080 [ 1865.485083] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1865.485617] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 1865.486289] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 1865.486954] genl_family_rcv_msg_doit+0x22d/0x330 [ 1865.487458] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1865.488132] ? cap_capable+0x1cd/0x230 [ 1865.488544] ? ns_capable+0xe2/0x110 [ 1865.488930] genl_rcv_msg+0x33c/0x5a0 [ 1865.489327] ? genl_get_cmd+0x480/0x480 [ 1865.489734] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1865.490264] ? lock_release+0x680/0x680 [ 1865.490670] ? netlink_deliver_tap+0xf4/0xcc0 [ 1865.491152] netlink_rcv_skb+0x14b/0x430 [ 1865.491572] ? genl_get_cmd+0x480/0x480 [ 1865.491978] ? netlink_ack+0xab0/0xab0 [ 1865.492383] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1865.492851] ? is_vmalloc_addr+0x7b/0xb0 [ 1865.493268] genl_rcv+0x24/0x40 [ 1865.493611] netlink_unicast+0x549/0x7f0 [ 1865.494032] ? netlink_attachskb+0x870/0x870 [ 1865.494507] netlink_sendmsg+0x90f/0xdf0 [ 1865.494948] ? netlink_unicast+0x7f0/0x7f0 [ 1865.495402] ? netlink_unicast+0x7f0/0x7f0 [ 1865.495843] __sock_sendmsg+0x154/0x190 [ 1865.496254] ____sys_sendmsg+0x70d/0x870 [ 1865.496689] ? sock_write_iter+0x3d0/0x3d0 [ 1865.497122] ? do_recvmmsg+0x6d0/0x6d0 [ 1865.497541] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1865.498066] ? lock_downgrade+0x6d0/0x6d0 [ 1865.498502] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1865.499054] ___sys_sendmsg+0xf3/0x170 [ 1865.499465] ? sendmsg_copy_msghdr+0x160/0x160 [ 1865.499940] ? lock_downgrade+0x6d0/0x6d0 [ 1865.500384] ? find_held_lock+0x2c/0x110 [ 1865.500808] ? __fget_files+0x296/0x4c0 [ 1865.501223] ? __fget_light+0xea/0x290 [ 1865.501628] __sys_sendmsg+0xe5/0x1b0 [ 1865.502027] ? __sys_sendmsg_sock+0x40/0x40 [ 1865.502463] ? rcu_read_lock_any_held+0x75/0xa0 [ 1865.502986] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1865.503517] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1865.504048] ? trace_hardirqs_on+0x5b/0x180 [ 1865.504493] do_syscall_64+0x33/0x40 [ 1865.504894] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1865.505410] RIP: 0033:0x7f482b2f9b19 [ 1865.505802] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1865.507716] RSP: 002b:00007f482886f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1865.508513] RAX: ffffffffffffffda RBX: 00007f482b40cf60 RCX: 00007f482b2f9b19 [ 1865.509263] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1865.510010] RBP: 00007f482886f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1865.510758] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1865.511502] R13: 00007ffef22a59af R14: 00007f482886f300 R15: 0000000000022000 [ 1865.581816] FAULT_INJECTION: forcing a failure. [ 1865.581816] name failslab, interval 1, probability 0, space 0, times 0 [ 1865.583329] CPU: 0 PID: 10476 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1865.583886] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1865.584542] Call Trace: [ 1865.584763] dump_stack+0x107/0x167 [ 1865.585069] should_fail.cold+0x5/0xa [ 1865.585394] ? create_object.isra.0+0x3a/0xa20 [ 1865.585794] should_failslab+0x5/0x20 [ 1865.586115] kmem_cache_alloc+0x5b/0x310 [ 1865.586451] create_object.isra.0+0x3a/0xa20 [ 1865.586825] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1865.587234] kmem_cache_alloc+0x159/0x310 [ 1865.587580] ext4_alloc_io_end_vec+0x1f/0x120 [ 1865.587955] ext4_writepages+0x17a5/0x3350 [ 1865.588321] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1865.588740] ? quarantine_put+0x8b/0x1a0 [ 1865.589077] ? trace_hardirqs_on+0x5b/0x180 [ 1865.589429] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1865.589865] ? __kasan_slab_free+0x122/0x160 [ 1865.590225] ? jbd2_journal_stop+0x61f/0xdc0 [ 1865.590589] ? jbd2_journal_stop+0x188/0xdc0 [ 1865.590976] ? balance_dirty_pages_ratelimited+0x43e/0x1ff0 [ 1865.591436] ? __ext4_journal_stop+0x107/0x1f0 [ 1865.591808] ? perf_trace_lock+0xac/0x490 [ 1865.592147] ? __mark_inode_dirty+0x12e/0xd40 [ 1865.592515] ? __lockdep_reset_lock+0x180/0x180 [ 1865.592897] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1865.593291] do_writepages+0xee/0x2a0 [ 1865.593626] ? page_writeback_cpu_online+0x20/0x20 [ 1865.594036] ? ext4_buffered_write_iter+0x26a/0x4a0 [ 1865.594444] ? lock_downgrade+0x6d0/0x6d0 [ 1865.594796] ? generic_perform_write+0x37d/0x4f0 [ 1865.595181] __filemap_fdatawrite_range+0x24b/0x2f0 [ 1865.595588] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1865.596033] filemap_write_and_wait_range+0x65/0x100 [ 1865.596442] ext4_file_write_iter+0xc87/0x18d0 [ 1865.596824] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1865.597201] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1865.597657] new_sync_write+0x42c/0x660 [ 1865.598001] ? new_sync_read+0x6f0/0x6f0 [ 1865.598332] ? ksys_write+0x12d/0x260 [ 1865.598650] ? lock_release+0x680/0x680 [ 1865.598985] ? selinux_file_permission+0x92/0x520 [ 1865.599384] ? __fget_files+0x296/0x4c0 [ 1865.599743] vfs_write+0x747/0xa70 [ 1865.600041] ksys_write+0x12d/0x260 [ 1865.600335] ? __ia32_sys_read+0xb0/0xb0 [ 1865.600670] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1865.601096] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1865.601530] do_syscall_64+0x33/0x40 [ 1865.601845] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1865.602263] RIP: 0033:0x7f21b1e90b19 [ 1865.602575] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1865.604080] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1865.604684] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1865.605261] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1865.605830] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1865.606399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1865.606995] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 04:03:28 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 24) 04:03:28 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xedc000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:03:28 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x106c) 04:03:28 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) syslog(0xa, &(0x7f0000000000)=""/249, 0xf9) 04:03:28 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x2f00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:03:28 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e666174000208010004700b0000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:03:28 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 04:03:28 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 43) [ 1880.784413] FAULT_INJECTION: forcing a failure. [ 1880.784413] name failslab, interval 1, probability 0, space 0, times 0 [ 1880.785506] CPU: 1 PID: 10497 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1880.786108] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1880.786771] Call Trace: [ 1880.787005] dump_stack+0x107/0x167 [ 1880.787296] should_fail.cold+0x5/0xa [ 1880.787604] ? create_object.isra.0+0x3a/0xa20 [ 1880.787976] should_failslab+0x5/0x20 [ 1880.788287] kmem_cache_alloc+0x5b/0x310 [ 1880.802863] create_object.isra.0+0x3a/0xa20 [ 1880.803235] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1880.803675] kmem_cache_alloc+0x159/0x310 [ 1880.804045] ext4_alloc_io_end_vec+0x1f/0x120 [ 1880.804412] ext4_writepages+0x17a5/0x3350 [ 1880.804768] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1880.805223] ? quarantine_put+0x8b/0x1a0 [ 1880.805568] ? trace_hardirqs_on+0x5b/0x180 [ 1880.805924] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1880.806375] ? __kasan_slab_free+0x122/0x160 [ 1880.806729] ? jbd2_journal_stop+0x61f/0xdc0 [ 1880.807126] ? jbd2_journal_stop+0x188/0xdc0 [ 1880.807478] ? balance_dirty_pages_ratelimited+0x43e/0x1ff0 [ 1880.807950] ? __ext4_journal_stop+0x107/0x1f0 [ 1880.808320] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 1880.808708] ? __mark_inode_dirty+0x12e/0xd40 [ 1880.809096] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1880.809507] do_writepages+0xee/0x2a0 [ 1880.809819] ? page_writeback_cpu_online+0x20/0x20 [ 1880.810237] ? ext4_buffered_write_iter+0x26a/0x4a0 [ 1880.810665] ? lock_downgrade+0x6d0/0x6d0 [ 1880.811055] ? generic_perform_write+0x37d/0x4f0 [ 1880.811456] __filemap_fdatawrite_range+0x24b/0x2f0 [ 1880.811879] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1880.812351] filemap_write_and_wait_range+0x65/0x100 [ 1880.812775] ext4_file_write_iter+0xc87/0x18d0 [ 1880.813194] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1880.813580] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1880.814052] new_sync_write+0x42c/0x660 [ 1880.814393] ? new_sync_read+0x6f0/0x6f0 [ 1880.814732] ? ksys_write+0x12d/0x260 [ 1880.815096] ? lock_release+0x680/0x680 [ 1880.815445] ? selinux_file_permission+0x92/0x520 [ 1880.815989] ? __fget_files+0x296/0x4c0 [ 1880.816369] vfs_write+0x747/0xa70 [ 1880.816672] ksys_write+0x12d/0x260 [ 1880.817016] ? __ia32_sys_read+0xb0/0xb0 [ 1880.817382] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1880.817823] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1880.818289] do_syscall_64+0x33/0x40 [ 1880.818599] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1880.819071] RIP: 0033:0x7f21b1e90b19 [ 1880.819389] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1880.820977] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1880.821618] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1880.822243] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1880.822950] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1880.823621] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1880.824310] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 04:03:28 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 44) 04:03:28 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:03:28 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1880.964731] FAULT_INJECTION: forcing a failure. [ 1880.964731] name failslab, interval 1, probability 0, space 0, times 0 [ 1880.966002] CPU: 1 PID: 10508 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1880.966533] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1880.967165] Call Trace: [ 1880.967370] dump_stack+0x107/0x167 [ 1880.967684] should_fail.cold+0x5/0xa [ 1880.968012] ? ext4_mb_new_blocks+0x209f/0x45b0 [ 1880.968392] should_failslab+0x5/0x20 [ 1880.968689] kmem_cache_alloc+0x5b/0x310 [ 1880.969035] ext4_mb_new_blocks+0x209f/0x45b0 [ 1880.969393] ? lock_chain_count+0x20/0x20 [ 1880.969734] ? __is_insn_slot_addr+0x123/0x290 [ 1880.970087] ? lock_downgrade+0x6d0/0x6d0 [ 1880.970427] ? mark_lock+0xf5/0x2df0 [ 1880.970707] ? ext4_discard_preallocations+0xd80/0xd80 [ 1880.971146] ? entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1880.971567] ? lock_chain_count+0x20/0x20 [ 1880.971899] ? lock_chain_count+0x20/0x20 [ 1880.972232] ? __is_insn_slot_addr+0x14c/0x290 [ 1880.972604] ext4_new_meta_blocks+0x1e1/0x320 [ 1880.972963] ? ext4_should_retry_alloc+0x240/0x240 [ 1880.973375] ? lock_chain_count+0x20/0x20 [ 1880.973701] ? ext4_get_branch+0x541/0x6d0 [ 1880.974044] ext4_ind_map_blocks+0x95d/0x2150 [ 1880.974409] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1880.974838] ? ext4_free_branches+0x680/0x680 [ 1880.975216] ? lock_release+0x680/0x680 [ 1880.975538] ? lock_downgrade+0x6d0/0x6d0 [ 1880.975881] ? down_write+0xe0/0x160 [ 1880.976175] ? down_write_killable+0x180/0x180 [ 1880.976550] ext4_map_blocks+0x902/0x1910 [ 1880.976896] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1880.977247] ? trace_hardirqs_on+0x5b/0x180 [ 1880.977595] ? kmem_cache_alloc+0x2a6/0x310 [ 1880.977943] ext4_writepages+0x19bf/0x3350 [ 1880.978296] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1880.978714] ? quarantine_put+0x8b/0x1a0 [ 1880.979055] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1880.979447] ? __kasan_slab_free+0x122/0x160 [ 1880.979820] ? jbd2_journal_stop+0x61f/0xdc0 [ 1880.980173] ? jbd2_journal_stop+0x188/0xdc0 [ 1880.980535] ? balance_dirty_pages_ratelimited+0x43e/0x1ff0 [ 1880.980992] ? __ext4_journal_stop+0x107/0x1f0 [ 1880.981356] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 1880.981743] ? __mark_inode_dirty+0x12e/0xd40 [ 1880.982118] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1880.982502] do_writepages+0xee/0x2a0 [ 1880.982811] ? page_writeback_cpu_online+0x20/0x20 [ 1880.983215] ? ext4_buffered_write_iter+0x26a/0x4a0 [ 1880.983617] ? lock_downgrade+0x6d0/0x6d0 [ 1880.983956] ? generic_perform_write+0x37d/0x4f0 [ 1880.984346] __filemap_fdatawrite_range+0x24b/0x2f0 [ 1880.984755] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1880.985195] filemap_write_and_wait_range+0x65/0x100 [ 1880.985614] ext4_file_write_iter+0xc87/0x18d0 [ 1880.985995] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1880.986372] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1880.986797] new_sync_write+0x42c/0x660 [ 1880.987144] ? new_sync_read+0x6f0/0x6f0 [ 1880.987503] ? ksys_write+0x12d/0x260 [ 1880.987839] ? lock_release+0x680/0x680 [ 1880.988206] ? selinux_file_permission+0x92/0x520 [ 1880.988637] ? __fget_files+0x296/0x4c0 [ 1880.988994] vfs_write+0x747/0xa70 [ 1880.989304] ksys_write+0x12d/0x260 [ 1880.989628] ? __ia32_sys_read+0xb0/0xb0 [ 1880.989987] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1880.990432] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1880.990889] do_syscall_64+0x33/0x40 [ 1880.991224] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1880.991686] RIP: 0033:0x7f21b1e90b19 [ 1880.992021] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1880.993589] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1880.994269] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1880.994853] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1880.995474] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1880.996067] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1880.996669] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 04:03:28 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb3d) syslog(0x4, &(0x7f00000000c0)=""/77, 0x4d) syslog(0x4, &(0x7f0000000000)=""/14, 0xe) syslog(0x3, &(0x7f0000000040)=""/81, 0x51) syslog(0x9, &(0x7f0000000140)=""/81, 0x51) 04:03:29 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x106d) 04:03:29 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 45) [ 1881.173381] FAULT_INJECTION: forcing a failure. [ 1881.173381] name failslab, interval 1, probability 0, space 0, times 0 [ 1881.174765] CPU: 0 PID: 10487 Comm: syz-executor.3 Not tainted 5.10.213 #1 [ 1881.175569] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1881.176564] Call Trace: [ 1881.176888] dump_stack+0x107/0x167 [ 1881.177325] should_fail.cold+0x5/0xa [ 1881.177790] should_failslab+0x5/0x20 [ 1881.178247] __kmalloc_track_caller+0x79/0x370 [ 1881.178791] ? kasprintf+0xbb/0xf0 [ 1881.179230] kvasprintf+0xb5/0x150 [ 1881.179656] ? bust_spinlocks+0xe0/0xe0 [ 1881.180125] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1881.180743] ? get_random_u32+0x3cb/0x670 [ 1881.181242] kasprintf+0xbb/0xf0 [ 1881.181649] ? kvasprintf_const+0x1a0/0x1a0 [ 1881.182163] ? lockdep_init_map_type+0x2c7/0x780 [ 1881.182728] ? lockdep_init_map_type+0x2c7/0x780 [ 1881.183305] ieee80211_alloc_led_names+0x23f/0x420 [ 1881.183897] ieee80211_alloc_hw_nm+0x1b51/0x2320 [ 1881.184450] ? trace_hardirqs_on+0x5b/0x180 [ 1881.184970] mac80211_hwsim_new_radio+0x1cd/0x4250 [ 1881.185542] ? ____sys_sendmsg+0x70d/0x870 [ 1881.186045] ? ___sys_sendmsg+0xf3/0x170 [ 1881.186519] ? __sys_sendmsg+0xe5/0x1b0 [ 1881.187008] ? do_syscall_64+0x33/0x40 [ 1881.187465] ? entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1881.188100] ? __lockdep_reset_lock+0x180/0x180 [ 1881.188641] ? lock_acquire+0x197/0x470 [ 1881.189118] ? create_object.isra.0+0x3ad/0xa20 [ 1881.189669] ? hwsim_send_nullfunc_ps+0x80/0x80 [ 1881.190229] ? __kmalloc+0x16e/0x390 [ 1881.190673] hwsim_new_radio_nl+0x991/0x1080 [ 1881.191208] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1881.191828] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 1881.192601] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 1881.193373] genl_family_rcv_msg_doit+0x22d/0x330 [ 1881.193958] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1881.194717] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1881.195371] ? cap_capable+0x1cd/0x230 [ 1881.195845] ? ns_capable+0xe2/0x110 [ 1881.196440] genl_rcv_msg+0x33c/0x5a0 [ 1881.196911] ? genl_get_cmd+0x480/0x480 [ 1881.197395] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1881.198025] ? lock_release+0x680/0x680 [ 1881.198521] ? __lockdep_reset_lock+0x180/0x180 [ 1881.199103] netlink_rcv_skb+0x14b/0x430 [ 1881.199594] ? genl_get_cmd+0x480/0x480 [ 1881.200078] ? netlink_ack+0xab0/0xab0 [ 1881.200556] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1881.201112] ? is_vmalloc_addr+0x7b/0xb0 [ 1881.201607] genl_rcv+0x24/0x40 [ 1881.202008] netlink_unicast+0x549/0x7f0 [ 1881.202506] ? netlink_attachskb+0x870/0x870 [ 1881.203072] netlink_sendmsg+0x90f/0xdf0 [ 1881.203572] ? netlink_unicast+0x7f0/0x7f0 [ 1881.204094] ? netlink_unicast+0x7f0/0x7f0 [ 1881.204609] __sock_sendmsg+0x154/0x190 [ 1881.205090] ____sys_sendmsg+0x70d/0x870 [ 1881.205587] ? sock_write_iter+0x3d0/0x3d0 [ 1881.206096] ? do_recvmmsg+0x6d0/0x6d0 [ 1881.206571] ? perf_trace_lock+0xac/0x490 [ 1881.207086] ? __lockdep_reset_lock+0x180/0x180 [ 1881.207657] ? perf_trace_lock+0xac/0x490 [ 1881.208163] ___sys_sendmsg+0xf3/0x170 [ 1881.208640] ? sendmsg_copy_msghdr+0x160/0x160 [ 1881.209198] ? lock_downgrade+0x6d0/0x6d0 [ 1881.209718] ? find_held_lock+0x2c/0x110 [ 1881.210219] ? __fget_files+0x296/0x4c0 [ 1881.210715] ? __fget_light+0xea/0x290 [ 1881.211206] __sys_sendmsg+0xe5/0x1b0 [ 1881.211674] ? __sys_sendmsg_sock+0x40/0x40 [ 1881.212194] ? rcu_read_lock_any_held+0x75/0xa0 [ 1881.212781] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1881.213427] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1881.214043] ? trace_hardirqs_on+0x5b/0x180 [ 1881.214570] do_syscall_64+0x33/0x40 [ 1881.215032] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1881.215654] RIP: 0033:0x7f482b2f9b19 [ 1881.216106] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1881.218332] RSP: 002b:00007f482886f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1881.219270] RAX: ffffffffffffffda RBX: 00007f482b40cf60 RCX: 00007f482b2f9b19 [ 1881.220171] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1881.221023] RBP: 00007f482886f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1881.221890] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1881.222743] R13: 00007ffef22a59af R14: 00007f482886f300 R15: 0000000000022000 04:03:29 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:03:29 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x4000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1881.310226] FAULT_INJECTION: forcing a failure. [ 1881.310226] name failslab, interval 1, probability 0, space 0, times 0 [ 1881.311483] CPU: 0 PID: 10525 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1881.312217] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1881.313098] Call Trace: [ 1881.313393] dump_stack+0x107/0x167 [ 1881.313817] should_fail.cold+0x5/0xa [ 1881.314232] ? create_object.isra.0+0x3a/0xa20 [ 1881.314718] should_failslab+0x5/0x20 [ 1881.315140] kmem_cache_alloc+0x5b/0x310 [ 1881.315560] create_object.isra.0+0x3a/0xa20 [ 1881.316124] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1881.316634] kmem_cache_alloc+0x159/0x310 [ 1881.317096] ext4_mb_new_blocks+0x209f/0x45b0 [ 1881.317556] ? lock_chain_count+0x20/0x20 [ 1881.318005] ? __is_insn_slot_addr+0x123/0x290 [ 1881.318465] ? lock_downgrade+0x6d0/0x6d0 [ 1881.318899] ? mark_lock+0xf5/0x2df0 [ 1881.319305] ? ext4_discard_preallocations+0xd80/0xd80 [ 1881.319839] ? entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1881.320395] ? lock_chain_count+0x20/0x20 [ 1881.320821] ? lock_chain_count+0x20/0x20 [ 1881.321273] ? __is_insn_slot_addr+0x14c/0x290 [ 1881.321753] ext4_new_meta_blocks+0x1e1/0x320 [ 1881.322236] ? ext4_should_retry_alloc+0x240/0x240 [ 1881.322746] ? lock_chain_count+0x20/0x20 [ 1881.323183] ? ext4_get_branch+0x541/0x6d0 [ 1881.323621] ext4_ind_map_blocks+0x95d/0x2150 [ 1881.324088] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1881.324621] ? ext4_free_branches+0x680/0x680 [ 1881.325094] ? lock_release+0x680/0x680 [ 1881.325557] ? lock_downgrade+0x6d0/0x6d0 [ 1881.326109] ? down_write+0xe0/0x160 [ 1881.326525] ? down_write_killable+0x180/0x180 [ 1881.327009] ext4_map_blocks+0x902/0x1910 [ 1881.327441] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1881.327891] ? trace_hardirqs_on+0x5b/0x180 [ 1881.328333] ? kmem_cache_alloc+0x2a6/0x310 [ 1881.328775] ext4_writepages+0x19bf/0x3350 [ 1881.329251] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1881.329809] ? quarantine_put+0x8b/0x1a0 [ 1881.330226] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1881.330715] ? __kasan_slab_free+0x122/0x160 [ 1881.331186] ? jbd2_journal_stop+0x61f/0xdc0 [ 1881.331637] ? jbd2_journal_stop+0x188/0xdc0 [ 1881.332089] ? balance_dirty_pages_ratelimited+0x43e/0x1ff0 [ 1881.332668] ? __ext4_journal_stop+0x107/0x1f0 [ 1881.333136] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 1881.333628] ? __mark_inode_dirty+0x12e/0xd40 [ 1881.334098] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1881.334594] do_writepages+0xee/0x2a0 [ 1881.334996] ? page_writeback_cpu_online+0x20/0x20 [ 1881.335494] ? ext4_buffered_write_iter+0x26a/0x4a0 [ 1881.336003] ? lock_downgrade+0x6d0/0x6d0 [ 1881.336426] ? generic_perform_write+0x37d/0x4f0 [ 1881.336909] __filemap_fdatawrite_range+0x24b/0x2f0 [ 1881.337420] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1881.337959] filemap_write_and_wait_range+0x65/0x100 [ 1881.338476] ext4_file_write_iter+0xc87/0x18d0 [ 1881.338958] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1881.339434] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1881.340115] new_sync_write+0x42c/0x660 [ 1881.340618] ? new_sync_read+0x6f0/0x6f0 [ 1881.341069] ? ksys_write+0x12d/0x260 [ 1881.341500] ? lock_release+0x680/0x680 [ 1881.341943] ? selinux_file_permission+0x92/0x520 [ 1881.342463] ? __fget_files+0x296/0x4c0 [ 1881.342878] vfs_write+0x747/0xa70 [ 1881.343260] ksys_write+0x12d/0x260 [ 1881.343634] ? __ia32_sys_read+0xb0/0xb0 [ 1881.344060] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1881.344591] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1881.345130] do_syscall_64+0x33/0x40 [ 1881.345585] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1881.346250] RIP: 0033:0x7f21b1e90b19 [ 1881.346637] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1881.348506] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1881.349282] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1881.350013] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1881.350737] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1881.351674] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1881.352428] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 04:03:29 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 25) 04:03:29 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470180000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:03:29 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x106e) [ 1881.548660] FAULT_INJECTION: forcing a failure. [ 1881.548660] name failslab, interval 1, probability 0, space 0, times 0 [ 1881.549891] CPU: 1 PID: 10534 Comm: syz-executor.3 Not tainted 5.10.213 #1 [ 1881.550556] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1881.551371] Call Trace: [ 1881.551669] dump_stack+0x107/0x167 [ 1881.552051] should_fail.cold+0x5/0xa [ 1881.552415] ? create_object.isra.0+0x3a/0xa20 [ 1881.552848] should_failslab+0x5/0x20 [ 1881.553216] kmem_cache_alloc+0x5b/0x310 [ 1881.553595] ? vsnprintf+0x4ba/0x1600 [ 1881.553959] create_object.isra.0+0x3a/0xa20 [ 1881.554392] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1881.554894] __kmalloc_track_caller+0x177/0x370 [ 1881.555344] ? kasprintf+0xbb/0xf0 [ 1881.555688] kvasprintf+0xb5/0x150 [ 1881.555984] ? bust_spinlocks+0xe0/0xe0 [ 1881.556387] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1881.556826] ? get_random_u32+0x3cb/0x670 [ 1881.557244] kasprintf+0xbb/0xf0 [ 1881.557561] ? kvasprintf_const+0x1a0/0x1a0 [ 1881.558043] ? lockdep_init_map_type+0x2c7/0x780 [ 1881.558460] ? lockdep_init_map_type+0x2c7/0x780 [ 1881.558873] ieee80211_alloc_led_names+0x23f/0x420 [ 1881.559375] ieee80211_alloc_hw_nm+0x1b51/0x2320 [ 1881.559798] ? trace_hardirqs_on+0x5b/0x180 [ 1881.560235] mac80211_hwsim_new_radio+0x1cd/0x4250 [ 1881.560631] ? ____sys_sendmsg+0x70d/0x870 [ 1881.561060] ? ___sys_sendmsg+0xf3/0x170 [ 1881.561426] ? __sys_sendmsg+0xe5/0x1b0 [ 1881.561831] ? do_syscall_64+0x33/0x40 [ 1881.562147] ? entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1881.562675] ? lock_acquire+0x197/0x470 [ 1881.563048] ? create_object.isra.0+0x3ad/0xa20 [ 1881.563512] ? hwsim_send_nullfunc_ps+0x80/0x80 [ 1881.563930] ? __kmalloc+0x16e/0x390 [ 1881.564307] hwsim_new_radio_nl+0x991/0x1080 [ 1881.564706] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1881.565235] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 1881.565819] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 1881.566474] genl_family_rcv_msg_doit+0x22d/0x330 [ 1881.566914] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1881.567583] ? selinux_capable+0x45/0x70 [ 1881.567957] ? cap_capable+0x1cd/0x230 [ 1881.568355] ? ns_capable+0xe2/0x110 [ 1881.568730] genl_rcv_msg+0x33c/0x5a0 [ 1881.569114] ? genl_get_cmd+0x480/0x480 [ 1881.569475] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1881.570005] ? lock_release+0x680/0x680 [ 1881.570364] ? netlink_deliver_tap+0xf4/0xcc0 [ 1881.570811] netlink_rcv_skb+0x14b/0x430 [ 1881.571192] ? genl_get_cmd+0x480/0x480 [ 1881.571587] ? netlink_ack+0xab0/0xab0 [ 1881.571920] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1881.572377] ? is_vmalloc_addr+0x7b/0xb0 [ 1881.572746] genl_rcv+0x24/0x40 [ 1881.573077] netlink_unicast+0x549/0x7f0 [ 1881.573450] ? netlink_attachskb+0x870/0x870 [ 1881.573893] netlink_sendmsg+0x90f/0xdf0 [ 1881.574271] ? netlink_unicast+0x7f0/0x7f0 [ 1881.574699] ? netlink_unicast+0x7f0/0x7f0 [ 1881.575090] __sock_sendmsg+0x154/0x190 [ 1881.575495] ____sys_sendmsg+0x70d/0x870 [ 1881.575862] ? sock_write_iter+0x3d0/0x3d0 [ 1881.576278] ? do_recvmmsg+0x6d0/0x6d0 [ 1881.576644] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1881.577165] ? lock_downgrade+0x6d0/0x6d0 [ 1881.577546] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1881.578069] ___sys_sendmsg+0xf3/0x170 [ 1881.578419] ? sendmsg_copy_msghdr+0x160/0x160 [ 1881.578882] ? lock_downgrade+0x6d0/0x6d0 [ 1881.579265] ? find_held_lock+0x2c/0x110 [ 1881.579676] ? __fget_files+0x296/0x4c0 [ 1881.580044] ? __fget_light+0xea/0x290 [ 1881.580436] __sys_sendmsg+0xe5/0x1b0 [ 1881.580779] ? __sys_sendmsg_sock+0x40/0x40 [ 1881.581207] ? rcu_read_lock_any_held+0x75/0xa0 [ 1881.581638] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1881.582157] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1881.582620] ? trace_hardirqs_on+0x5b/0x180 [ 1881.583076] do_syscall_64+0x33/0x40 [ 1881.583384] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1881.583900] RIP: 0033:0x7f482b2f9b19 [ 1881.584244] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1881.586058] RSP: 002b:00007f482886f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1881.586741] RAX: ffffffffffffffda RBX: 00007f482b40cf60 RCX: 00007f482b2f9b19 [ 1881.587457] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1881.588163] RBP: 00007f482886f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1881.588866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1881.589568] R13: 00007ffef22a59af R14: 00007f482886f300 R15: 0000000000022000 04:03:44 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e666174000208010004701c0000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:03:44 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x4800000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:03:44 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 26) 04:03:44 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x8000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:03:44 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 46) 04:03:44 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x106f) 04:03:44 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0xd, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 04:03:44 executing program 5: recvmmsg$unix(0xffffffffffffffff, &(0x7f0000008940)=[{{0x0, 0x0, &(0x7f0000003440)=[{&(0x7f0000000000)=""/83, 0x53}, {&(0x7f0000000080)=""/148, 0x94}, {&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000000240)=""/99, 0x63}, {&(0x7f0000002340)=""/4096, 0x1000}, {&(0x7f0000003340)=""/246, 0xf6}, {&(0x7f00000002c0)=""/33, 0x21}], 0x8, &(0x7f00000034c0)=[@cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x98}}, {{0x0, 0x0, &(0x7f0000003b80)=[{&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000003580)=""/74, 0x4a}, {&(0x7f0000003600)=""/139, 0x8b}, {&(0x7f00000036c0)=""/83, 0x53}, {&(0x7f0000003740)=""/200, 0xc8}, {&(0x7f0000003840)=""/155, 0x9b}, {&(0x7f0000003900)=""/75, 0x4b}, {&(0x7f0000003980)=""/234, 0xea}, {&(0x7f0000003a80)=""/240, 0xf0}], 0x9}}, {{&(0x7f0000003c40), 0x6e, &(0x7f00000050c0)=[{&(0x7f0000003cc0)=""/4096, 0x1000}, {&(0x7f0000004cc0)=""/232, 0xe8}, {&(0x7f0000004dc0)=""/225, 0xe1}, {&(0x7f0000004ec0)=""/6, 0x6}, {&(0x7f0000004f00)=""/218, 0xda}, {&(0x7f0000005000)=""/79, 0x4f}, {&(0x7f0000005080)=""/29, 0x1d}], 0x7, &(0x7f0000005140)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x128}}, {{&(0x7f0000005280), 0x6e, &(0x7f0000005340)=[{&(0x7f0000005300)=""/50, 0x32}], 0x1, &(0x7f0000005380)=ANY=[@ANYBLOB="0c000000000000090100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x98}}, {{&(0x7f0000005440)=@abs, 0x6e, &(0x7f0000005640)=[{&(0x7f00000054c0)=""/110, 0x6e}, {&(0x7f0000005540)=""/215, 0xd7}], 0x2, &(0x7f0000005680)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x158}}, {{&(0x7f0000005800), 0x6e, &(0x7f0000005c40)=[{&(0x7f0000005880)=""/189, 0xbd}, {&(0x7f0000005940)=""/226, 0xe2}, {&(0x7f0000005a40)=""/149, 0x95}, {&(0x7f0000005b00)=""/117, 0x75}, {&(0x7f0000005b80)=""/114, 0x72}, {&(0x7f0000005c00)}], 0x6}}, {{&(0x7f0000005cc0)=@abs, 0x6e, &(0x7f0000008240)=[{&(0x7f0000005d40)=""/221, 0xdd}, {&(0x7f0000005e40)=""/155, 0x9b}, {&(0x7f0000005f00)=""/4096, 0x1000}, {&(0x7f0000006f00)=""/210, 0xd2}, {&(0x7f0000007000)=""/45, 0x2d}, {&(0x7f0000007040)=""/178, 0xb2}, {&(0x7f0000007100)=""/4096, 0x1000}, {&(0x7f0000008100)=""/139, 0x8b}, {&(0x7f00000081c0)=""/38, 0x26}, {&(0x7f0000008200)=""/41, 0x29}], 0xa, &(0x7f0000008300)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000008340)=@abs, 0x6e, &(0x7f0000008880)=[{&(0x7f00000083c0)=""/227, 0xe3}, {&(0x7f00000084c0)=""/35, 0x23}, {&(0x7f0000008500)=""/107, 0x6b}, {&(0x7f0000008580)=""/10, 0xa}, {&(0x7f00000085c0)=""/159, 0x9f}, {&(0x7f0000008680)=""/222, 0xde}, {&(0x7f0000008780)=""/208, 0xd0}], 0x7, &(0x7f0000008900)=[@cred={{0x1c}}], 0x20}}], 0x8, 0x10000, &(0x7f0000008b40)={0x0, 0x3938700}) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, 0x5e, 0x7c15c02d21e6d5c5, 0x0, 0x0, {0x0, 0x0, 0x2}, [@nested={0x5, 0x0, 0x0, 0x1, [@generic="92"]}]}, 0x1c}}, 0x0) readv(r4, 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480), r3) sendmsg$TIPC_NL_BEARER_GET(r4, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000640)={&(0x7f00000004c0)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="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"], 0x104}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xc0, r5, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x4}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xd0}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1f}]}, @TIPC_NLA_SOCK={0x74, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x55}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}]}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8}]}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x40060}, 0x851) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000008f00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYRES32=r0, @ANYBLOB="000000002e2f66696c65300013e580ff66d750bf13a151e04b067c6422aac05a4cb242b67cdf688a19386b441814ad03a9cb086241abf56101ccfebff6ffc188ef1627b46db4c93534babf9e57d61d166641eecf7273cb3bf9b87b127720c8468f2f45fd9071f954e61c2d97cbe8402971bfce399331b40d7bd7c3974b38b9f27333854a0ba4703a0dbb27952ad6ad15e771636015248fbcb93ed0f327079af48b22d2a7f57ed14bcb5b6055cd34f8117ba5ab03afbdf73326bab37eea6b1e844900"/209]) sendmsg$IPCTNL_MSG_CT_GET_STATS(r6, &(0x7f0000008ec0)={&(0x7f0000008e00)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000008e80)={&(0x7f0000008e40)={0x14, 0x5, 0x1, 0x300, 0x0, 0x0, {0x3, 0x0, 0x3}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x2009c080}, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000008dc0)={&(0x7f0000008b80)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000008d80)={&(0x7f0000008bc0)={0x198, r5, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x124, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff0001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x67}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3c69e8d5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x47b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}]}, @TIPC_NLA_PUBL={0x54, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x68a5}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xcc}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x200}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x10000}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x198}, 0x1, 0x0, 0x0, 0x40014}, 0x4001) syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) [ 1896.953610] FAULT_INJECTION: forcing a failure. [ 1896.953610] name failslab, interval 1, probability 0, space 0, times 0 [ 1896.954852] CPU: 1 PID: 10559 Comm: syz-executor.3 Not tainted 5.10.213 #1 [ 1896.955535] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1896.956297] Call Trace: [ 1896.956564] dump_stack+0x107/0x167 [ 1896.956922] should_fail.cold+0x5/0xa [ 1896.957297] ? device_create_groups_vargs+0x8a/0x280 [ 1896.957816] should_failslab+0x5/0x20 [ 1896.958191] kmem_cache_alloc_trace+0x55/0x320 [ 1896.958639] device_create_groups_vargs+0x8a/0x280 [ 1896.959114] device_create+0xdc/0x120 [ 1896.959495] ? device_create_groups_vargs+0x280/0x280 [ 1896.959992] ? init_timer_key+0x12a/0x240 [ 1896.960418] ? ieee80211_alloc_hw_nm+0x1e5/0x2320 [ 1896.960902] mac80211_hwsim_new_radio+0x352/0x4250 [ 1896.961384] ? ____sys_sendmsg+0x70d/0x870 [ 1896.961788] ? ___sys_sendmsg+0xf3/0x170 [ 1896.962211] ? __sys_sendmsg+0xe5/0x1b0 [ 1896.962611] ? do_syscall_64+0x33/0x40 [ 1896.963022] ? entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1896.963547] ? lock_acquire+0x197/0x470 [ 1896.963943] ? create_object.isra.0+0x3ad/0xa20 [ 1896.964407] ? hwsim_send_nullfunc_ps+0x80/0x80 [ 1896.964864] ? __kmalloc+0x16e/0x390 [ 1896.965252] hwsim_new_radio_nl+0x991/0x1080 [ 1896.965703] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1896.966263] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 1896.966926] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 1896.967622] genl_family_rcv_msg_doit+0x22d/0x330 [ 1896.968122] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1896.968791] ? cap_capable+0x1cd/0x230 [ 1896.969206] ? ns_capable+0xe2/0x110 [ 1896.969575] genl_rcv_msg+0x33c/0x5a0 [ 1896.969948] ? genl_get_cmd+0x480/0x480 [ 1896.970343] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1896.970851] ? lock_release+0x680/0x680 [ 1896.971245] ? netlink_deliver_tap+0xf4/0xcc0 [ 1896.971693] netlink_rcv_skb+0x14b/0x430 [ 1896.972096] ? genl_get_cmd+0x480/0x480 [ 1896.972470] ? netlink_ack+0xab0/0xab0 [ 1896.972843] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1896.973291] ? is_vmalloc_addr+0x7b/0xb0 [ 1896.973685] genl_rcv+0x24/0x40 [ 1896.974004] netlink_unicast+0x549/0x7f0 [ 1896.974393] ? netlink_attachskb+0x870/0x870 [ 1896.974865] netlink_sendmsg+0x90f/0xdf0 [ 1896.975279] ? netlink_unicast+0x7f0/0x7f0 [ 1896.975718] ? netlink_unicast+0x7f0/0x7f0 [ 1896.976134] __sock_sendmsg+0x154/0x190 [ 1896.976531] ____sys_sendmsg+0x70d/0x870 [ 1896.976925] ? sock_write_iter+0x3d0/0x3d0 [ 1896.977356] ? do_recvmmsg+0x6d0/0x6d0 [ 1896.977734] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1896.978244] ? lock_downgrade+0x6d0/0x6d0 [ 1896.978639] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1896.979161] ___sys_sendmsg+0xf3/0x170 [ 1896.979527] ? sendmsg_copy_msghdr+0x160/0x160 [ 1896.979979] ? lock_downgrade+0x6d0/0x6d0 [ 1896.980368] ? find_held_lock+0x2c/0x110 [ 1896.980777] ? __fget_files+0x296/0x4c0 [ 1896.981178] ? __fget_light+0xea/0x290 [ 1896.981553] __sys_sendmsg+0xe5/0x1b0 [ 1896.981927] ? __sys_sendmsg_sock+0x40/0x40 [ 1896.982333] ? rcu_read_lock_any_held+0x75/0xa0 [ 1896.982811] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1896.983348] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1896.983846] ? trace_hardirqs_on+0x5b/0x180 [ 1896.984281] do_syscall_64+0x33/0x40 [ 1896.984656] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1896.985145] RIP: 0033:0x7f482b2f9b19 [ 1896.985529] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1896.987263] RSP: 002b:00007f482886f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1896.988034] RAX: ffffffffffffffda RBX: 00007f482b40cf60 RCX: 00007f482b2f9b19 [ 1896.988721] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1896.989424] RBP: 00007f482886f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1896.990144] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1896.990858] R13: 00007ffef22a59af R14: 00007f482886f300 R15: 0000000000022000 [ 1897.025806] FAULT_INJECTION: forcing a failure. [ 1897.025806] name failslab, interval 1, probability 0, space 0, times 0 [ 1897.027154] CPU: 1 PID: 10558 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1897.027847] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1897.028703] Call Trace: [ 1897.028982] dump_stack+0x107/0x167 [ 1897.029385] should_fail.cold+0x5/0xa [ 1897.029825] ? ext4_mb_new_blocks+0x64d/0x45b0 [ 1897.030319] should_failslab+0x5/0x20 [ 1897.030701] kmem_cache_alloc+0x5b/0x310 [ 1897.031130] ext4_mb_new_blocks+0x64d/0x45b0 [ 1897.031609] ? ext4_expand_extra_isize+0x5a0/0x5a0 [ 1897.032167] ? jbd2__journal_start+0xf3/0x7e0 [ 1897.032644] ? ext4_discard_preallocations+0xd80/0xd80 [ 1897.033201] ? ext4_dirty_inode+0x107/0x130 [ 1897.033674] ? __mark_inode_dirty+0x12e/0xd40 [ 1897.034167] ext4_new_meta_blocks+0x1e1/0x320 [ 1897.034625] ? ext4_should_retry_alloc+0x240/0x240 [ 1897.035136] ? lock_chain_count+0x20/0x20 [ 1897.035550] ? ext4_get_branch+0x541/0x6d0 [ 1897.035976] ext4_ind_map_blocks+0x95d/0x2150 [ 1897.036449] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1897.037042] ? ext4_free_branches+0x680/0x680 [ 1897.037566] ? lock_release+0x680/0x680 [ 1897.038032] ? lock_downgrade+0x6d0/0x6d0 [ 1897.038465] ? down_write+0xe0/0x160 [ 1897.038837] ? down_write_killable+0x180/0x180 [ 1897.039322] ext4_map_blocks+0x902/0x1910 [ 1897.039790] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1897.040306] ? trace_hardirqs_on+0x5b/0x180 [ 1897.040790] ? kmem_cache_alloc+0x2a6/0x310 [ 1897.041269] ext4_writepages+0x19bf/0x3350 [ 1897.041736] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1897.042290] ? quarantine_put+0x8b/0x1a0 [ 1897.042742] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1897.043350] ? __kasan_slab_free+0x122/0x160 [ 1897.043861] ? jbd2_journal_stop+0x61f/0xdc0 [ 1897.044373] ? jbd2_journal_stop+0x188/0xdc0 [ 1897.044864] ? balance_dirty_pages_ratelimited+0x43e/0x1ff0 [ 1897.045506] ? __ext4_journal_stop+0x107/0x1f0 [ 1897.046007] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 1897.046553] ? __mark_inode_dirty+0x12e/0xd40 [ 1897.047066] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1897.047636] do_writepages+0xee/0x2a0 [ 1897.048084] ? page_writeback_cpu_online+0x20/0x20 [ 1897.048572] ? ext4_buffered_write_iter+0x26a/0x4a0 [ 1897.049072] ? lock_downgrade+0x6d0/0x6d0 [ 1897.049472] ? generic_perform_write+0x37d/0x4f0 [ 1897.049928] __filemap_fdatawrite_range+0x24b/0x2f0 [ 1897.050430] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1897.050991] filemap_write_and_wait_range+0x65/0x100 [ 1897.051510] ext4_file_write_iter+0xc87/0x18d0 [ 1897.051990] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1897.052455] ? __lockdep_reset_lock+0x180/0x180 [ 1897.052924] ? __lockdep_reset_lock+0x180/0x180 [ 1897.053398] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1897.053938] new_sync_write+0x42c/0x660 [ 1897.054376] ? new_sync_read+0x6f0/0x6f0 [ 1897.054775] ? ksys_write+0x12d/0x260 [ 1897.055190] ? lock_release+0x680/0x680 [ 1897.055564] ? selinux_file_permission+0x92/0x520 [ 1897.056066] ? __fget_files+0x296/0x4c0 [ 1897.056485] vfs_write+0x747/0xa70 [ 1897.056848] ksys_write+0x12d/0x260 [ 1897.057215] ? __ia32_sys_read+0xb0/0xb0 [ 1897.057625] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1897.058159] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1897.058686] do_syscall_64+0x33/0x40 [ 1897.059074] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1897.059602] RIP: 0033:0x7f21b1e90b19 [ 1897.059995] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1897.061824] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1897.062598] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1897.063315] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1897.064027] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1897.064734] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1897.065457] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 04:03:45 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xe000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:03:45 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x4c00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:03:45 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 27) 04:03:45 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1070) 04:03:45 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:03:45 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x6800000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:03:45 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1071) 04:03:45 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 47) [ 1897.360680] FAULT_INJECTION: forcing a failure. [ 1897.360680] name failslab, interval 1, probability 0, space 0, times 0 [ 1897.361956] CPU: 1 PID: 10587 Comm: syz-executor.3 Not tainted 5.10.213 #1 [ 1897.362653] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1897.363496] Call Trace: [ 1897.363770] dump_stack+0x107/0x167 [ 1897.364147] should_fail.cold+0x5/0xa [ 1897.364533] ? create_object.isra.0+0x3a/0xa20 [ 1897.365006] should_failslab+0x5/0x20 [ 1897.365393] kmem_cache_alloc+0x5b/0x310 [ 1897.365809] create_object.isra.0+0x3a/0xa20 [ 1897.366263] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1897.366786] kmem_cache_alloc_trace+0x151/0x320 [ 1897.367283] device_create_groups_vargs+0x8a/0x280 [ 1897.367788] device_create+0xdc/0x120 [ 1897.368187] ? device_create_groups_vargs+0x280/0x280 [ 1897.368714] ? init_timer_key+0x12a/0x240 [ 1897.369151] ? ieee80211_alloc_hw_nm+0x1e5/0x2320 [ 1897.369653] mac80211_hwsim_new_radio+0x352/0x4250 [ 1897.370150] ? ____sys_sendmsg+0x70d/0x870 [ 1897.370577] ? ___sys_sendmsg+0xf3/0x170 [ 1897.370995] ? __sys_sendmsg+0xe5/0x1b0 [ 1897.371409] ? do_syscall_64+0x33/0x40 [ 1897.371798] ? entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1897.372324] ? __lockdep_reset_lock+0x180/0x180 [ 1897.372788] ? lock_acquire+0x197/0x470 [ 1897.373189] ? create_object.isra.0+0x3ad/0xa20 [ 1897.373666] ? hwsim_send_nullfunc_ps+0x80/0x80 [ 1897.374151] ? __kmalloc+0x16e/0x390 [ 1897.374545] hwsim_new_radio_nl+0x991/0x1080 [ 1897.374981] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1897.375521] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 1897.376186] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 1897.376849] genl_family_rcv_msg_doit+0x22d/0x330 [ 1897.377352] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1897.378025] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1897.378568] ? cap_capable+0x1cd/0x230 [ 1897.378982] ? ns_capable+0xe2/0x110 [ 1897.379380] genl_rcv_msg+0x33c/0x5a0 [ 1897.379772] ? genl_get_cmd+0x480/0x480 [ 1897.380178] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1897.380713] ? lock_release+0x680/0x680 [ 1897.381117] ? netlink_deliver_tap+0xf4/0xcc0 [ 1897.381570] netlink_rcv_skb+0x14b/0x430 [ 1897.381988] ? genl_get_cmd+0x480/0x480 [ 1897.382388] ? netlink_ack+0xab0/0xab0 [ 1897.382791] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1897.383271] ? is_vmalloc_addr+0x7b/0xb0 [ 1897.383686] genl_rcv+0x24/0x40 [ 1897.384024] netlink_unicast+0x549/0x7f0 [ 1897.384441] ? netlink_attachskb+0x870/0x870 [ 1897.384900] netlink_sendmsg+0x90f/0xdf0 [ 1897.385322] ? netlink_unicast+0x7f0/0x7f0 [ 1897.385759] ? netlink_unicast+0x7f0/0x7f0 [ 1897.386202] __sock_sendmsg+0x154/0x190 [ 1897.386606] ____sys_sendmsg+0x70d/0x870 [ 1897.387020] ? sock_write_iter+0x3d0/0x3d0 [ 1897.387461] ? do_recvmmsg+0x6d0/0x6d0 [ 1897.387860] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1897.388386] ? lock_downgrade+0x6d0/0x6d0 [ 1897.388803] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1897.389341] ___sys_sendmsg+0xf3/0x170 [ 1897.389746] ? sendmsg_copy_msghdr+0x160/0x160 [ 1897.390219] ? lock_downgrade+0x6d0/0x6d0 [ 1897.390647] ? find_held_lock+0x2c/0x110 [ 1897.391073] ? __fget_files+0x296/0x4c0 [ 1897.391501] ? __fget_light+0xea/0x290 [ 1897.391917] __sys_sendmsg+0xe5/0x1b0 [ 1897.392306] ? __sys_sendmsg_sock+0x40/0x40 [ 1897.392738] ? rcu_read_lock_any_held+0x75/0xa0 [ 1897.393231] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1897.393762] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1897.394282] ? trace_hardirqs_on+0x5b/0x180 [ 1897.394723] do_syscall_64+0x33/0x40 [ 1897.395123] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1897.395641] RIP: 0033:0x7f482b2f9b19 [ 1897.396032] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1897.397867] RSP: 002b:00007f482886f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1897.398639] RAX: ffffffffffffffda RBX: 00007f482b40cf60 RCX: 00007f482b2f9b19 [ 1897.399378] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1897.400099] RBP: 00007f482886f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1897.400817] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1897.401536] R13: 00007ffef22a59af R14: 00007f482886f300 R15: 0000000000022000 [ 1897.440648] FAULT_INJECTION: forcing a failure. [ 1897.440648] name failslab, interval 1, probability 0, space 0, times 0 [ 1897.441863] CPU: 1 PID: 10595 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1897.442565] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1897.443402] Call Trace: [ 1897.443676] dump_stack+0x107/0x167 [ 1897.444048] should_fail.cold+0x5/0xa [ 1897.444441] ? create_object.isra.0+0x3a/0xa20 [ 1897.444907] should_failslab+0x5/0x20 [ 1897.445286] kmem_cache_alloc+0x5b/0x310 [ 1897.445696] ? ext4_mark_iloc_dirty+0x1c24/0x3630 [ 1897.446179] create_object.isra.0+0x3a/0xa20 [ 1897.446621] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1897.447143] kmem_cache_alloc+0x159/0x310 [ 1897.447566] ext4_mb_new_blocks+0x64d/0x45b0 [ 1897.448010] ? ext4_expand_extra_isize+0x5a0/0x5a0 [ 1897.448505] ? jbd2__journal_start+0xf3/0x7e0 [ 1897.448954] ? ext4_discard_preallocations+0xd80/0xd80 [ 1897.449484] ? ext4_dirty_inode+0x107/0x130 [ 1897.449916] ? __mark_inode_dirty+0x12e/0xd40 [ 1897.450381] ext4_new_meta_blocks+0x1e1/0x320 [ 1897.450830] ? ext4_should_retry_alloc+0x240/0x240 [ 1897.451341] ? lock_chain_count+0x20/0x20 [ 1897.451749] ? ext4_get_branch+0x541/0x6d0 [ 1897.452183] ext4_ind_map_blocks+0x95d/0x2150 [ 1897.452637] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1897.453189] ? ext4_free_branches+0x680/0x680 [ 1897.453653] ? lock_release+0x680/0x680 [ 1897.454072] ? lock_downgrade+0x6d0/0x6d0 [ 1897.454498] ? down_write+0xe0/0x160 [ 1897.454881] ? down_write_killable+0x180/0x180 [ 1897.455355] ext4_map_blocks+0x902/0x1910 [ 1897.455781] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1897.456228] ? trace_hardirqs_on+0x5b/0x180 [ 1897.456665] ? kmem_cache_alloc+0x2a6/0x310 [ 1897.457113] ext4_writepages+0x19bf/0x3350 [ 1897.457567] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1897.458087] ? quarantine_put+0x8b/0x1a0 [ 1897.458500] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1897.458985] ? __kasan_slab_free+0x122/0x160 [ 1897.459445] ? jbd2_journal_stop+0x61f/0xdc0 [ 1897.459900] ? jbd2_journal_stop+0x188/0xdc0 [ 1897.460354] ? balance_dirty_pages_ratelimited+0x43e/0x1ff0 [ 1897.460913] ? __ext4_journal_stop+0x107/0x1f0 [ 1897.461383] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 1897.461883] ? __mark_inode_dirty+0x12e/0xd40 [ 1897.462352] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1897.462834] do_writepages+0xee/0x2a0 [ 1897.463241] ? page_writeback_cpu_online+0x20/0x20 [ 1897.463734] ? ext4_buffered_write_iter+0x26a/0x4a0 [ 1897.464234] ? lock_downgrade+0x6d0/0x6d0 [ 1897.464653] ? generic_perform_write+0x37d/0x4f0 [ 1897.465141] __filemap_fdatawrite_range+0x24b/0x2f0 [ 1897.465633] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1897.466175] filemap_write_and_wait_range+0x65/0x100 [ 1897.466659] ext4_file_write_iter+0xc87/0x18d0 [ 1897.467151] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1897.467604] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1897.468145] new_sync_write+0x42c/0x660 [ 1897.468541] ? new_sync_read+0x6f0/0x6f0 [ 1897.468947] ? ksys_write+0x12d/0x260 [ 1897.469337] ? lock_release+0x680/0x680 [ 1897.469738] ? selinux_file_permission+0x92/0x520 [ 1897.470228] ? __fget_files+0x296/0x4c0 [ 1897.470647] vfs_write+0x747/0xa70 [ 1897.471015] ksys_write+0x12d/0x260 [ 1897.471391] ? __ia32_sys_read+0xb0/0xb0 [ 1897.471784] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1897.472302] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1897.472804] do_syscall_64+0x33/0x40 [ 1897.473170] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1897.473676] RIP: 0033:0x7f21b1e90b19 [ 1897.474059] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1897.475837] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1897.476582] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1897.477274] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1897.477967] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1897.478671] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1897.479384] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 04:03:45 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1072) 04:03:45 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470660000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:03:45 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x6c00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:03:45 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x101000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:03:45 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1073) 04:03:45 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 48) [ 1897.823184] FAULT_INJECTION: forcing a failure. [ 1897.823184] name failslab, interval 1, probability 0, space 0, times 0 [ 1897.824385] CPU: 1 PID: 10620 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1897.825081] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1897.825908] Call Trace: [ 1897.826187] dump_stack+0x107/0x167 [ 1897.826564] should_fail.cold+0x5/0xa [ 1897.826958] ? ext4_mb_new_blocks+0x209f/0x45b0 [ 1897.827455] should_failslab+0x5/0x20 [ 1897.827848] kmem_cache_alloc+0x5b/0x310 [ 1897.828265] ext4_mb_new_blocks+0x209f/0x45b0 [ 1897.828724] ? ext4_expand_extra_isize+0x5a0/0x5a0 [ 1897.829239] ? jbd2__journal_start+0xf3/0x7e0 [ 1897.829708] ? ext4_discard_preallocations+0xd80/0xd80 [ 1897.830271] ? ext4_dirty_inode+0x107/0x130 [ 1897.830720] ? __mark_inode_dirty+0x12e/0xd40 [ 1897.831200] ext4_new_meta_blocks+0x1e1/0x320 [ 1897.831652] ? ext4_should_retry_alloc+0x240/0x240 [ 1897.832143] ? lock_chain_count+0x20/0x20 [ 1897.832566] ? ext4_get_branch+0x541/0x6d0 [ 1897.833012] ext4_ind_map_blocks+0x95d/0x2150 [ 1897.833482] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1897.834001] ? ext4_free_branches+0x680/0x680 [ 1897.834483] ? lock_release+0x680/0x680 [ 1897.834899] ? lock_downgrade+0x6d0/0x6d0 [ 1897.835358] ? down_write+0xe0/0x160 [ 1897.835737] ? down_write_killable+0x180/0x180 [ 1897.836224] ext4_map_blocks+0x902/0x1910 [ 1897.836649] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1897.837112] ? trace_hardirqs_on+0x5b/0x180 [ 1897.837552] ? kmem_cache_alloc+0x2a6/0x310 [ 1897.838013] ext4_writepages+0x19bf/0x3350 [ 1897.838471] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1897.839005] ? quarantine_put+0x8b/0x1a0 [ 1897.839444] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1897.839947] ? __kasan_slab_free+0x122/0x160 [ 1897.840392] ? jbd2_journal_stop+0x61f/0xdc0 [ 1897.840861] ? jbd2_journal_stop+0x188/0xdc0 [ 1897.841308] ? balance_dirty_pages_ratelimited+0x43e/0x1ff0 [ 1897.841885] ? __ext4_journal_stop+0x107/0x1f0 [ 1897.842342] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 1897.842842] ? __mark_inode_dirty+0x12e/0xd40 [ 1897.843320] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1897.843817] do_writepages+0xee/0x2a0 [ 1897.844209] ? page_writeback_cpu_online+0x20/0x20 [ 1897.844711] ? ext4_buffered_write_iter+0x26a/0x4a0 [ 1897.845209] ? lock_downgrade+0x6d0/0x6d0 [ 1897.845643] ? generic_perform_write+0x37d/0x4f0 [ 1897.846134] __filemap_fdatawrite_range+0x24b/0x2f0 [ 1897.846642] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1897.847215] filemap_write_and_wait_range+0x65/0x100 [ 1897.847735] ext4_file_write_iter+0xc87/0x18d0 [ 1897.848212] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1897.848678] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1897.849218] new_sync_write+0x42c/0x660 [ 1897.849621] ? new_sync_read+0x6f0/0x6f0 [ 1897.850038] ? ksys_write+0x12d/0x260 [ 1897.850431] ? lock_release+0x680/0x680 [ 1897.850832] ? selinux_file_permission+0x92/0x520 [ 1897.851337] ? __fget_files+0x296/0x4c0 [ 1897.851758] vfs_write+0x747/0xa70 [ 1897.852131] ksys_write+0x12d/0x260 [ 1897.852497] ? __ia32_sys_read+0xb0/0xb0 [ 1897.852925] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1897.853455] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1897.853987] do_syscall_64+0x33/0x40 [ 1897.854369] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1897.854878] RIP: 0033:0x7f21b1e90b19 [ 1897.855271] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1897.857044] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1897.857812] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1897.858520] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1897.859239] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1897.859940] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1897.860645] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 04:04:01 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 28) 04:04:01 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x7400000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:04:01 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:04:01 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1074) 04:04:01 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000300f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:04:01 executing program 5: syslog(0x3, &(0x7f0000001340)=""/4080, 0xff0) syslog(0x9, &(0x7f0000000000)=""/127, 0x7f) 04:04:01 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0xe, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 04:04:01 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 49) [ 1913.945517] FAULT_INJECTION: forcing a failure. [ 1913.945517] name failslab, interval 1, probability 0, space 0, times 0 [ 1913.946863] CPU: 0 PID: 10641 Comm: syz-executor.3 Not tainted 5.10.213 #1 [ 1913.947567] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1913.948396] Call Trace: [ 1913.948679] dump_stack+0x107/0x167 [ 1913.949061] should_fail.cold+0x5/0xa [ 1913.949462] should_failslab+0x5/0x20 [ 1913.949860] __kmalloc_track_caller+0x79/0x370 [ 1913.950326] ? kvasprintf_const+0x60/0x1a0 [ 1913.950764] kvasprintf+0xb5/0x150 [ 1913.951136] ? bust_spinlocks+0xe0/0xe0 [ 1913.951570] ? lockdep_init_map_type+0x2c7/0x780 [ 1913.952066] kvasprintf_const+0x60/0x1a0 [ 1913.952493] kobject_set_name_vargs+0x56/0x150 [ 1913.952966] device_create_groups_vargs+0x1c0/0x280 [ 1913.953487] device_create+0xdc/0x120 [ 1913.953882] ? device_create_groups_vargs+0x280/0x280 [ 1913.954407] ? init_timer_key+0x12a/0x240 [ 1913.954843] ? ieee80211_alloc_hw_nm+0x1e5/0x2320 [ 1913.955355] mac80211_hwsim_new_radio+0x352/0x4250 [ 1913.955849] ? ____sys_sendmsg+0x70d/0x870 [ 1913.956272] ? ___sys_sendmsg+0xf3/0x170 [ 1913.956683] ? __sys_sendmsg+0xe5/0x1b0 [ 1913.957085] ? do_syscall_64+0x33/0x40 [ 1913.957481] ? entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1913.958008] ? lock_acquire+0x197/0x470 [ 1913.958407] ? create_object.isra.0+0x3ad/0xa20 [ 1913.958893] ? hwsim_send_nullfunc_ps+0x80/0x80 [ 1913.959379] ? __kmalloc+0x16e/0x390 [ 1913.959784] hwsim_new_radio_nl+0x991/0x1080 [ 1913.960264] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1913.960798] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 1913.961462] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 1913.962113] genl_family_rcv_msg_doit+0x22d/0x330 [ 1913.962609] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1913.963271] ? cap_capable+0x1cd/0x230 [ 1913.963699] ? ns_capable+0xe2/0x110 [ 1913.964076] genl_rcv_msg+0x33c/0x5a0 [ 1913.964465] ? genl_get_cmd+0x480/0x480 [ 1913.964864] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1913.965385] ? lock_release+0x680/0x680 [ 1913.965785] ? netlink_deliver_tap+0xf4/0xcc0 [ 1913.966242] netlink_rcv_skb+0x14b/0x430 [ 1913.966651] ? genl_get_cmd+0x480/0x480 [ 1913.967060] ? netlink_ack+0xab0/0xab0 [ 1913.967479] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1913.967942] ? is_vmalloc_addr+0x7b/0xb0 [ 1913.968348] genl_rcv+0x24/0x40 [ 1913.968688] netlink_unicast+0x549/0x7f0 [ 1913.969110] ? netlink_attachskb+0x870/0x870 [ 1913.969576] netlink_sendmsg+0x90f/0xdf0 [ 1913.970006] ? netlink_unicast+0x7f0/0x7f0 [ 1913.970454] ? netlink_unicast+0x7f0/0x7f0 [ 1913.970893] __sock_sendmsg+0x154/0x190 [ 1913.971315] ____sys_sendmsg+0x70d/0x870 [ 1913.971733] ? sock_write_iter+0x3d0/0x3d0 [ 1913.972163] ? do_recvmmsg+0x6d0/0x6d0 [ 1913.972559] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1913.973093] ? lock_downgrade+0x6d0/0x6d0 [ 1913.973516] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1913.974061] ___sys_sendmsg+0xf3/0x170 [ 1913.974460] ? sendmsg_copy_msghdr+0x160/0x160 [ 1913.974926] ? lock_downgrade+0x6d0/0x6d0 [ 1913.975360] ? find_held_lock+0x2c/0x110 [ 1913.975786] ? __fget_files+0x296/0x4c0 [ 1913.976200] ? __fget_light+0xea/0x290 [ 1913.976607] __sys_sendmsg+0xe5/0x1b0 [ 1913.977004] ? __sys_sendmsg_sock+0x40/0x40 [ 1913.977442] ? trace_hardirqs_on+0x5b/0x180 [ 1913.977902] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1913.978424] ? syscall_enter_from_user_mode+0x27/0x50 [ 1913.978952] do_syscall_64+0x33/0x40 [ 1913.979334] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1913.979855] RIP: 0033:0x7f482b2f9b19 [ 1913.980246] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1913.982057] RSP: 002b:00007f482886f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1913.982818] RAX: ffffffffffffffda RBX: 00007f482b40cf60 RCX: 00007f482b2f9b19 [ 1913.983543] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1913.984260] RBP: 00007f482886f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1913.984976] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1913.985696] R13: 00007ffef22a59af R14: 00007f482886f300 R15: 0000000000022000 [ 1914.028786] FAULT_INJECTION: forcing a failure. [ 1914.028786] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1914.030193] CPU: 0 PID: 10646 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1914.030894] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1914.031741] Call Trace: [ 1914.032041] dump_stack+0x107/0x167 [ 1914.032411] should_fail.cold+0x5/0xa [ 1914.032808] __alloc_pages_nodemask+0x182/0x600 [ 1914.033315] ? entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1914.033861] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 1914.034494] alloc_pages_current+0x187/0x280 [ 1914.034964] allocate_slab+0x26f/0x380 [ 1914.035384] ___slab_alloc+0x470/0x700 [ 1914.035781] ? ext4_mb_new_blocks+0x209f/0x45b0 [ 1914.036291] ? ext4_mb_initialize_context+0x846/0xc10 [ 1914.036811] ? ext4_mb_normalize_request.constprop.0+0x5b/0x17f0 [ 1914.037445] ? ext4_mb_new_blocks+0x209f/0x45b0 [ 1914.037923] ? kmem_cache_alloc+0x301/0x310 [ 1914.038367] ? ext4_mb_new_blocks+0x209f/0x45b0 [ 1914.038830] kmem_cache_alloc+0x301/0x310 [ 1914.039281] ext4_mb_new_blocks+0x209f/0x45b0 [ 1914.039744] ? ext4_expand_extra_isize+0x5a0/0x5a0 [ 1914.040273] ? jbd2__journal_start+0xf3/0x7e0 [ 1914.040736] ? ext4_discard_preallocations+0xd80/0xd80 [ 1914.041303] ? ext4_dirty_inode+0x107/0x130 [ 1914.041738] ? __mark_inode_dirty+0x12e/0xd40 [ 1914.042230] ext4_new_meta_blocks+0x1e1/0x320 [ 1914.042688] ? ext4_should_retry_alloc+0x240/0x240 [ 1914.043218] ? lock_chain_count+0x20/0x20 [ 1914.043649] ? ext4_get_branch+0x541/0x6d0 [ 1914.044090] ext4_ind_map_blocks+0x95d/0x2150 [ 1914.044553] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1914.045118] ? ext4_free_branches+0x680/0x680 [ 1914.045583] ? lock_release+0x680/0x680 [ 1914.046017] ? lock_downgrade+0x6d0/0x6d0 [ 1914.046458] ? down_write+0xe0/0x160 [ 1914.046844] ? down_write_killable+0x180/0x180 [ 1914.047338] ext4_map_blocks+0x902/0x1910 [ 1914.047776] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1914.048255] ? trace_hardirqs_on+0x5b/0x180 [ 1914.048695] ? kmem_cache_alloc+0x2a6/0x310 [ 1914.049177] ext4_writepages+0x19bf/0x3350 [ 1914.049612] ? visit_groups_merge.constprop.0.isra.0+0x771/0xae0 [ 1914.050280] ? lock_chain_count+0x20/0x20 [ 1914.050701] ? visit_groups_merge.constprop.0.isra.0+0xae0/0xae0 [ 1914.051354] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1914.051877] ? mark_held_locks+0x9e/0xe0 [ 1914.052309] ? balance_dirty_pages_ratelimited+0x43e/0x1ff0 [ 1914.052889] ? mark_lock+0xf5/0x2df0 [ 1914.053285] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1914.053742] ? finish_task_switch+0x126/0x5d0 [ 1914.054221] ? finish_task_switch+0xef/0x5d0 [ 1914.054666] ? lock_chain_count+0x20/0x20 [ 1914.055122] ? __schedule+0x82c/0x1ea0 [ 1914.055538] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1914.056063] do_writepages+0xee/0x2a0 [ 1914.056454] ? page_writeback_cpu_online+0x20/0x20 [ 1914.056960] ? ext4_buffered_write_iter+0x26a/0x4a0 [ 1914.057467] ? mark_held_locks+0x9e/0xe0 [ 1914.057897] __filemap_fdatawrite_range+0x24b/0x2f0 [ 1914.058410] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1914.058969] ? ext4_buffered_write_iter+0x274/0x4a0 [ 1914.059494] ? __sanitizer_cov_trace_const_cmp8+0x4/0x20 [ 1914.060070] filemap_write_and_wait_range+0x65/0x100 [ 1914.060586] ext4_file_write_iter+0xc87/0x18d0 [ 1914.061082] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1914.061542] ? __lockdep_reset_lock+0x180/0x180 [ 1914.062038] ? __lockdep_reset_lock+0x180/0x180 [ 1914.062515] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1914.063082] new_sync_write+0x42c/0x660 [ 1914.063498] ? new_sync_read+0x6f0/0x6f0 [ 1914.063917] ? ksys_write+0x12d/0x260 [ 1914.064310] ? lock_release+0x680/0x680 [ 1914.064711] ? selinux_file_permission+0x92/0x520 [ 1914.065222] ? __fget_files+0x296/0x4c0 [ 1914.065633] vfs_write+0x747/0xa70 [ 1914.066028] ksys_write+0x12d/0x260 [ 1914.066394] ? __ia32_sys_read+0xb0/0xb0 [ 1914.066800] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1914.067356] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1914.067885] do_syscall_64+0x33/0x40 [ 1914.068277] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1914.068796] RIP: 0033:0x7f21b1e90b19 [ 1914.069210] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1914.071116] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1914.071886] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1914.072607] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1914.073334] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1914.074113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1914.074895] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 04:04:17 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0xf, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 04:04:17 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470800400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:04:17 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000180)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_SETPARAMS(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5}, @IEEE802154_ATTR_LLSEC_SECLEVEL={0x5}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r3}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}]}, 0x34}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r4) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="01000000000000000000010000000800020005000000085a75513b305b76e6469b554996ac3a66861088b39ef9d1cac7efb80ab3d67eebc890c5629bd0b3a00a0417015b2b865dc42b9d00"/84], 0x24}}, 0x0) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r5, 0x800, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @remote}, @NLBL_MGMT_A_DOMAIN={0x6, 0x1, ']\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x20000800) syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) syslog(0x0, &(0x7f0000001340)=""/4096, 0x1000) 04:04:17 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x7800000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:04:17 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 29) 04:04:17 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:04:17 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1075) 04:04:17 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 50) [ 1929.479167] FAULT_INJECTION: forcing a failure. [ 1929.479167] name failslab, interval 1, probability 0, space 0, times 0 [ 1929.480337] CPU: 0 PID: 10668 Comm: syz-executor.3 Not tainted 5.10.213 #1 [ 1929.480987] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1929.481817] Call Trace: [ 1929.482089] dump_stack+0x107/0x167 [ 1929.482465] should_fail.cold+0x5/0xa [ 1929.482869] ? create_object.isra.0+0x3a/0xa20 [ 1929.483338] should_failslab+0x5/0x20 [ 1929.483746] kmem_cache_alloc+0x5b/0x310 [ 1929.484167] ? vsnprintf+0x4ba/0x1600 [ 1929.484562] create_object.isra.0+0x3a/0xa20 [ 1929.484700] FAULT_INJECTION: forcing a failure. [ 1929.484700] name failslab, interval 1, probability 0, space 0, times 0 [ 1929.485013] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1929.485033] __kmalloc_track_caller+0x177/0x370 [ 1929.485055] ? kvasprintf_const+0x60/0x1a0 [ 1929.487367] kvasprintf+0xb5/0x150 [ 1929.487740] ? bust_spinlocks+0xe0/0xe0 [ 1929.488154] ? lockdep_init_map_type+0x2c7/0x780 [ 1929.488633] kvasprintf_const+0x60/0x1a0 [ 1929.489051] kobject_set_name_vargs+0x56/0x150 [ 1929.489522] device_create_groups_vargs+0x1c0/0x280 [ 1929.490026] device_create+0xdc/0x120 [ 1929.490413] ? device_create_groups_vargs+0x280/0x280 [ 1929.490941] ? init_timer_key+0x12a/0x240 [ 1929.491374] ? ieee80211_alloc_hw_nm+0x1e5/0x2320 [ 1929.491889] mac80211_hwsim_new_radio+0x352/0x4250 [ 1929.492377] ? ____sys_sendmsg+0x70d/0x870 [ 1929.492807] ? ___sys_sendmsg+0xf3/0x170 [ 1929.493216] ? __sys_sendmsg+0xe5/0x1b0 [ 1929.493623] ? do_syscall_64+0x33/0x40 [ 1929.494021] ? entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1929.494555] ? lock_acquire+0x197/0x470 [ 1929.494958] ? create_object.isra.0+0x3ad/0xa20 [ 1929.495429] ? hwsim_send_nullfunc_ps+0x80/0x80 [ 1929.495920] ? __kmalloc+0x16e/0x390 [ 1929.496305] hwsim_new_radio_nl+0x991/0x1080 [ 1929.496741] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1929.497275] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 1929.497929] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 1929.498595] genl_family_rcv_msg_doit+0x22d/0x330 [ 1929.499087] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1929.499768] ? cap_capable+0x1cd/0x230 [ 1929.500173] ? ns_capable+0xe2/0x110 [ 1929.500559] genl_rcv_msg+0x33c/0x5a0 [ 1929.500948] ? genl_get_cmd+0x480/0x480 [ 1929.501355] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1929.501874] ? lock_release+0x680/0x680 [ 1929.502285] ? netlink_deliver_tap+0xf4/0xcc0 [ 1929.502732] netlink_rcv_skb+0x14b/0x430 [ 1929.503151] ? genl_get_cmd+0x480/0x480 [ 1929.503587] ? netlink_ack+0xab0/0xab0 [ 1929.503994] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1929.504451] ? is_vmalloc_addr+0x7b/0xb0 [ 1929.504870] genl_rcv+0x24/0x40 [ 1929.505209] netlink_unicast+0x549/0x7f0 [ 1929.505634] ? netlink_attachskb+0x870/0x870 [ 1929.506092] netlink_sendmsg+0x90f/0xdf0 [ 1929.506515] ? netlink_unicast+0x7f0/0x7f0 [ 1929.506949] ? netlink_unicast+0x7f0/0x7f0 [ 1929.507390] __sock_sendmsg+0x154/0x190 [ 1929.507803] ____sys_sendmsg+0x70d/0x870 [ 1929.508230] ? sock_write_iter+0x3d0/0x3d0 [ 1929.508655] ? do_recvmmsg+0x6d0/0x6d0 [ 1929.509061] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1929.509585] ? lock_downgrade+0x6d0/0x6d0 [ 1929.510015] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1929.510541] ___sys_sendmsg+0xf3/0x170 [ 1929.510946] ? sendmsg_copy_msghdr+0x160/0x160 [ 1929.511413] ? lock_downgrade+0x6d0/0x6d0 [ 1929.511853] ? find_held_lock+0x2c/0x110 [ 1929.512269] ? __fget_files+0x296/0x4c0 [ 1929.512679] ? __fget_light+0xea/0x290 [ 1929.513070] __sys_sendmsg+0xe5/0x1b0 [ 1929.513454] ? __sys_sendmsg_sock+0x40/0x40 [ 1929.513891] ? rcu_read_lock_any_held+0x75/0xa0 [ 1929.514369] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1929.514898] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1929.515410] ? trace_hardirqs_on+0x5b/0x180 [ 1929.515859] do_syscall_64+0x33/0x40 [ 1929.516231] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1929.516748] RIP: 0033:0x7f482b2f9b19 [ 1929.517126] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1929.518940] RSP: 002b:00007f482886f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1929.519704] RAX: ffffffffffffffda RBX: 00007f482b40cf60 RCX: 00007f482b2f9b19 [ 1929.520427] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1929.521128] RBP: 00007f482886f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1929.521834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1929.522530] R13: 00007ffef22a59af R14: 00007f482886f300 R15: 0000000000022000 [ 1929.523253] CPU: 1 PID: 10671 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1929.523892] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1929.524572] Call Trace: [ 1929.524800] dump_stack+0x107/0x167 [ 1929.525106] should_fail.cold+0x5/0xa [ 1929.525417] ? jbd2_journal_add_journal_head+0x1a3/0x540 [ 1929.525858] should_failslab+0x5/0x20 [ 1929.526178] kmem_cache_alloc+0x5b/0x310 [ 1929.526518] jbd2_journal_add_journal_head+0x1a3/0x540 [ 1929.526957] jbd2_journal_get_create_access+0x40/0x560 [ 1929.527400] __ext4_journal_get_create_access+0x43/0x90 [ 1929.527856] ext4_ind_map_blocks+0xbbd/0x2150 [ 1929.528235] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1929.528664] ? ext4_free_branches+0x680/0x680 [ 1929.529034] ? lock_release+0x680/0x680 [ 1929.529364] ? lock_downgrade+0x6d0/0x6d0 [ 1929.529719] ? down_write_killable+0x180/0x180 [ 1929.530115] ext4_map_blocks+0x902/0x1910 [ 1929.530480] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1929.530854] ? trace_hardirqs_on+0x5b/0x180 [ 1929.531207] ? kmem_cache_alloc+0x2a6/0x310 [ 1929.531573] ext4_writepages+0x19bf/0x3350 [ 1929.531966] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1929.532422] ? quarantine_put+0x8b/0x1a0 [ 1929.532766] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1929.533169] ? __kasan_slab_free+0x122/0x160 [ 1929.533525] ? jbd2_journal_stop+0x61f/0xdc0 [ 1929.533889] ? jbd2_journal_stop+0x188/0xdc0 [ 1929.534246] ? balance_dirty_pages_ratelimited+0x43e/0x1ff0 [ 1929.534715] ? __ext4_journal_stop+0x107/0x1f0 [ 1929.535092] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 1929.535503] ? __mark_inode_dirty+0x12e/0xd40 [ 1929.535881] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1929.536299] do_writepages+0xee/0x2a0 [ 1929.536610] ? page_writeback_cpu_online+0x20/0x20 [ 1929.537006] ? ext4_buffered_write_iter+0x26a/0x4a0 [ 1929.537409] ? lock_downgrade+0x6d0/0x6d0 [ 1929.537743] ? generic_perform_write+0x37d/0x4f0 [ 1929.538132] __filemap_fdatawrite_range+0x24b/0x2f0 [ 1929.538543] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1929.538983] filemap_write_and_wait_range+0x65/0x100 [ 1929.539419] ext4_file_write_iter+0xc87/0x18d0 [ 1929.539814] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1929.540204] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1929.540635] new_sync_write+0x42c/0x660 [ 1929.540985] ? new_sync_read+0x6f0/0x6f0 [ 1929.541310] ? ksys_write+0x12d/0x260 [ 1929.541625] ? lock_release+0x680/0x680 [ 1929.541960] ? selinux_file_permission+0x92/0x520 [ 1929.542360] ? __fget_files+0x296/0x4c0 [ 1929.542693] vfs_write+0x747/0xa70 [ 1929.542997] ksys_write+0x12d/0x260 [ 1929.543291] ? __ia32_sys_read+0xb0/0xb0 [ 1929.543637] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1929.544084] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1929.544512] do_syscall_64+0x33/0x40 [ 1929.544823] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1929.545256] RIP: 0033:0x7f21b1e90b19 [ 1929.545561] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1929.547097] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1929.547728] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1929.548324] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1929.548906] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1929.549488] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1929.550061] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 [ 1929.550859] ENOMEM in journal_alloc_journal_head, retrying. 04:04:17 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x301000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:04:17 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 51) 04:04:17 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1076) 04:04:17 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x7a00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:04:17 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x330000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1929.802719] FAULT_INJECTION: forcing a failure. [ 1929.802719] name failslab, interval 1, probability 0, space 0, times 0 [ 1929.803717] CPU: 1 PID: 10692 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1929.804256] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1929.804894] Call Trace: [ 1929.805104] dump_stack+0x107/0x167 [ 1929.805391] should_fail.cold+0x5/0xa [ 1929.805691] ? create_object.isra.0+0x3a/0xa20 [ 1929.806052] should_failslab+0x5/0x20 [ 1929.806350] kmem_cache_alloc+0x5b/0x310 [ 1929.806673] create_object.isra.0+0x3a/0xa20 [ 1929.807017] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1929.807417] kmem_cache_alloc+0x159/0x310 [ 1929.807754] ext4_mb_new_blocks+0x209f/0x45b0 [ 1929.808106] ? ext4_expand_extra_isize+0x5a0/0x5a0 [ 1929.808494] ? jbd2__journal_start+0xf3/0x7e0 [ 1929.808853] ? ext4_discard_preallocations+0xd80/0xd80 [ 1929.809263] ? ext4_dirty_inode+0x107/0x130 [ 1929.809598] ? __mark_inode_dirty+0x12e/0xd40 [ 1929.809953] ext4_new_meta_blocks+0x1e1/0x320 [ 1929.810305] ? ext4_should_retry_alloc+0x240/0x240 [ 1929.810693] ? lock_chain_count+0x20/0x20 [ 1929.811019] ? ext4_get_branch+0x541/0x6d0 [ 1929.811358] ext4_ind_map_blocks+0x95d/0x2150 [ 1929.811730] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1929.812144] ? ext4_free_branches+0x680/0x680 [ 1929.812505] ? lock_release+0x680/0x680 [ 1929.812818] ? lock_downgrade+0x6d0/0x6d0 [ 1929.813155] ? down_write+0xe0/0x160 [ 1929.813446] ? down_write_killable+0x180/0x180 [ 1929.813817] ext4_map_blocks+0x902/0x1910 [ 1929.814150] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1929.814497] ? trace_hardirqs_on+0x5b/0x180 [ 1929.814842] ? kmem_cache_alloc+0x2a6/0x310 [ 1929.815188] ext4_writepages+0x19bf/0x3350 [ 1929.815554] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1929.815960] ? quarantine_put+0x8b/0x1a0 [ 1929.816281] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1929.816663] ? __kasan_slab_free+0x122/0x160 [ 1929.817148] ? jbd2_journal_stop+0x61f/0xdc0 [ 1929.817513] ? jbd2_journal_stop+0x188/0xdc0 [ 1929.817872] ? balance_dirty_pages_ratelimited+0x43e/0x1ff0 [ 1929.818317] ? __ext4_journal_stop+0x107/0x1f0 [ 1929.818690] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 1929.819087] ? __mark_inode_dirty+0x12e/0xd40 [ 1929.819464] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1929.819877] do_writepages+0xee/0x2a0 [ 1929.820185] ? page_writeback_cpu_online+0x20/0x20 [ 1929.820571] ? ext4_buffered_write_iter+0x26a/0x4a0 [ 1929.820975] ? lock_downgrade+0x6d0/0x6d0 [ 1929.821313] ? generic_perform_write+0x37d/0x4f0 [ 1929.821703] __filemap_fdatawrite_range+0x24b/0x2f0 [ 1929.822103] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1929.822549] filemap_write_and_wait_range+0x65/0x100 [ 1929.822958] ext4_file_write_iter+0xc87/0x18d0 [ 1929.823341] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1929.823719] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1929.824151] new_sync_write+0x42c/0x660 [ 1929.824472] ? new_sync_read+0x6f0/0x6f0 [ 1929.824806] ? ksys_write+0x12d/0x260 [ 1929.825115] ? lock_release+0x680/0x680 [ 1929.825436] ? selinux_file_permission+0x92/0x520 [ 1929.825829] ? __fget_files+0x296/0x4c0 [ 1929.826158] vfs_write+0x747/0xa70 [ 1929.826451] ksys_write+0x12d/0x260 [ 1929.826742] ? __ia32_sys_read+0xb0/0xb0 [ 1929.827076] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1929.827505] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1929.827931] do_syscall_64+0x33/0x40 [ 1929.828227] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1929.828634] RIP: 0033:0x7f21b1e90b19 [ 1929.828940] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1929.830385] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1929.830996] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1929.831568] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1929.832141] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1929.832706] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1929.833277] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 04:04:17 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 30) [ 1929.992776] FAULT_INJECTION: forcing a failure. [ 1929.992776] name failslab, interval 1, probability 0, space 0, times 0 [ 1929.993868] CPU: 1 PID: 10706 Comm: syz-executor.3 Not tainted 5.10.213 #1 [ 1929.994424] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1929.995079] Call Trace: [ 1929.995305] dump_stack+0x107/0x167 [ 1929.995612] should_fail.cold+0x5/0xa [ 1929.995927] ? device_add+0x106f/0x1c50 [ 1929.996250] should_failslab+0x5/0x20 [ 1929.996562] kmem_cache_alloc_trace+0x55/0x320 [ 1929.996931] ? kvasprintf+0xe9/0x150 [ 1929.997228] device_add+0x106f/0x1c50 [ 1929.997542] ? devlink_add_symlinks+0x970/0x970 [ 1929.997925] device_create_groups_vargs+0x207/0x280 [ 1929.998326] device_create+0xdc/0x120 [ 1929.998643] ? device_create_groups_vargs+0x280/0x280 [ 1929.999066] ? init_timer_key+0x12a/0x240 [ 1929.999415] ? ieee80211_alloc_hw_nm+0x1e5/0x2320 [ 1929.999842] mac80211_hwsim_new_radio+0x352/0x4250 [ 1930.000234] ? mark_held_locks+0x9e/0xe0 [ 1930.000549] ? ___sys_sendmsg+0xf3/0x170 [ 1930.000868] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1930.001295] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1930.001709] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1930.002129] ? hwsim_send_nullfunc_ps+0x80/0x80 [ 1930.002496] ? hwsim_new_radio_nl+0x8ea/0x1080 [ 1930.002866] hwsim_new_radio_nl+0x991/0x1080 [ 1930.003204] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1930.003640] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 1930.004161] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 1930.004678] genl_family_rcv_msg_doit+0x22d/0x330 [ 1930.005064] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1930.005589] ? cap_capable+0x1cd/0x230 [ 1930.005900] ? ns_capable+0xe2/0x110 [ 1930.006199] genl_rcv_msg+0x33c/0x5a0 [ 1930.006507] ? genl_get_cmd+0x480/0x480 [ 1930.006825] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1930.007235] ? lock_release+0x680/0x680 [ 1930.007557] ? netlink_deliver_tap+0xf4/0xcc0 [ 1930.007916] netlink_rcv_skb+0x14b/0x430 [ 1930.008241] ? genl_get_cmd+0x480/0x480 [ 1930.008555] ? netlink_ack+0xab0/0xab0 [ 1930.008870] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1930.009228] ? is_vmalloc_addr+0x7b/0xb0 [ 1930.009554] genl_rcv+0x24/0x40 [ 1930.009820] netlink_unicast+0x549/0x7f0 [ 1930.010147] ? netlink_attachskb+0x870/0x870 [ 1930.010497] netlink_sendmsg+0x90f/0xdf0 [ 1930.010823] ? netlink_unicast+0x7f0/0x7f0 [ 1930.011171] ? netlink_unicast+0x7f0/0x7f0 [ 1930.011510] __sock_sendmsg+0x154/0x190 [ 1930.011833] ____sys_sendmsg+0x70d/0x870 [ 1930.012157] ? sock_write_iter+0x3d0/0x3d0 [ 1930.012490] ? do_recvmmsg+0x6d0/0x6d0 [ 1930.012804] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1930.013220] ? lock_downgrade+0x6d0/0x6d0 [ 1930.013556] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1930.013979] ___sys_sendmsg+0xf3/0x170 [ 1930.014292] ? sendmsg_copy_msghdr+0x160/0x160 [ 1930.014660] ? lock_downgrade+0x6d0/0x6d0 [ 1930.014995] ? find_held_lock+0x2c/0x110 [ 1930.015324] ? __fget_files+0x296/0x4c0 [ 1930.015657] ? __fget_light+0xea/0x290 [ 1930.015973] __sys_sendmsg+0xe5/0x1b0 [ 1930.016283] ? __sys_sendmsg_sock+0x40/0x40 [ 1930.016625] ? rcu_read_lock_any_held+0x75/0xa0 [ 1930.017008] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1930.017431] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1930.017845] ? trace_hardirqs_on+0x5b/0x180 [ 1930.018203] do_syscall_64+0x33/0x40 [ 1930.018511] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1930.018924] RIP: 0033:0x7f482b2f9b19 [ 1930.019231] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1930.020676] RSP: 002b:00007f482886f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1930.021279] RAX: ffffffffffffffda RBX: 00007f482b40cf60 RCX: 00007f482b2f9b19 [ 1930.021844] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1930.022420] RBP: 00007f482886f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1930.022993] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1930.023563] R13: 00007ffef22a59af R14: 00007f482886f300 R15: 0000000000022000 [ 1952.173493] FAULT_INJECTION: forcing a failure. [ 1952.173493] name failslab, interval 1, probability 0, space 0, times 0 [ 1952.174584] CPU: 1 PID: 10718 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1952.175192] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1952.175973] Call Trace: [ 1952.176240] dump_stack+0x107/0x167 [ 1952.176584] should_fail.cold+0x5/0xa [ 1952.176927] ? create_object.isra.0+0x3a/0xa20 [ 1952.177372] should_failslab+0x5/0x20 [ 1952.177726] kmem_cache_alloc+0x5b/0x310 [ 1952.178124] create_object.isra.0+0x3a/0xa20 [ 1952.178524] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1952.179008] kmem_cache_alloc+0x159/0x310 [ 1952.179420] ext4_mb_new_blocks+0x209f/0x45b0 [ 1952.179875] ? ext4_expand_extra_isize+0x5a0/0x5a0 [ 1952.188644] ? jbd2__journal_start+0xf3/0x7e0 [ 1952.189118] ? ext4_discard_preallocations+0xd80/0xd80 [ 1952.189686] ? ext4_dirty_inode+0x107/0x130 [ 1952.190117] ? __mark_inode_dirty+0x12e/0xd40 [ 1952.190601] ext4_new_meta_blocks+0x1e1/0x320 [ 1952.191050] ? ext4_should_retry_alloc+0x240/0x240 [ 1952.191529] ? lock_chain_count+0x20/0x20 [ 1952.191600] FAULT_INJECTION: forcing a failure. [ 1952.191600] name failslab, interval 1, probability 0, space 0, times 0 [ 1952.191921] ? ext4_get_branch+0x541/0x6d0 [ 1952.191951] ext4_ind_map_blocks+0x95d/0x2150 [ 1952.193916] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1952.194416] ? ext4_free_branches+0x680/0x680 [ 1952.194874] ? lock_release+0x680/0x680 [ 1952.195263] ? lock_downgrade+0x6d0/0x6d0 [ 1952.195651] ? down_write+0xe0/0x160 [ 1952.196042] ? down_write_killable+0x180/0x180 [ 1952.196484] ext4_map_blocks+0x902/0x1910 [ 1952.196868] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1952.197303] ? trace_hardirqs_on+0x5b/0x180 [ 1952.197730] ? kmem_cache_alloc+0x2a6/0x310 [ 1952.198203] ext4_writepages+0x19bf/0x3350 [ 1952.198608] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1952.199136] ? quarantine_put+0x8b/0x1a0 [ 1952.199526] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1952.200020] ? __kasan_slab_free+0x122/0x160 [ 1952.200444] ? jbd2_journal_stop+0x61f/0xdc0 [ 1952.200841] ? jbd2_journal_stop+0x188/0xdc0 [ 1952.201284] ? balance_dirty_pages_ratelimited+0x43e/0x1ff0 [ 1952.201832] ? __ext4_journal_stop+0x107/0x1f0 [ 1952.202285] ? perf_trace_lock+0xac/0x490 [ 1952.202652] ? __mark_inode_dirty+0x12e/0xd40 [ 1952.203094] ? __lockdep_reset_lock+0x180/0x180 [ 1952.203511] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1952.204025] do_writepages+0xee/0x2a0 [ 1952.204375] ? page_writeback_cpu_online+0x20/0x20 [ 1952.204866] ? ext4_buffered_write_iter+0x26a/0x4a0 [ 1952.205351] ? lock_downgrade+0x6d0/0x6d0 [ 1952.205735] ? generic_perform_write+0x37d/0x4f0 [ 1952.206205] __filemap_fdatawrite_range+0x24b/0x2f0 [ 1952.206659] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1952.207180] filemap_write_and_wait_range+0x65/0x100 [ 1952.207641] ext4_file_write_iter+0xc87/0x18d0 [ 1952.208117] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1952.208589] ? __lockdep_reset_lock+0x180/0x180 [ 1952.209032] ? __lockdep_reset_lock+0x180/0x180 [ 1952.209527] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1952.210090] new_sync_write+0x42c/0x660 [ 1952.210504] ? new_sync_read+0x6f0/0x6f0 [ 1952.210948] ? ksys_write+0x12d/0x260 [ 1952.211363] ? lock_release+0x680/0x680 [ 1952.211793] ? selinux_file_permission+0x92/0x520 [ 1952.212245] ? __fget_files+0x296/0x4c0 [ 1952.212587] vfs_write+0x747/0xa70 [ 1952.212897] ksys_write+0x12d/0x260 [ 1952.213220] ? __ia32_sys_read+0xb0/0xb0 [ 1952.213604] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1952.214260] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1952.215357] do_syscall_64+0x33/0x40 [ 1952.216252] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1952.217271] RIP: 0033:0x7f21b1e90b19 [ 1952.218060] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1952.221820] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1952.223629] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1952.224848] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1952.225728] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1952.226688] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1952.227596] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 [ 1952.228376] CPU: 0 PID: 10726 Comm: syz-executor.3 Not tainted 5.10.213 #1 [ 1952.229129] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1952.229933] Call Trace: [ 1952.230213] dump_stack+0x107/0x167 [ 1952.230573] should_fail.cold+0x5/0xa [ 1952.230956] ? device_add+0x106f/0x1c50 [ 1952.231367] should_failslab+0x5/0x20 [ 1952.231746] kmem_cache_alloc_trace+0x55/0x320 [ 1952.232231] ? kvasprintf+0xe9/0x150 [ 1952.232603] device_add+0x106f/0x1c50 [ 1952.232996] ? devlink_add_symlinks+0x970/0x970 [ 1952.233465] device_create_groups_vargs+0x207/0x280 [ 1952.233973] device_create+0xdc/0x120 [ 1952.234355] ? device_create_groups_vargs+0x280/0x280 [ 1952.234864] ? init_timer_key+0x12a/0x240 [ 1952.235304] ? ieee80211_alloc_hw_nm+0x1e5/0x2320 [ 1952.235799] mac80211_hwsim_new_radio+0x352/0x4250 [ 1952.236285] ? ____sys_sendmsg+0x70d/0x870 [ 1952.236698] ? ___sys_sendmsg+0xf3/0x170 [ 1952.237113] ? __sys_sendmsg+0xe5/0x1b0 [ 1952.237509] ? do_syscall_64+0x33/0x40 [ 1952.237896] ? entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1952.238438] ? __lockdep_reset_lock+0x180/0x180 [ 1952.238897] ? lock_acquire+0x197/0x470 [ 1952.239291] ? create_object.isra.0+0x3ad/0xa20 [ 1952.239764] ? hwsim_send_nullfunc_ps+0x80/0x80 [ 1952.240229] ? __kmalloc+0x16e/0x390 [ 1952.240868] hwsim_new_radio_nl+0x991/0x1080 [ 1952.241327] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1952.241861] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 1952.242559] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 1952.243194] genl_family_rcv_msg_doit+0x22d/0x330 [ 1952.243704] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1952.244361] ? cap_capable+0x1cd/0x230 [ 1952.244763] ? ns_capable+0xe2/0x110 [ 1952.245160] genl_rcv_msg+0x33c/0x5a0 [ 1952.245564] ? genl_get_cmd+0x480/0x480 [ 1952.245957] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1952.246471] ? lock_release+0x680/0x680 [ 1952.246865] ? __lockdep_reset_lock+0x180/0x180 [ 1952.247322] netlink_rcv_skb+0x14b/0x430 [ 1952.247725] ? genl_get_cmd+0x480/0x480 [ 1952.248136] ? netlink_ack+0xab0/0xab0 [ 1952.248530] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1952.248982] ? is_vmalloc_addr+0x7b/0xb0 [ 1952.249391] genl_rcv+0x24/0x40 [ 1952.249711] netlink_unicast+0x549/0x7f0 [ 1952.250117] ? netlink_attachskb+0x870/0x870 [ 1952.250556] netlink_sendmsg+0x90f/0xdf0 [ 1952.250964] ? netlink_unicast+0x7f0/0x7f0 [ 1952.251390] ? netlink_unicast+0x7f0/0x7f0 [ 1952.251811] __sock_sendmsg+0x154/0x190 [ 1952.252203] ____sys_sendmsg+0x70d/0x870 [ 1952.252607] ? sock_write_iter+0x3d0/0x3d0 [ 1952.253018] ? do_recvmmsg+0x6d0/0x6d0 [ 1952.253399] ? perf_trace_lock+0xac/0x490 [ 1952.253821] ? __lockdep_reset_lock+0x180/0x180 [ 1952.254274] ? perf_trace_lock+0xac/0x490 [ 1952.254696] ___sys_sendmsg+0xf3/0x170 [ 1952.255091] ? sendmsg_copy_msghdr+0x160/0x160 [ 1952.255543] ? lock_downgrade+0x6d0/0x6d0 [ 1952.255963] ? find_held_lock+0x2c/0x110 [ 1952.256372] ? __fget_files+0x296/0x4c0 [ 1952.256780] ? __fget_light+0xea/0x290 [ 1952.257172] __sys_sendmsg+0xe5/0x1b0 [ 1952.257544] ? __sys_sendmsg_sock+0x40/0x40 [ 1952.257970] ? rcu_read_lock_any_held+0x75/0xa0 [ 1952.258441] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1952.258958] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1952.259469] ? trace_hardirqs_on+0x5b/0x180 [ 1952.259901] do_syscall_64+0x33/0x40 [ 1952.260268] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1952.260778] RIP: 0033:0x7f482b2f9b19 [ 1952.261148] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1952.262914] RSP: 002b:00007f482886f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1952.263670] RAX: ffffffffffffffda RBX: 00007f482b40cf60 RCX: 00007f482b2f9b19 [ 1952.264411] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1952.265160] RBP: 00007f482886f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1952.265867] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1952.266569] R13: 00007ffef22a59af R14: 00007f482886f300 R15: 0000000000022000 04:04:40 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 52) 04:04:40 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:04:40 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000500f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:04:40 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 04:04:40 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1077) 04:04:40 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 31) 04:04:40 executing program 5: syslog(0x0, &(0x7f0000001340)=""/4101, 0xfffffffffffffed4) 04:04:40 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x8cffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:04:40 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 53) 04:04:40 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) syslog(0x1, 0x0, 0x0) 04:04:40 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 32) 04:04:40 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000600f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:04:40 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x500000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:04:40 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xf0ffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:04:40 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1078) 04:04:40 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000700f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:04:40 executing program 5: syslog(0x4, &(0x7f00000011c0)=""/4078, 0xffffffffffffff77) syslog(0xa, &(0x7f0000000000)=""/117, 0x75) syslog(0x2, 0x0, 0xffffffffffffff00) syslog(0x4, &(0x7f0000000080)=""/172, 0xac) syslog(0x3, &(0x7f0000000140)=""/55, 0x37) 04:04:40 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x505000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1952.529515] FAULT_INJECTION: forcing a failure. [ 1952.529515] name failslab, interval 1, probability 0, space 0, times 0 [ 1952.530832] CPU: 0 PID: 10757 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1952.531520] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1952.532334] Call Trace: [ 1952.532605] dump_stack+0x107/0x167 [ 1952.532973] should_fail.cold+0x5/0xa [ 1952.533353] ? create_object.isra.0+0x3a/0xa20 [ 1952.533812] should_failslab+0x5/0x20 [ 1952.534187] kmem_cache_alloc+0x5b/0x310 [ 1952.534588] create_object.isra.0+0x3a/0xa20 [ 1952.535016] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1952.535528] kmem_cache_alloc+0x159/0x310 [ 1952.535966] jbd2_journal_add_journal_head+0x1a3/0x540 [ 1952.536492] jbd2_journal_get_create_access+0x40/0x560 [ 1952.537024] __ext4_journal_get_create_access+0x43/0x90 [ 1952.537558] ext4_ind_map_blocks+0xbbd/0x2150 [ 1952.538016] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1952.538542] ? ext4_free_branches+0x680/0x680 [ 1952.538999] ? lock_release+0x680/0x680 [ 1952.539393] ? lock_downgrade+0x6d0/0x6d0 [ 1952.539838] ? down_write_killable+0x180/0x180 [ 1952.540303] ext4_map_blocks+0x902/0x1910 [ 1952.540717] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1952.541163] ? trace_hardirqs_on+0x5b/0x180 [ 1952.541597] ? kmem_cache_alloc+0x2a6/0x310 [ 1952.542036] ext4_writepages+0x19bf/0x3350 [ 1952.542479] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1952.542991] ? quarantine_put+0x8b/0x1a0 [ 1952.543401] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1952.543890] ? __kasan_slab_free+0x122/0x160 [ 1952.544331] ? jbd2_journal_stop+0x61f/0xdc0 [ 1952.544768] ? jbd2_journal_stop+0x188/0xdc0 [ 1952.545217] ? balance_dirty_pages_ratelimited+0x43e/0x1ff0 [ 1952.545851] ? __ext4_journal_stop+0x107/0x1f0 [ 1952.546300] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 1952.546780] ? __mark_inode_dirty+0x12e/0xd40 [ 1952.547224] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1952.547679] do_writepages+0xee/0x2a0 [ 1952.548010] ? page_writeback_cpu_online+0x20/0x20 [ 1952.548400] ? ext4_buffered_write_iter+0x26a/0x4a0 [ 1952.548799] ? lock_downgrade+0x6d0/0x6d0 [ 1952.549130] ? generic_perform_write+0x37d/0x4f0 [ 1952.549506] __filemap_fdatawrite_range+0x24b/0x2f0 [ 1952.549901] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1952.550339] filemap_write_and_wait_range+0x65/0x100 [ 1952.550742] ext4_file_write_iter+0xc87/0x18d0 [ 1952.551123] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1952.551479] ? __lockdep_reset_lock+0x180/0x180 [ 1952.551866] ? __lockdep_reset_lock+0x180/0x180 [ 1952.552235] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1952.552662] new_sync_write+0x42c/0x660 [ 1952.552978] ? new_sync_read+0x6f0/0x6f0 [ 1952.553300] ? ksys_write+0x12d/0x260 [ 1952.553606] ? lock_release+0x680/0x680 [ 1952.553924] ? selinux_file_permission+0x92/0x520 [ 1952.554315] ? __fget_files+0x296/0x4c0 [ 1952.554639] vfs_write+0x747/0xa70 [ 1952.554927] ksys_write+0x12d/0x260 [ 1952.555217] ? __ia32_sys_read+0xb0/0xb0 [ 1952.555540] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1952.555974] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1952.556386] do_syscall_64+0x33/0x40 [ 1952.556689] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1952.557090] RIP: 0033:0x7f21b1e90b19 [ 1952.557390] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1952.558848] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1952.559452] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1952.560026] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1952.560599] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1952.561168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1952.561729] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 [ 1952.573673] FAULT_INJECTION: forcing a failure. [ 1952.573673] name failslab, interval 1, probability 0, space 0, times 0 [ 1952.574641] CPU: 1 PID: 10747 Comm: syz-executor.3 Not tainted 5.10.213 #1 [ 1952.575196] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1952.575878] Call Trace: [ 1952.576099] dump_stack+0x107/0x167 [ 1952.576398] should_fail.cold+0x5/0xa [ 1952.576712] should_failslab+0x5/0x20 [ 1952.577022] __kmalloc_track_caller+0x79/0x370 [ 1952.577394] ? kstrdup_const+0x53/0x80 [ 1952.577714] kstrdup+0x36/0x70 [ 1952.577981] kstrdup_const+0x53/0x80 [ 1952.578286] __kernfs_new_node+0x9d/0x860 [ 1952.578621] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1952.579017] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1952.579450] kernfs_new_node+0x18d/0x250 [ 1952.579809] kernfs_create_dir_ns+0x49/0x160 [ 1952.580160] sysfs_create_dir_ns+0x127/0x290 [ 1952.580525] ? sysfs_create_mount_point+0xb0/0xb0 [ 1952.580920] ? rwlock_bug.part.0+0x90/0x90 [ 1952.581259] ? class_dir_child_ns_type+0x9/0x60 [ 1952.581632] kobject_add_internal+0x25e/0xa30 [ 1952.582003] kobject_add+0x150/0x1c0 [ 1952.582314] ? kset_create_and_add+0x1a0/0x1a0 [ 1952.582660] ? lockdep_init_map_type+0x2c7/0x780 [ 1952.583048] device_add+0x35a/0x1c50 [ 1952.583327] ? devlink_add_symlinks+0x970/0x970 [ 1952.583713] device_create_groups_vargs+0x207/0x280 [ 1952.584095] device_create+0xdc/0x120 [ 1952.584400] ? device_create_groups_vargs+0x280/0x280 [ 1952.584800] ? init_timer_key+0x12a/0x240 [ 1952.585141] ? ieee80211_alloc_hw_nm+0x1e5/0x2320 [ 1952.585508] mac80211_hwsim_new_radio+0x352/0x4250 [ 1952.585869] ? mark_held_locks+0x9e/0xe0 [ 1952.586189] ? ___sys_sendmsg+0xf3/0x170 [ 1952.586492] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1952.586917] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1952.587315] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1952.587748] ? hwsim_send_nullfunc_ps+0x80/0x80 [ 1952.588120] ? hwsim_new_radio_nl+0x645/0x1080 [ 1952.588456] hwsim_new_radio_nl+0x991/0x1080 [ 1952.588808] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1952.589225] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 1952.589708] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 1952.590224] genl_family_rcv_msg_doit+0x22d/0x330 [ 1952.590582] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1952.591116] ? security_capable+0x6e/0xc0 [ 1952.591447] ? cap_capable+0x1cd/0x230 [ 1952.591783] ? ns_capable+0xe2/0x110 [ 1952.592087] genl_rcv_msg+0x33c/0x5a0 [ 1952.592398] ? genl_get_cmd+0x480/0x480 [ 1952.592714] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1952.593105] ? lock_release+0x680/0x680 [ 1952.593414] ? netlink_deliver_tap+0xf4/0xcc0 [ 1952.593748] netlink_rcv_skb+0x14b/0x430 [ 1952.594071] ? genl_get_cmd+0x480/0x480 [ 1952.594363] ? netlink_ack+0xab0/0xab0 [ 1952.594688] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1952.595047] ? is_vmalloc_addr+0x7b/0xb0 [ 1952.595350] genl_rcv+0x24/0x40 [ 1952.595619] netlink_unicast+0x549/0x7f0 [ 1952.595938] ? netlink_attachskb+0x870/0x870 [ 1952.596295] netlink_sendmsg+0x90f/0xdf0 [ 1952.596601] ? netlink_unicast+0x7f0/0x7f0 [ 1952.596946] ? netlink_unicast+0x7f0/0x7f0 [ 1952.597257] __sock_sendmsg+0x154/0x190 [ 1952.597574] ____sys_sendmsg+0x70d/0x870 [ 1952.597878] ? sock_write_iter+0x3d0/0x3d0 [ 1952.598213] ? do_recvmmsg+0x6d0/0x6d0 [ 1952.598517] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1952.598904] ? lock_downgrade+0x6d0/0x6d0 [ 1952.599235] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1952.599648] ___sys_sendmsg+0xf3/0x170 [ 1952.599952] ? sendmsg_copy_msghdr+0x160/0x160 [ 1952.600337] ? lock_downgrade+0x6d0/0x6d0 [ 1952.600673] ? find_held_lock+0x2c/0x110 [ 1952.601014] ? __fget_files+0x296/0x4c0 [ 1952.601336] ? __fget_light+0xea/0x290 [ 1952.601653] __sys_sendmsg+0xe5/0x1b0 [ 1952.601967] ? __sys_sendmsg_sock+0x40/0x40 [ 1952.602315] ? rcu_read_lock_any_held+0x75/0xa0 [ 1952.602700] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1952.603092] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1952.603503] ? trace_hardirqs_on+0x5b/0x180 [ 1952.603835] do_syscall_64+0x33/0x40 [ 1952.604139] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1952.604529] RIP: 0033:0x7f482b2f9b19 [ 1952.604808] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1952.606256] RSP: 002b:00007f482886f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1952.606865] RAX: ffffffffffffffda RBX: 00007f482b40cf60 RCX: 00007f482b2f9b19 [ 1952.607436] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1952.608012] RBP: 00007f482886f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1952.608601] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1952.609177] R13: 00007ffef22a59af R14: 00007f482886f300 R15: 0000000000022000 [ 1952.610512] kobject_add_internal failed for hwsim366 (error: -12 parent: mac80211_hwsim) 04:04:40 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 54) [ 1952.642412] FAULT_INJECTION: forcing a failure. [ 1952.642412] name failslab, interval 1, probability 0, space 0, times 0 [ 1952.643363] CPU: 1 PID: 10767 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1952.643944] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1952.644552] Call Trace: [ 1952.644755] dump_stack+0x107/0x167 [ 1952.645055] should_fail.cold+0x5/0xa [ 1952.645363] ? create_object.isra.0+0x3a/0xa20 [ 1952.645701] should_failslab+0x5/0x20 [ 1952.646012] kmem_cache_alloc+0x5b/0x310 [ 1952.646342] create_object.isra.0+0x3a/0xa20 [ 1952.646698] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1952.647079] kmem_cache_alloc+0x159/0x310 [ 1952.647422] jbd2_journal_add_journal_head+0x1a3/0x540 [ 1952.647854] jbd2_journal_get_create_access+0x40/0x560 [ 1952.648251] __ext4_journal_get_create_access+0x43/0x90 [ 1952.648675] ext4_ind_map_blocks+0xbbd/0x2150 [ 1952.649042] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1952.649433] ? ext4_free_branches+0x680/0x680 [ 1952.649797] ? lock_release+0x680/0x680 [ 1952.650106] ? lock_downgrade+0x6d0/0x6d0 [ 1952.650427] ? down_write_killable+0x180/0x180 [ 1952.650782] ext4_map_blocks+0x902/0x1910 [ 1952.651130] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1952.651459] ? trace_hardirqs_on+0x5b/0x180 [ 1952.651816] ? kmem_cache_alloc+0x2a6/0x310 [ 1952.652172] ext4_writepages+0x19bf/0x3350 [ 1952.652534] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1952.652954] ? quarantine_put+0x8b/0x1a0 [ 1952.653261] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1952.653654] ? __kasan_slab_free+0x122/0x160 [ 1952.653990] ? jbd2_journal_stop+0x61f/0xdc0 [ 1952.654351] ? jbd2_journal_stop+0x188/0xdc0 [ 1952.654684] ? balance_dirty_pages_ratelimited+0x43e/0x1ff0 [ 1952.655139] ? __ext4_journal_stop+0x107/0x1f0 [ 1952.655486] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 1952.655897] ? __mark_inode_dirty+0x12e/0xd40 [ 1952.656244] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1952.656649] do_writepages+0xee/0x2a0 [ 1952.656939] ? page_writeback_cpu_online+0x20/0x20 [ 1952.657325] ? ext4_buffered_write_iter+0x26a/0x4a0 [ 1952.657695] ? lock_downgrade+0x6d0/0x6d0 [ 1952.658028] ? generic_perform_write+0x37d/0x4f0 [ 1952.658410] __filemap_fdatawrite_range+0x24b/0x2f0 [ 1952.658809] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1952.659252] filemap_write_and_wait_range+0x65/0x100 [ 1952.659660] ext4_file_write_iter+0xc87/0x18d0 [ 1952.660053] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1952.660419] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1952.660837] new_sync_write+0x42c/0x660 [ 1952.661160] ? new_sync_read+0x6f0/0x6f0 [ 1952.661486] ? ksys_write+0x12d/0x260 [ 1952.661780] ? lock_release+0x680/0x680 [ 1952.662083] ? selinux_file_permission+0x92/0x520 [ 1952.662473] ? __fget_files+0x296/0x4c0 [ 1952.662799] vfs_write+0x747/0xa70 [ 1952.663071] ksys_write+0x12d/0x260 [ 1952.663363] ? __ia32_sys_read+0xb0/0xb0 [ 1952.663694] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1952.664093] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1952.664508] do_syscall_64+0x33/0x40 [ 1952.664811] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1952.665233] RIP: 0033:0x7f21b1e90b19 [ 1952.665533] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1952.666985] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1952.667546] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1952.668126] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1952.668665] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1952.669194] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1952.669770] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 04:04:55 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xf6ffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:04:55 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 55) 04:04:55 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x11, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) 04:04:55 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:04:55 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000b00f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:04:55 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYBLOB=',wfdno=', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast2}}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00'}) accept4(r0, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x495c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8000) (fail_nth: 33) 04:04:55 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) syslog(0x1, &(0x7f0000000000)=""/213, 0xd5) 04:04:55 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x1079) [ 1967.746318] FAULT_INJECTION: forcing a failure. [ 1967.746318] name failslab, interval 1, probability 0, space 0, times 0 [ 1967.748258] CPU: 1 PID: 10780 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1967.749392] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1967.750721] Call Trace: [ 1967.751158] dump_stack+0x107/0x167 [ 1967.751759] should_fail.cold+0x5/0xa [ 1967.752410] ? create_object.isra.0+0x3a/0xa20 [ 1967.753178] should_failslab+0x5/0x20 [ 1967.753819] kmem_cache_alloc+0x5b/0x310 [ 1967.754513] create_object.isra.0+0x3a/0xa20 [ 1967.755260] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1967.756131] kmem_cache_alloc+0x159/0x310 [ 1967.756826] jbd2_journal_add_journal_head+0x1a3/0x540 [ 1967.757700] jbd2_journal_get_create_access+0x40/0x560 [ 1967.758584] __ext4_journal_get_create_access+0x43/0x90 [ 1967.759454] ext4_ind_map_blocks+0xbbd/0x2150 [ 1967.760217] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1967.761083] ? ext4_free_branches+0x680/0x680 [ 1967.761829] ? lock_release+0x680/0x680 [ 1967.762495] ? lock_downgrade+0x6d0/0x6d0 [ 1967.763217] ? down_write_killable+0x180/0x180 [ 1967.764018] ext4_map_blocks+0x902/0x1910 [ 1967.764725] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1967.765468] ? trace_hardirqs_on+0x5b/0x180 [ 1967.766196] ? kmem_cache_alloc+0x2a6/0x310 [ 1967.766935] ext4_writepages+0x19bf/0x3350 [ 1967.767687] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1967.768578] ? quarantine_put+0x8b/0x1a0 [ 1967.769276] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1967.770111] ? __kasan_slab_free+0x122/0x160 [ 1967.770864] ? jbd2_journal_stop+0x61f/0xdc0 [ 1967.771617] ? jbd2_journal_stop+0x188/0xdc0 [ 1967.772369] ? balance_dirty_pages_ratelimited+0x43e/0x1ff0 [ 1967.773292] ? __ext4_journal_stop+0x107/0x1f0 [ 1967.774056] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 1967.774857] ? __mark_inode_dirty+0x12e/0xd40 [ 1967.775606] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1967.776417] do_writepages+0xee/0x2a0 [ 1967.777047] ? page_writeback_cpu_online+0x20/0x20 [ 1967.777847] ? ext4_buffered_write_iter+0x26a/0x4a0 [ 1967.778659] ? lock_downgrade+0x6d0/0x6d0 [ 1967.779343] ? generic_perform_write+0x37d/0x4f0 [ 1967.780134] __filemap_fdatawrite_range+0x24b/0x2f0 [ 1967.780952] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1967.782043] filemap_write_and_wait_range+0x65/0x100 [ 1967.782902] ext4_file_write_iter+0xc87/0x18d0 [ 1967.783660] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1967.784424] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1967.785292] new_sync_write+0x42c/0x660 [ 1967.785945] ? new_sync_read+0x6f0/0x6f0 [ 1967.786606] ? ksys_write+0x12d/0x260 [ 1967.787233] ? lock_release+0x680/0x680 [ 1967.787881] ? selinux_file_permission+0x92/0x520 [ 1967.788688] ? __fget_files+0x296/0x4c0 [ 1967.789353] vfs_write+0x747/0xa70 [ 1967.789941] ksys_write+0x12d/0x260 [ 1967.790535] ? __ia32_sys_read+0xb0/0xb0 [ 1967.791200] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1967.792062] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1967.792908] do_syscall_64+0x33/0x40 [ 1967.793513] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1967.794343] RIP: 0033:0x7f21b1e90b19 [ 1967.794952] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1967.797915] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1967.799144] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1967.800306] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1967.801455] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1967.802604] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1967.803753] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 04:04:55 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x605000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:04:55 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) syslog(0x2, 0x0, 0x0) syslog(0x3, &(0x7f0000000000)=""/207, 0xcf) 04:04:55 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) r2 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x80c0}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x10, 0x70bd25, 0x0, {{}, {}, {0x4c, 0x18, {0xc58, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x50) open(0x0, 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x0) eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) (fail_nth: 56) [ 1968.013782] FAULT_INJECTION: forcing a failure. [ 1968.013782] name failslab, interval 1, probability 0, space 0, times 0 [ 1968.016108] CPU: 0 PID: 10784 Comm: syz-executor.3 Not tainted 5.10.213 #1 [ 1968.017185] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1968.018458] Call Trace: [ 1968.018883] dump_stack+0x107/0x167 [ 1968.019457] should_fail.cold+0x5/0xa [ 1968.020061] ? create_object.isra.0+0x3a/0xa20 [ 1968.020781] should_failslab+0x5/0x20 [ 1968.021377] kmem_cache_alloc+0x5b/0x310 [ 1968.022145] ? find_held_lock+0x2c/0x110 [ 1968.022925] create_object.isra.0+0x3a/0xa20 [ 1968.023684] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1968.024693] __kmalloc_track_caller+0x177/0x370 [ 1968.025510] ? kstrdup_const+0x53/0x80 [ 1968.026162] kstrdup+0x36/0x70 [ 1968.026778] kstrdup_const+0x53/0x80 [ 1968.027418] __kernfs_new_node+0x9d/0x860 [ 1968.028209] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1968.029029] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1968.029928] kernfs_new_node+0x18d/0x250 [ 1968.030713] kernfs_create_dir_ns+0x49/0x160 [ 1968.031529] sysfs_create_dir_ns+0x127/0x290 [ 1968.032380] ? sysfs_create_mount_point+0xb0/0xb0 [ 1968.033257] ? rwlock_bug.part.0+0x90/0x90 [ 1968.034032] ? class_dir_child_ns_type+0x9/0x60 [ 1968.034904] kobject_add_internal+0x25e/0xa30 [ 1968.035627] kobject_add+0x150/0x1c0 [ 1968.036224] ? kset_create_and_add+0x1a0/0x1a0 [ 1968.036954] ? lockdep_init_map_type+0x2c7/0x780 [ 1968.037738] device_add+0x35a/0x1c50 [ 1968.038329] ? devlink_add_symlinks+0x970/0x970 [ 1968.039068] device_create_groups_vargs+0x207/0x280 [ 1968.039843] device_create+0xdc/0x120 [ 1968.040490] ? device_create_groups_vargs+0x280/0x280 [ 1968.041312] ? init_timer_key+0x12a/0x240 [ 1968.042065] ? ieee80211_alloc_hw_nm+0x1e5/0x2320 [ 1968.042817] mac80211_hwsim_new_radio+0x352/0x4250 [ 1968.043719] ? ____sys_sendmsg+0x70d/0x870 [ 1968.044392] ? ___sys_sendmsg+0xf3/0x170 [ 1968.045083] ? __sys_sendmsg+0xe5/0x1b0 [ 1968.045724] ? do_syscall_64+0x33/0x40 [ 1968.046406] ? entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1968.047228] ? create_object.isra.0+0x3ad/0xa20 [ 1968.048153] ? hwsim_send_nullfunc_ps+0x80/0x80 [ 1968.048897] ? __kmalloc+0x16e/0x390 [ 1968.049551] hwsim_new_radio_nl+0x991/0x1080 [ 1968.050233] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1968.051055] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 1968.052094] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 1968.053118] genl_family_rcv_msg_doit+0x22d/0x330 [ 1968.053869] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1968.055021] ? cap_capable+0x1cd/0x230 [ 1968.055659] ? ns_capable+0xe2/0x110 [ 1968.056272] genl_rcv_msg+0x33c/0x5a0 [ 1968.056871] ? genl_get_cmd+0x480/0x480 [ 1968.057497] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 1968.058328] ? lock_release+0x680/0x680 [ 1968.059004] ? __lockdep_reset_lock+0x180/0x180 [ 1968.059749] netlink_rcv_skb+0x14b/0x430 [ 1968.060437] ? genl_get_cmd+0x480/0x480 [ 1968.061047] ? netlink_ack+0xab0/0xab0 [ 1968.061654] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1968.062358] ? is_vmalloc_addr+0x7b/0xb0 [ 1968.063105] genl_rcv+0x24/0x40 [ 1968.063634] netlink_unicast+0x549/0x7f0 [ 1968.064319] ? netlink_attachskb+0x870/0x870 [ 1968.065024] netlink_sendmsg+0x90f/0xdf0 [ 1968.065670] ? netlink_unicast+0x7f0/0x7f0 [ 1968.066368] ? netlink_unicast+0x7f0/0x7f0 [ 1968.067029] __sock_sendmsg+0x154/0x190 [ 1968.067649] ____sys_sendmsg+0x70d/0x870 [ 1968.068305] ? sock_write_iter+0x3d0/0x3d0 [ 1968.069117] ? do_recvmmsg+0x6d0/0x6d0 [ 1968.069854] ? perf_trace_lock+0xac/0x490 [ 1968.070520] ? __lockdep_reset_lock+0x180/0x180 [ 1968.071268] ? perf_trace_lock+0xac/0x490 [ 1968.071931] ___sys_sendmsg+0xf3/0x170 [ 1968.072551] ? sendmsg_copy_msghdr+0x160/0x160 [ 1968.073273] ? lock_downgrade+0x6d0/0x6d0 [ 1968.073945] ? find_held_lock+0x2c/0x110 [ 1968.074606] ? __fget_files+0x296/0x4c0 [ 1968.075388] ? __fget_light+0xea/0x290 [ 1968.076159] __sys_sendmsg+0xe5/0x1b0 [ 1968.076801] ? __sys_sendmsg_sock+0x40/0x40 [ 1968.077490] ? rcu_read_lock_any_held+0x75/0xa0 [ 1968.078274] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1968.079134] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1968.080062] ? trace_hardirqs_on+0x5b/0x180 [ 1968.080763] do_syscall_64+0x33/0x40 [ 1968.081490] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1968.082297] RIP: 0033:0x7f482b2f9b19 [ 1968.082920] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1968.086021] RSP: 002b:00007f482886f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1968.087205] RAX: ffffffffffffffda RBX: 00007f482b40cf60 RCX: 00007f482b2f9b19 [ 1968.088332] RDX: 0000000000008000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1968.089423] RBP: 00007f482886f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1968.090507] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1968.091619] R13: 00007ffef22a59af R14: 00007f482886f300 R15: 0000000000022000 04:04:56 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xf9fdffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:04:56 executing program 5: timer_create(0x0, &(0x7f0000000000)={0x0, 0x25, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x1, &(0x7f0000000080)={{0x0, 0x3938700}, {0x77359400}}, &(0x7f00000000c0)) syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) 04:04:56 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) signalfd(r0, &(0x7f0000000000)={[0x311d]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syslog(0x3, &(0x7f0000000340)=""/4096, 0x107a) 04:04:56 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470001800f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) [ 1968.177781] FAULT_INJECTION: forcing a failure. [ 1968.177781] name failslab, interval 1, probability 0, space 0, times 0 [ 1968.179928] CPU: 0 PID: 10809 Comm: syz-executor.7 Not tainted 5.10.213 #1 [ 1968.181083] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1968.182424] Call Trace: [ 1968.182863] dump_stack+0x107/0x167 [ 1968.183450] should_fail.cold+0x5/0xa [ 1968.184099] ? jbd2_journal_add_journal_head+0x1a3/0x540 [ 1968.184966] should_failslab+0x5/0x20 [ 1968.185588] kmem_cache_alloc+0x5b/0x310 [ 1968.186250] jbd2_journal_add_journal_head+0x1a3/0x540 [ 1968.187116] jbd2_journal_get_create_access+0x40/0x560 [ 1968.187961] __ext4_journal_get_create_access+0x43/0x90 [ 1968.188806] ext4_ind_map_blocks+0xbbd/0x2150 [ 1968.189548] ? ext4_free_branches+0x680/0x680 [ 1968.190314] ? lock_release+0x680/0x680 [ 1968.190978] ? lock_downgrade+0x6d0/0x6d0 [ 1968.191662] ? down_write_killable+0x180/0x180 [ 1968.192431] ext4_map_blocks+0x902/0x1910 [ 1968.193138] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1968.193863] ? trace_hardirqs_on+0x5b/0x180 [ 1968.194559] ? kmem_cache_alloc+0x2a6/0x310 [ 1968.195276] ext4_writepages+0x19bf/0x3350 [ 1968.196023] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1968.196872] ? quarantine_put+0x8b/0x1a0 [ 1968.197552] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1968.198362] ? __kasan_slab_free+0x122/0x160 [ 1968.199071] ? jbd2_journal_stop+0x61f/0xdc0 [ 1968.199798] ? jbd2_journal_stop+0x188/0xdc0 [ 1968.200536] ? balance_dirty_pages_ratelimited+0x43e/0x1ff0 [ 1968.201451] ? __ext4_journal_stop+0x107/0x1f0 [ 1968.202213] ? perf_trace_lock+0xac/0x490 [ 1968.202885] ? __mark_inode_dirty+0x12e/0xd40 [ 1968.203604] ? __lockdep_reset_lock+0x180/0x180 [ 1968.204392] ? __ext4_mark_inode_dirty+0x770/0x770 [ 1968.205161] do_writepages+0xee/0x2a0 [ 1968.205787] ? page_writeback_cpu_online+0x20/0x20 [ 1968.206744] ? ext4_buffered_write_iter+0x26a/0x4a0 [ 1968.207592] ? lock_downgrade+0x6d0/0x6d0 [ 1968.208424] ? generic_perform_write+0x37d/0x4f0 [ 1968.209287] __filemap_fdatawrite_range+0x24b/0x2f0 [ 1968.210124] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1968.211042] filemap_write_and_wait_range+0x65/0x100 [ 1968.211885] ext4_file_write_iter+0xc87/0x18d0 [ 1968.212735] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1968.213499] ? __lockdep_reset_lock+0x180/0x180 [ 1968.214275] ? __lockdep_reset_lock+0x180/0x180 [ 1968.215159] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1968.216126] new_sync_write+0x42c/0x660 [ 1968.216792] ? new_sync_read+0x6f0/0x6f0 [ 1968.217486] ? ksys_write+0x12d/0x260 [ 1968.218138] ? lock_release+0x680/0x680 [ 1968.218797] ? selinux_file_permission+0x92/0x520 [ 1968.219653] ? __fget_files+0x296/0x4c0 [ 1968.220359] vfs_write+0x747/0xa70 [ 1968.220970] ksys_write+0x12d/0x260 [ 1968.221580] ? __ia32_sys_read+0xb0/0xb0 [ 1968.222294] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1968.223167] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1968.224054] do_syscall_64+0x33/0x40 [ 1968.224675] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1968.225587] RIP: 0033:0x7f21b1e90b19 [ 1968.226296] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1968.229387] RSP: 002b:00007f21af406188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1968.230643] RAX: ffffffffffffffda RBX: 00007f21b1fa3f60 RCX: 00007f21b1e90b19 [ 1968.231834] RDX: 000000000000000b RSI: 0000000020000300 RDI: 0000000000000004 [ 1968.233039] RBP: 00007f21af4061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1968.234214] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1968.235396] R13: 00007ffee3eb67ff R14: 00007f21af406300 R15: 0000000000022000 [ 1968.237216] ENOMEM in journal_alloc_journal_head, retrying. 04:04:56 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470001c00f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:04:56 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) 04:04:56 executing program 5: syslog(0x3, &(0x7f0000000340)=""/4096, 0xb00) syslog(0x2, &(0x7f0000001340)=""/4096, 0x1000) syslog(0x1, &(0x7f00000000c0)=""/142, 0x8e) syslog(0x9, &(0x7f0000000000)=""/147, 0x93) 2024/03/19 04:05:06 Manager.Poll call failed: read tcp 127.0.0.1:60368->127.0.0.1:42713: i/o timeout VM DIAGNOSIS: 04:06:52 Registers: info registers vcpu 0 RAX=ffffffff83e669d0 RBX=0000000000000000 RCX=ffffffff83e4e7bc RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e66fd8 RBP=fffffbfff09c6450 RSP=ffffffff84e07e38 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff856739c8 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e669de RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fd5a2ee9468 CR3=000000000d3b0000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=812dfd959bb35db1a84a8fb7a5da886d XMM02=ec2efd57dc4c00df000000000011c4c0 XMM03=b0966dc823693f04000000000011c590 XMM04=430f5f437cd98bdb00000000000ae968 XMM05=458a655262330a6f00000000008c7a50 XMM06=f6f26eb69d5d053d0000000000129c08 XMM07=139997807ff5a4420000000000125430 XMM08=e1353cc91df538a70000000000124a40 XMM09=00000000000000000000000000000000 XMM10=20000000000000002000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=00007f9a78cfa000 RCX=ffffffff815fea0a RDX=ffff88800d7b3480 RSI=00007f9a78cf4000 RDI=00007f9a78cfa000 RBP=ffffea0000705300 RSP=ffff8880180479d8 R8 =0000000000000000 R9 =ffffea0000705333 R10=0000000000000000 R11=0000000000000001 R12=ffffea0000705330 R13=ffff88801b1107a0 R14=dffffc0000000000 R15=00007f9a78cf4000 RIP=ffffffff8140ad04 RFL=00000296 [--S-AP-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f9a7865f328 CR3=00000000180a2000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=652022746f6f72223d74636361207469 XMM02=3d6c616e696d72657420322e322e302e XMM03=3d656d616e74736f682022646873732f XMM04=40404040404040404040404040404040 XMM05=5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a XMM06=20202020202020202020202020202020 XMM07=00000000000000000000000000000000 XMM08=652075253d64692073253d706f000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000