r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:36:53 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:36:53 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:36:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x0) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:36:53 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x1, 0x4) socket$nl_generic(0x10, 0x3, 0x10) 01:36:53 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:36:53 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:36:53 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:36:53 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000080)={0x0, r1, 0x100000000, 0x9e8, 0x6, 0x10001}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:36:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:36:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x0) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 1704.137978] kmemleak: 26 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:37:17 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r0, 0x8, 0x10000, 0x1000) 01:37:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:37:17 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000080)={0x0, r1, 0x100000000, 0x9e8, 0x6, 0x10001}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:37:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000080)={0x0, r1, 0x100000000, 0x9e8, 0x6, 0x10001}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:37:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(0x0, 0x80) 01:37:17 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:37:17 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:37:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000080)={0x0, r1, 0x100000000, 0x9e8, 0x6, 0x10001}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r4, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000600)={0x28, r5, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5}, @ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x28}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000100)={'wg2\x00'}) r6 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8800000) fallocate(r6, 0x8, 0x10000, 0x1000) 01:37:17 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r0, 0x8, 0x10000, 0x1000) 01:37:17 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, 0x0, &(0x7f0000000180)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:37:17 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:37:17 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r0, 0x8, 0x10000, 0x1000) 01:37:17 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:37:17 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) copy_file_range(0xffffffffffffffff, 0x0, r0, 0x0, 0x200f5ef, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r1, 0x8, 0x10000, 0x1000) [ 1724.098534] kmemleak: 28 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:37:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x0) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:37:37 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, 0x0, &(0x7f0000000180)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:37:37 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, 0x0, &(0x7f0000000180)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:37:37 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) copy_file_range(0xffffffffffffffff, 0x0, r0, 0x0, 0x200f5ef, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r1, 0x8, 0x10000, 0x1000) 01:37:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(0x0, 0x80) 01:37:37 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:37:37 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:37:37 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000080)={0x0, r1, 0x100000000, 0x9e8, 0x6, 0x10001}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:37:38 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) copy_file_range(0xffffffffffffffff, 0x0, r0, 0x0, 0x200f5ef, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r1, 0x8, 0x10000, 0x1000) 01:37:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x0) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:37:38 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, 0x0, &(0x7f0000000180)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:37:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000080)={0x0, r1, 0x100000000, 0x9e8, 0x6, 0x10001}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r4, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000600)={0x28, r5, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5}, @ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x28}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000100)={'wg2\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0xd8, r5, 0x0, 0x70bd27, 0x25dfdbfd, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x88, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0xff}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7c}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7f}]}, 0xd8}, 0x1, 0x0, 0x0, 0x4}, 0x8000) execveat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syz_tun\x00', &(0x7f00000003c0)='syzkaller0\x00'], &(0x7f0000000640)=[&(0x7f0000000440)='\x00', &(0x7f0000000480)='ethtool\x00', &(0x7f0000000500)='\'{/\x00', &(0x7f0000000540)='syz_tun\x00'], 0x400) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x8800000) fallocate(0xffffffffffffffff, 0x8, 0x10000, 0x1000) 01:37:38 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r0, 0x0, 0xffffffffffffffff, 0x0, 0x200f5ef, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r1, 0x8, 0x10000, 0x1000) 01:37:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000080)={0x0, r1, 0x100000000, 0x9e8, 0x6, 0x10001}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r4, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000600)={0x28, r5, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5}, @ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x28}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000100)={'wg2\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0xd8, r5, 0x0, 0x70bd27, 0x25dfdbfd, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x88, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0xff}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7c}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7f}]}, 0xd8}, 0x1, 0x0, 0x0, 0x4}, 0x8000) execveat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syz_tun\x00', &(0x7f00000003c0)='syzkaller0\x00'], &(0x7f0000000640)=[&(0x7f0000000440)='\x00', &(0x7f0000000480)='ethtool\x00', &(0x7f0000000500)='\'{/\x00', &(0x7f0000000540)='syz_tun\x00'], 0x400) r7 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) fallocate(r7, 0x8, 0x10000, 0x1000) 01:37:38 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, 0x0, &(0x7f0000000180)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:37:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(0x0, 0x80) 01:37:38 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000080)={0x0, r1, 0x100000000, 0x9e8, 0x6, 0x10001}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:37:38 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r0, 0x0, 0xffffffffffffffff, 0x0, 0x200f5ef, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r1, 0x8, 0x10000, 0x1000) 01:37:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x0) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:37:38 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:37:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000080)={0x0, r1, 0x100000000, 0x9e8, 0x6, 0x10001}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r4, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000600)={0x28, r5, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5}, @ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x28}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000100)={'wg2\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0xd8, r5, 0x0, 0x70bd27, 0x25dfdbfd, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x88, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0xff}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7c}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7f}]}, 0xd8}, 0x1, 0x0, 0x0, 0x4}, 0x8000) execveat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syz_tun\x00', &(0x7f00000003c0)='syzkaller0\x00'], &(0x7f0000000640)=[&(0x7f0000000440)='\x00', &(0x7f0000000480)='ethtool\x00', &(0x7f0000000500)='\'{/\x00', &(0x7f0000000540)='syz_tun\x00'], 0x400) r7 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) fallocate(r7, 0x8, 0x10000, 0x1000) 01:37:38 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r0, 0x0, 0xffffffffffffffff, 0x0, 0x200f5ef, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r1, 0x8, 0x10000, 0x1000) 01:37:38 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, 0x0, &(0x7f0000000180)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) [ 1747.222072] kmemleak: 21 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:38:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x0) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:38:02 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:38:02 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000080)={0x0, r1, 0x100000000, 0x9e8, 0x6, 0x10001}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:38:02 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:38:02 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:38:02 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x0) 01:38:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(0x0, 0x80) 01:38:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(0x0, 0x80) [ 1771.119829] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:38:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) (fail_nth: 1) 01:38:23 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:38:23 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000080)={0x0, r1, 0x100000000, 0x9e8, 0x6, 0x10001}) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:38:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x0) 01:38:23 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:38:23 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:38:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(0x0, 0x80) 01:38:23 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:38:24 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:38:24 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:38:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x0) [ 1778.676227] FAULT_INJECTION: forcing a failure. [ 1778.676227] name failslab, interval 1, probability 0, space 0, times 1 [ 1778.678958] CPU: 1 PID: 25564 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 1778.680406] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1778.682785] Call Trace: [ 1778.683347] dump_stack+0x107/0x163 [ 1778.684117] should_fail.cold+0x5/0xa [ 1778.684918] ? jbd2__journal_start+0x18c/0x880 [ 1778.685879] should_failslab+0x5/0x10 [ 1778.686679] kmem_cache_alloc+0x5b/0x350 [ 1778.687556] jbd2__journal_start+0x18c/0x880 [ 1778.688485] __ext4_journal_start_sb+0x210/0x420 [ 1778.689486] ext4_dirty_inode+0xbc/0x130 [ 1778.690337] ? ext4_setattr+0x22b0/0x22b0 [ 1778.691211] __mark_inode_dirty+0x492/0xf10 [ 1778.692139] generic_update_time+0x21c/0x370 [ 1778.693073] file_update_time+0x436/0x520 [ 1778.693954] ? evict_inodes+0x420/0x420 [ 1778.694794] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 1778.695873] file_modified+0x7d/0xa0 [ 1778.696654] ext4_fallocate+0x17b1/0x3c70 [ 1778.697517] ? lock_acquire+0x197/0x490 [ 1778.698351] ? __x64_sys_fallocate+0xcf/0x140 [ 1778.699314] ? ext4_ext_truncate+0x240/0x240 [ 1778.700238] ? ext4_ext_truncate+0x240/0x240 [ 1778.701158] vfs_fallocate+0x48f/0xcb0 [ 1778.701977] __x64_sys_fallocate+0xcf/0x140 [ 1778.702881] do_syscall_64+0x33/0x40 [ 1778.703668] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1778.704739] RIP: 0033:0x7f7e7e9e0b19 [ 1778.705527] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1778.709394] RSP: 002b:00007f7e7bf35188 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 1778.710999] RAX: ffffffffffffffda RBX: 00007f7e7eaf4020 RCX: 00007f7e7e9e0b19 [ 1778.712483] RDX: 0000000000010000 RSI: 0000000000000008 RDI: 0000000000000005 [ 1778.713948] RBP: 00007f7e7bf351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1778.715433] R10: 0000000000001000 R11: 0000000000000246 R12: 0000000000000001 [ 1778.716922] R13: 00007ffccc00f80f R14: 00007f7e7bf35300 R15: 0000000000022000 01:38:24 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:38:24 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:38:24 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:38:24 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 1791.993284] kmemleak: 15 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:38:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) (fail_nth: 2) 01:38:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x0) 01:38:45 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:38:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(0x0, 0x80) 01:38:46 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:38:46 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:38:46 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:38:46 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) copy_file_range(0xffffffffffffffff, 0x0, r0, 0x0, 0x200f5ef, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:38:46 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) copy_file_range(0xffffffffffffffff, 0x0, r0, 0x0, 0x200f5ef, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:38:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) (fail_nth: 1) 01:38:46 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) [ 1800.793308] FAULT_INJECTION: forcing a failure. [ 1800.793308] name failslab, interval 1, probability 0, space 0, times 0 [ 1800.795799] CPU: 0 PID: 26046 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 1800.797259] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1800.799858] Call Trace: [ 1800.800420] dump_stack+0x107/0x163 [ 1800.801201] should_fail.cold+0x5/0xa [ 1800.802021] ? create_object.isra.0+0x3a/0xa20 [ 1800.802995] should_failslab+0x5/0x10 [ 1800.803858] kmem_cache_alloc+0x5b/0x350 [ 1800.804750] create_object.isra.0+0x3a/0xa20 [ 1800.805667] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1800.806733] kmem_cache_alloc+0x159/0x350 [ 1800.807618] jbd2__journal_start+0x18c/0x880 [ 1800.808556] __ext4_journal_start_sb+0x210/0x420 [ 1800.809575] ext4_dirty_inode+0xbc/0x130 [ 1800.810428] ? ext4_setattr+0x22b0/0x22b0 [ 1800.811290] __mark_inode_dirty+0x492/0xf10 [ 1800.812227] generic_update_time+0x21c/0x370 [ 1800.813153] file_update_time+0x436/0x520 [ 1800.814022] ? evict_inodes+0x420/0x420 [ 1800.814856] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 1800.815916] file_modified+0x7d/0xa0 [ 1800.816694] ext4_fallocate+0x17b1/0x3c70 [ 1800.817558] ? lock_acquire+0x197/0x490 [ 1800.818384] ? __x64_sys_fallocate+0xcf/0x140 [ 1800.819332] ? ext4_ext_truncate+0x240/0x240 [ 1800.820271] ? ext4_ext_truncate+0x240/0x240 [ 1800.821193] vfs_fallocate+0x48f/0xcb0 [ 1800.822011] __x64_sys_fallocate+0xcf/0x140 [ 1800.822913] do_syscall_64+0x33/0x40 [ 1800.823709] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1800.824784] RIP: 0033:0x7f7e7e9e0b19 [ 1800.825564] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 01:38:46 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) copy_file_range(0xffffffffffffffff, 0x0, r0, 0x0, 0x200f5ef, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 1800.829417] RSP: 002b:00007f7e7bf35188 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 1800.831184] RAX: ffffffffffffffda RBX: 00007f7e7eaf4020 RCX: 00007f7e7e9e0b19 [ 1800.832702] RDX: 0000000000010000 RSI: 0000000000000008 RDI: 0000000000000005 [ 1800.834194] RBP: 00007f7e7bf351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1800.835691] R10: 0000000000001000 R11: 0000000000000246 R12: 0000000000000001 [ 1800.837180] R13: 00007ffccc00f80f R14: 00007f7e7bf35300 R15: 0000000000022000 01:38:46 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:38:46 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:38:46 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) [ 1801.026943] FAULT_INJECTION: forcing a failure. [ 1801.026943] name failslab, interval 1, probability 0, space 0, times 0 [ 1801.029678] CPU: 0 PID: 26225 Comm: syz-executor.1 Not tainted 5.10.123 #1 [ 1801.031287] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1801.033820] Call Trace: [ 1801.034454] dump_stack+0x107/0x163 [ 1801.035327] should_fail.cold+0x5/0xa [ 1801.036251] ? jbd2__journal_start+0x18c/0x880 [ 1801.037341] should_failslab+0x5/0x10 [ 1801.038248] kmem_cache_alloc+0x5b/0x350 [ 1801.039227] jbd2__journal_start+0x18c/0x880 [ 1801.040313] __ext4_journal_start_sb+0x210/0x420 [ 1801.041454] ext4_dirty_inode+0xbc/0x130 [ 1801.042428] ? ext4_setattr+0x22b0/0x22b0 [ 1801.043417] __mark_inode_dirty+0x492/0xf10 [ 1801.044470] generic_update_time+0x21c/0x370 [ 1801.045528] file_update_time+0x436/0x520 [ 1801.046520] ? evict_inodes+0x420/0x420 [ 1801.047473] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 1801.048679] file_modified+0x7d/0xa0 [ 1801.049570] ext4_fallocate+0x17b1/0x3c70 [ 1801.050559] ? lock_acquire+0x197/0x490 [ 1801.051507] ? __x64_sys_fallocate+0xcf/0x140 [ 1801.052612] ? ext4_ext_truncate+0x240/0x240 [ 1801.053670] ? ext4_ext_truncate+0x240/0x240 [ 1801.054718] vfs_fallocate+0x48f/0xcb0 [ 1801.055664] __x64_sys_fallocate+0xcf/0x140 [ 1801.056698] do_syscall_64+0x33/0x40 [ 1801.057588] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1801.058813] RIP: 0033:0x7f0b243f9b19 [ 1801.059720] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1801.064127] RSP: 002b:00007f0b2194e188 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 1801.065945] RAX: ffffffffffffffda RBX: 00007f0b2450d020 RCX: 00007f0b243f9b19 [ 1801.067668] RDX: 0000000000010000 RSI: 0000000000000008 RDI: 0000000000000005 [ 1801.069373] RBP: 00007f0b2194e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1801.071080] R10: 0000000000001000 R11: 0000000000000246 R12: 0000000000000001 [ 1801.072825] R13: 00007ffcf4d0c5cf R14: 00007f0b2194e300 R15: 0000000000022000 01:38:46 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r0, 0x0, 0xffffffffffffffff, 0x0, 0x200f5ef, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 1814.609502] kmemleak: 40 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:39:08 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:39:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) (fail_nth: 2) 01:39:08 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, 0x0, &(0x7f0000000200)) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:39:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x0) 01:39:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) copy_file_range(0xffffffffffffffff, 0x0, r0, 0x0, 0x200f5ef, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:39:08 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, 0x0, &(0x7f0000000200)) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:39:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) (fail_nth: 3) 01:39:08 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r0, 0x0, 0xffffffffffffffff, 0x0, 0x200f5ef, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:39:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:39:08 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) [ 1823.056176] FAULT_INJECTION: forcing a failure. [ 1823.056176] name failslab, interval 1, probability 0, space 0, times 0 [ 1823.058599] CPU: 1 PID: 26454 Comm: syz-executor.1 Not tainted 5.10.123 #1 [ 1823.060084] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1823.062465] Call Trace: [ 1823.063025] dump_stack+0x107/0x163 [ 1823.063795] should_fail.cold+0x5/0xa [ 1823.064609] ? create_object.isra.0+0x3a/0xa20 [ 1823.065601] should_failslab+0x5/0x10 [ 1823.066420] kmem_cache_alloc+0x5b/0x350 [ 1823.067282] create_object.isra.0+0x3a/0xa20 [ 1823.068234] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1823.069306] kmem_cache_alloc+0x159/0x350 [ 1823.070206] jbd2__journal_start+0x18c/0x880 [ 1823.071137] __ext4_journal_start_sb+0x210/0x420 [ 1823.072164] ext4_dirty_inode+0xbc/0x130 [ 1823.073032] ? ext4_setattr+0x22b0/0x22b0 [ 1823.073902] __mark_inode_dirty+0x492/0xf10 [ 1823.074835] generic_update_time+0x21c/0x370 [ 1823.075768] file_update_time+0x436/0x520 [ 1823.076666] ? evict_inodes+0x420/0x420 [ 1823.077507] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 1823.078592] file_modified+0x7d/0xa0 [ 1823.079375] ext4_fallocate+0x17b1/0x3c70 [ 1823.080265] ? lock_acquire+0x197/0x490 [ 1823.081123] ? __x64_sys_fallocate+0xcf/0x140 [ 1823.082102] ? ext4_ext_truncate+0x240/0x240 [ 1823.083041] ? ext4_ext_truncate+0x240/0x240 [ 1823.083995] vfs_fallocate+0x48f/0xcb0 [ 1823.084826] __x64_sys_fallocate+0xcf/0x140 [ 1823.085755] do_syscall_64+0x33/0x40 [ 1823.086541] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1823.087643] RIP: 0033:0x7f0b243f9b19 [ 1823.088435] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1823.092404] RSP: 002b:00007f0b2194e188 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 1823.094004] RAX: ffffffffffffffda RBX: 00007f0b2450d020 RCX: 00007f0b243f9b19 [ 1823.095537] RDX: 0000000000010000 RSI: 0000000000000008 RDI: 0000000000000005 [ 1823.097105] RBP: 00007f0b2194e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1823.098643] R10: 0000000000001000 R11: 0000000000000246 R12: 0000000000000001 [ 1823.100181] R13: 00007ffcf4d0c5cf R14: 00007f0b2194e300 R15: 0000000000022000 01:39:08 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r0, 0x0, 0xffffffffffffffff, 0x0, 0x200f5ef, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:39:08 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, 0x0, &(0x7f0000000200)) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) [ 1823.142111] FAULT_INJECTION: forcing a failure. [ 1823.142111] name failslab, interval 1, probability 0, space 0, times 0 [ 1823.144811] CPU: 1 PID: 26660 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 1823.146275] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1823.148678] Call Trace: [ 1823.149236] dump_stack+0x107/0x163 [ 1823.150005] should_fail.cold+0x5/0xa [ 1823.150807] ? jbd2__journal_start+0x18c/0x880 [ 1823.151776] should_failslab+0x5/0x10 [ 1823.152639] kmem_cache_alloc+0x5b/0x350 [ 1823.153572] jbd2__journal_start+0x18c/0x880 [ 1823.154586] __ext4_journal_start_sb+0x210/0x420 [ 1823.155652] ext4_fallocate+0x1f91/0x3c70 [ 1823.156606] ? lock_acquire+0x197/0x490 [ 1823.157501] ? __x64_sys_fallocate+0xcf/0x140 [ 1823.158520] ? ext4_ext_truncate+0x240/0x240 [ 1823.159521] ? ext4_ext_truncate+0x240/0x240 [ 1823.160515] vfs_fallocate+0x48f/0xcb0 [ 1823.161432] __x64_sys_fallocate+0xcf/0x140 [ 1823.162406] do_syscall_64+0x33/0x40 [ 1823.163262] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1823.164443] RIP: 0033:0x7f7e7e9e0b19 [ 1823.165298] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1823.169466] RSP: 002b:00007f7e7bf14188 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 1823.171208] RAX: ffffffffffffffda RBX: 00007f7e7eaf40e0 RCX: 00007f7e7e9e0b19 [ 1823.172852] RDX: 0000000000010000 RSI: 0000000000000008 RDI: 0000000000000005 [ 1823.174486] RBP: 00007f7e7bf141d0 R08: 0000000000000000 R09: 0000000000000000 [ 1823.176137] R10: 0000000000001000 R11: 0000000000000246 R12: 0000000000000001 [ 1823.177772] R13: 00007ffccc00f80f R14: 00007f7e7bf14300 R15: 0000000000022000 01:39:08 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, 0x0, &(0x7f0000000200)) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:39:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:39:08 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(0xffffffffffffffff, 0x0, r0, 0x0, 0x200f5ef, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r1, 0x8, 0x10000, 0x1000) 01:39:08 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:39:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x0) [ 1837.134332] kmemleak: 17 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:39:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) (fail_nth: 4) 01:39:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x0) 01:39:30 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, 0x0, &(0x7f0000000200)) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:39:30 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, 0x0, &(0x7f0000000200)) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:39:30 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(0xffffffffffffffff, 0x0, r0, 0x0, 0x200f5ef, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r1, 0x8, 0x10000, 0x1000) 01:39:30 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:39:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) (fail_nth: 3) 01:39:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:39:30 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(0xffffffffffffffff, 0x0, r0, 0x0, 0x200f5ef, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r1, 0x8, 0x10000, 0x1000) 01:39:30 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 1845.225164] FAULT_INJECTION: forcing a failure. [ 1845.225164] name failslab, interval 1, probability 0, space 0, times 0 [ 1845.227680] CPU: 1 PID: 26903 Comm: syz-executor.1 Not tainted 5.10.123 #1 [ 1845.229215] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1845.231664] Call Trace: [ 1845.232243] dump_stack+0x107/0x163 [ 1845.233032] should_fail.cold+0x5/0xa [ 1845.233859] ? jbd2__journal_start+0x18c/0x880 [ 1845.234851] should_failslab+0x5/0x10 [ 1845.235677] kmem_cache_alloc+0x5b/0x350 [ 1845.236570] jbd2__journal_start+0x18c/0x880 [ 1845.237529] __ext4_journal_start_sb+0x210/0x420 [ 1845.238564] ext4_fallocate+0x1f91/0x3c70 [ 1845.239457] ? lock_acquire+0x197/0x490 [ 1845.240329] ? __x64_sys_fallocate+0xcf/0x140 [ 1845.241332] ? ext4_ext_truncate+0x240/0x240 [ 1845.242309] ? ext4_ext_truncate+0x240/0x240 [ 1845.243276] vfs_fallocate+0x48f/0xcb0 [ 1845.244151] __x64_sys_fallocate+0xcf/0x140 [ 1845.245123] do_syscall_64+0x33/0x40 [ 1845.245943] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1845.247089] RIP: 0033:0x7f0b243f9b19 [ 1845.247897] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1845.251984] RSP: 002b:00007f0b2194e188 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 1845.253681] RAX: ffffffffffffffda RBX: 00007f0b2450d020 RCX: 00007f0b243f9b19 [ 1845.255255] RDX: 0000000000010000 RSI: 0000000000000008 RDI: 0000000000000005 [ 1845.256825] RBP: 00007f0b2194e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1845.258385] R10: 0000000000001000 R11: 0000000000000246 R12: 0000000000000001 [ 1845.259959] R13: 00007ffcf4d0c5cf R14: 00007f0b2194e300 R15: 0000000000022000 01:39:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 1) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 1845.377642] FAULT_INJECTION: forcing a failure. [ 1845.377642] name failslab, interval 1, probability 0, space 0, times 0 [ 1845.380531] CPU: 0 PID: 27084 Comm: syz-executor.0 Not tainted 5.10.123 #1 [ 1845.382161] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1845.384623] Call Trace: [ 1845.385195] dump_stack+0x107/0x163 [ 1845.385984] should_fail.cold+0x5/0xa [ 1845.386811] ? alloc_pipe_info+0x105/0x580 [ 1845.387711] should_failslab+0x5/0x10 [ 1845.388541] kmem_cache_alloc_trace+0x55/0x360 [ 1845.389533] alloc_pipe_info+0x105/0x580 [ 1845.390418] splice_direct_to_actor+0x770/0x980 [ 1845.391426] ? _cond_resched+0x12/0x80 [ 1845.392294] ? inode_security+0x107/0x130 [ 1845.393188] ? pipe_to_sendpage+0x380/0x380 [ 1845.394125] ? selinux_file_permission+0x36/0x510 [ 1845.395175] ? do_splice_to+0x160/0x160 [ 1845.396033] ? security_file_permission+0x24e/0x570 [ 1845.397132] do_splice_direct+0x1c4/0x290 [ 1845.398033] ? splice_direct_to_actor+0x980/0x980 [ 1845.399069] ? selinux_file_permission+0x36/0x510 [ 1845.400112] ? security_file_permission+0x24e/0x570 [ 1845.401210] vfs_copy_file_range+0x57b/0x10f0 [ 1845.402182] ? generic_file_rw_checks+0x230/0x230 [ 1845.403225] ? __fget_files+0x296/0x480 [ 1845.404099] __do_sys_copy_file_range+0x176/0x410 [ 1845.405163] ? vfs_copy_file_range+0x10f0/0x10f0 [ 1845.406168] ? ksys_write+0x1a5/0x250 [ 1845.407001] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1845.408040] do_syscall_64+0x33/0x40 [ 1845.408855] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1845.409951] RIP: 0033:0x7f81055c6b19 01:39:30 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r0, 0x0, 0xffffffffffffffff, 0x0, 0x200f5ef, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r1, 0x8, 0x10000, 0x1000) [ 1845.410758] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1845.414894] RSP: 002b:00007f8102b3c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 1845.416552] RAX: ffffffffffffffda RBX: 00007f81056d9f60 RCX: 00007f81055c6b19 [ 1845.418100] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 1845.419656] RBP: 00007f8102b3c1d0 R08: 000000000200f5ef R09: 0000000000000000 [ 1845.421216] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1845.422760] R13: 00007ffdc96cc02f R14: 00007f8102b3c300 R15: 0000000000022000 01:39:30 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:39:30 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), 0x0) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:39:30 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), 0x0) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:39:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 2) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:39:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:39:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) (fail_nth: 4) [ 1845.739699] FAULT_INJECTION: forcing a failure. [ 1845.739699] name failslab, interval 1, probability 0, space 0, times 0 [ 1845.742336] CPU: 0 PID: 27184 Comm: syz-executor.0 Not tainted 5.10.123 #1 [ 1845.743839] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1845.746321] Call Trace: [ 1845.746892] dump_stack+0x107/0x163 [ 1845.747683] should_fail.cold+0x5/0xa [ 1845.748514] ? create_object.isra.0+0x3a/0xa20 [ 1845.749495] should_failslab+0x5/0x10 [ 1845.750312] kmem_cache_alloc+0x5b/0x350 [ 1845.751193] create_object.isra.0+0x3a/0xa20 [ 1845.752138] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1845.753247] kmem_cache_alloc_trace+0x151/0x360 [ 1845.754255] alloc_pipe_info+0x105/0x580 [ 1845.755134] splice_direct_to_actor+0x770/0x980 [ 1845.756137] ? _cond_resched+0x12/0x80 [ 1845.756999] ? inode_security+0x107/0x130 [ 1845.757893] ? pipe_to_sendpage+0x380/0x380 [ 1845.758820] ? selinux_file_permission+0x36/0x510 [ 1845.759864] ? do_splice_to+0x160/0x160 [ 1845.760723] ? security_file_permission+0x24e/0x570 [ 1845.761808] do_splice_direct+0x1c4/0x290 [ 1845.762701] ? splice_direct_to_actor+0x980/0x980 [ 1845.763751] ? selinux_file_permission+0x36/0x510 [ 1845.764810] ? security_file_permission+0x24e/0x570 [ 1845.766087] vfs_copy_file_range+0x57b/0x10f0 [ 1845.767066] ? generic_file_rw_checks+0x230/0x230 [ 1845.768115] ? __fget_files+0x296/0x480 [ 1845.768987] __do_sys_copy_file_range+0x176/0x410 [ 1845.770068] ? vfs_copy_file_range+0x10f0/0x10f0 [ 1845.771065] ? ksys_write+0x1a5/0x250 [ 1845.771893] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1845.772924] do_syscall_64+0x33/0x40 [ 1845.773718] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1845.774804] RIP: 0033:0x7f81055c6b19 [ 1845.775596] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1845.779572] RSP: 002b:00007f8102b3c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 1845.781243] RAX: ffffffffffffffda RBX: 00007f81056d9f60 RCX: 00007f81055c6b19 [ 1845.782772] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 1845.784330] RBP: 00007f8102b3c1d0 R08: 000000000200f5ef R09: 0000000000000000 [ 1845.785881] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1845.787431] R13: 00007ffdc96cc02f R14: 00007f8102b3c300 R15: 0000000000022000 [ 1845.925691] FAULT_INJECTION: forcing a failure. [ 1845.925691] name failslab, interval 1, probability 0, space 0, times 0 [ 1845.928527] CPU: 1 PID: 27307 Comm: syz-executor.1 Not tainted 5.10.123 #1 [ 1845.930058] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1845.932636] Call Trace: [ 1845.933240] dump_stack+0x107/0x163 [ 1845.934027] should_fail.cold+0x5/0xa [ 1845.934890] ? create_object.isra.0+0x3a/0xa20 [ 1845.935924] should_failslab+0x5/0x10 [ 1845.936761] kmem_cache_alloc+0x5b/0x350 [ 1845.937659] ? up_write+0x191/0x550 [ 1845.938480] create_object.isra.0+0x3a/0xa20 [ 1845.939451] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1845.940625] kmem_cache_alloc+0x159/0x350 [ 1845.941625] jbd2__journal_start+0x18c/0x880 [ 1845.942605] __ext4_journal_start_sb+0x210/0x420 [ 1845.943617] ext4_fallocate+0x1f91/0x3c70 [ 1845.944508] ? lock_acquire+0x197/0x490 [ 1845.945352] ? __x64_sys_fallocate+0xcf/0x140 [ 1845.946315] ? ext4_ext_truncate+0x240/0x240 [ 1845.947254] ? ext4_ext_truncate+0x240/0x240 [ 1845.948197] vfs_fallocate+0x48f/0xcb0 [ 1845.949030] __x64_sys_fallocate+0xcf/0x140 [ 1845.949948] do_syscall_64+0x33/0x40 [ 1845.950735] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1845.951822] RIP: 0033:0x7f0b243f9b19 [ 1845.952628] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1845.956543] RSP: 002b:00007f0b2194e188 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 1845.958155] RAX: ffffffffffffffda RBX: 00007f0b2450d020 RCX: 00007f0b243f9b19 [ 1845.959663] RDX: 0000000000010000 RSI: 0000000000000008 RDI: 0000000000000005 [ 1845.961175] RBP: 00007f0b2194e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1845.962681] R10: 0000000000001000 R11: 0000000000000246 R12: 0000000000000001 [ 1845.964200] R13: 00007ffcf4d0c5cf R14: 00007f0b2194e300 R15: 0000000000022000 [ 1860.476397] kmemleak: 22 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:39:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) (fail_nth: 5) 01:39:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x4, 0x10000, 0x1000) 01:39:54 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:39:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 1) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:39:54 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), 0x0) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:39:54 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), 0x0) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:39:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 3) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:39:54 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r0, 0x0, 0xffffffffffffffff, 0x0, 0x200f5ef, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r1, 0x8, 0x10000, 0x1000) [ 1869.159117] FAULT_INJECTION: forcing a failure. [ 1869.159117] name failslab, interval 1, probability 0, space 0, times 0 [ 1869.161610] CPU: 0 PID: 27347 Comm: syz-executor.2 Not tainted 5.10.123 #1 [ 1869.163110] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1869.165577] Call Trace: [ 1869.166152] dump_stack+0x107/0x163 [ 1869.166942] should_fail.cold+0x5/0xa [ 1869.167788] ? alloc_pipe_info+0x105/0x580 [ 1869.168749] should_failslab+0x5/0x10 [ 1869.169670] kmem_cache_alloc_trace+0x55/0x360 [ 1869.170647] alloc_pipe_info+0x105/0x580 [ 1869.171524] splice_direct_to_actor+0x770/0x980 [ 1869.172536] ? _cond_resched+0x12/0x80 [ 1869.173368] ? inode_security+0x107/0x130 [ 1869.174266] ? pipe_to_sendpage+0x380/0x380 [ 1869.175185] ? selinux_file_permission+0x36/0x510 [ 1869.176222] ? do_splice_to+0x160/0x160 [ 1869.177078] ? security_file_permission+0x24e/0x570 [ 1869.178165] do_splice_direct+0x1c4/0x290 [ 1869.179045] ? splice_direct_to_actor+0x980/0x980 [ 1869.180084] ? selinux_file_permission+0x36/0x510 [ 1869.181141] ? security_file_permission+0x24e/0x570 [ 1869.182242] vfs_copy_file_range+0x57b/0x10f0 [ 1869.183213] ? generic_file_rw_checks+0x230/0x230 [ 1869.184256] ? __fget_files+0x296/0x480 [ 1869.185133] __do_sys_copy_file_range+0x176/0x410 [ 1869.186167] ? vfs_copy_file_range+0x10f0/0x10f0 [ 1869.187171] ? ksys_write+0x1a5/0x250 [ 1869.187998] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1869.189051] do_syscall_64+0x33/0x40 [ 1869.189857] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1869.190174] FAULT_INJECTION: forcing a failure. [ 1869.190174] name failslab, interval 1, probability 0, space 0, times 0 [ 1869.190944] RIP: 0033:0x7fbd0f57fb19 [ 1869.190962] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1869.190970] RSP: 002b:00007fbd0caf5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 1869.190988] RAX: ffffffffffffffda RBX: 00007fbd0f692f60 RCX: 00007fbd0f57fb19 [ 1869.191008] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 1869.202650] RBP: 00007fbd0caf51d0 R08: 000000000200f5ef R09: 0000000000000000 [ 1869.204156] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1869.205687] R13: 00007ffd29ee03ff R14: 00007fbd0caf5300 R15: 0000000000022000 [ 1869.207228] CPU: 1 PID: 27353 Comm: syz-executor.0 Not tainted 5.10.123 #1 [ 1869.208736] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1869.211195] Call Trace: [ 1869.211758] dump_stack+0x107/0x163 [ 1869.212568] should_fail.cold+0x5/0xa [ 1869.213377] ? alloc_pipe_info+0x1e0/0x580 [ 1869.214289] should_failslab+0x5/0x10 [ 1869.215089] __kmalloc+0x72/0x3e0 [ 1869.215857] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1869.216962] alloc_pipe_info+0x1e0/0x580 [ 1869.217851] splice_direct_to_actor+0x770/0x980 [ 1869.218838] ? _cond_resched+0x12/0x80 [ 1869.219671] ? inode_security+0x107/0x130 [ 1869.220592] ? pipe_to_sendpage+0x380/0x380 [ 1869.221506] ? selinux_file_permission+0x36/0x510 [ 1869.222528] ? do_splice_to+0x160/0x160 [ 1869.223362] ? security_file_permission+0x24e/0x570 [ 1869.224418] do_splice_direct+0x1c4/0x290 [ 1869.225319] ? splice_direct_to_actor+0x980/0x980 [ 1869.226313] ? selinux_file_permission+0x36/0x510 [ 1869.227336] ? security_file_permission+0x24e/0x570 [ 1869.228380] vfs_copy_file_range+0x57b/0x10f0 [ 1869.229339] ? generic_file_rw_checks+0x230/0x230 [ 1869.230354] ? __fget_files+0x296/0x480 [ 1869.231213] __do_sys_copy_file_range+0x176/0x410 [ 1869.232235] ? vfs_copy_file_range+0x10f0/0x10f0 [ 1869.233216] ? ksys_write+0x1a5/0x250 [ 1869.234033] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1869.235042] do_syscall_64+0x33/0x40 [ 1869.235824] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1869.236924] RIP: 0033:0x7f81055c6b19 [ 1869.237738] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1869.241626] RSP: 002b:00007f8102b3c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 1869.243230] RAX: ffffffffffffffda RBX: 00007f81056d9f60 RCX: 00007f81055c6b19 [ 1869.244740] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 1869.246243] RBP: 00007f8102b3c1d0 R08: 000000000200f5ef R09: 0000000000000000 [ 1869.247743] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1869.249278] R13: 00007ffdc96cc02f R14: 00007f8102b3c300 R15: 0000000000022000 01:39:54 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), 0x0) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:39:54 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r0, 0x0, 0xffffffffffffffff, 0x0, 0x200f5ef, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r1, 0x8, 0x10000, 0x1000) [ 1869.370191] FAULT_INJECTION: forcing a failure. [ 1869.370191] name failslab, interval 1, probability 0, space 0, times 0 [ 1869.372926] CPU: 1 PID: 27357 Comm: syz-executor.1 Not tainted 5.10.123 #1 [ 1869.374463] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1869.376864] Call Trace: [ 1869.377431] dump_stack+0x107/0x163 [ 1869.378230] should_fail.cold+0x5/0xa [ 1869.379043] ? create_object.isra.0+0x3a/0xa20 [ 1869.380016] should_failslab+0x5/0x10 [ 1869.380851] kmem_cache_alloc+0x5b/0x350 [ 1869.381710] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1869.382841] create_object.isra.0+0x3a/0xa20 [ 1869.383773] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1869.384859] __kmalloc+0x16e/0x3e0 [ 1869.385619] ext4_find_extent+0xa39/0xd20 [ 1869.386510] ext4_ext_remove_space+0x13a9/0x4000 [ 1869.387519] ? find_held_lock+0x2c/0x110 [ 1869.388392] ? do_raw_write_lock+0x11a/0x280 [ 1869.389336] ? do_raw_read_unlock+0x70/0x70 [ 1869.390254] ? ext4_ext_index_trans_blocks+0x160/0x160 [ 1869.391373] ? ext4_es_remove_extent+0x103/0x3f0 [ 1869.392373] ? ext4_es_lookup_extent+0xbe0/0xbe0 [ 1869.393394] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 1869.394473] ? __ext4_journal_start_sb+0x210/0x420 [ 1869.395511] ? __ext4_journal_start_sb+0x1db/0x420 [ 1869.396577] ext4_fallocate+0x203a/0x3c70 [ 1869.397454] ? lock_acquire+0x197/0x490 [ 1869.398294] ? __x64_sys_fallocate+0xcf/0x140 [ 1869.399262] ? ext4_ext_truncate+0x240/0x240 [ 1869.400224] ? ext4_ext_truncate+0x240/0x240 [ 1869.401182] vfs_fallocate+0x48f/0xcb0 [ 1869.402020] __x64_sys_fallocate+0xcf/0x140 [ 1869.402952] do_syscall_64+0x33/0x40 [ 1869.403752] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1869.404852] RIP: 0033:0x7f0b243f9b19 [ 1869.405644] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1869.409575] RSP: 002b:00007f0b2194e188 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 1869.411188] RAX: ffffffffffffffda RBX: 00007f0b2450d020 RCX: 00007f0b243f9b19 [ 1869.412723] RDX: 0000000000010000 RSI: 0000000000000008 RDI: 0000000000000005 [ 1869.414235] RBP: 00007f0b2194e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1869.415746] R10: 0000000000001000 R11: 0000000000000246 R12: 0000000000000001 [ 1869.417273] R13: 00007ffcf4d0c5cf R14: 00007f0b2194e300 R15: 0000000000022000 01:39:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 2) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:39:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:39:54 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 1869.594077] FAULT_INJECTION: forcing a failure. [ 1869.594077] name failslab, interval 1, probability 0, space 0, times 0 [ 1869.596602] CPU: 1 PID: 27571 Comm: syz-executor.2 Not tainted 5.10.123 #1 [ 1869.598345] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1869.600878] Call Trace: [ 1869.601571] dump_stack+0x107/0x163 [ 1869.602350] should_fail.cold+0x5/0xa [ 1869.603166] ? create_object.isra.0+0x3a/0xa20 [ 1869.604141] should_failslab+0x5/0x10 [ 1869.604969] kmem_cache_alloc+0x5b/0x350 [ 1869.605844] create_object.isra.0+0x3a/0xa20 [ 1869.606777] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1869.607860] kmem_cache_alloc_trace+0x151/0x360 [ 1869.608883] alloc_pipe_info+0x105/0x580 [ 1869.610021] splice_direct_to_actor+0x770/0x980 [ 1869.611013] ? _cond_resched+0x12/0x80 [ 1869.611850] ? inode_security+0x107/0x130 [ 1869.612778] ? pipe_to_sendpage+0x380/0x380 [ 1869.613833] ? selinux_file_permission+0x36/0x510 [ 1869.614870] ? do_splice_to+0x160/0x160 [ 1869.615742] ? security_file_permission+0x24e/0x570 [ 1869.617023] do_splice_direct+0x1c4/0x290 [ 1869.617932] ? splice_direct_to_actor+0x980/0x980 [ 1869.619078] ? selinux_file_permission+0x36/0x510 [ 1869.620109] ? security_file_permission+0x24e/0x570 [ 1869.621315] vfs_copy_file_range+0x57b/0x10f0 [ 1869.622294] ? generic_file_rw_checks+0x230/0x230 [ 1869.623332] ? __fget_files+0x296/0x480 [ 1869.624185] __do_sys_copy_file_range+0x176/0x410 [ 1869.625240] ? vfs_copy_file_range+0x10f0/0x10f0 [ 1869.626276] ? ksys_write+0x1a5/0x250 [ 1869.627115] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1869.628467] do_syscall_64+0x33/0x40 [ 1869.629296] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1869.630610] RIP: 0033:0x7fbd0f57fb19 [ 1869.631410] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1869.635706] RSP: 002b:00007fbd0caf5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 1869.637624] RAX: ffffffffffffffda RBX: 00007fbd0f692f60 RCX: 00007fbd0f57fb19 [ 1869.639334] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 1869.640887] RBP: 00007fbd0caf51d0 R08: 000000000200f5ef R09: 0000000000000000 [ 1869.642436] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1869.644199] R13: 00007ffd29ee03ff R14: 00007fbd0caf5300 R15: 0000000000022000 01:39:55 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:39:55 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), 0x0) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:39:55 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:39:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) (fail_nth: 6) 01:39:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:39:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10002, 0x1000) 01:39:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:39:55 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:39:55 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:39:55 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:39:55 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:39:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 1870.268288] FAULT_INJECTION: forcing a failure. [ 1870.268288] name failslab, interval 1, probability 0, space 0, times 0 [ 1870.271143] CPU: 0 PID: 27801 Comm: syz-executor.1 Not tainted 5.10.123 #1 [ 1870.272753] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1870.275232] Call Trace: [ 1870.275808] dump_stack+0x107/0x163 [ 1870.276620] should_fail.cold+0x5/0xa [ 1870.277453] ? create_object.isra.0+0x3a/0xa20 [ 1870.278449] should_failslab+0x5/0x10 [ 1870.279288] kmem_cache_alloc+0x5b/0x350 [ 1870.280179] ? pagecache_get_page+0x243/0xc80 [ 1870.281161] create_object.isra.0+0x3a/0xa20 [ 1870.282130] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1870.283260] kmem_cache_alloc+0x159/0x350 [ 1870.284167] ext4_free_blocks+0x915/0x20e0 [ 1870.285121] ? ext4_mb_new_blocks+0x4840/0x4840 [ 1870.286151] ? __ext4_journal_get_write_access+0x1bf/0x2b0 [ 1870.287375] ext4_ext_remove_space+0x1f7e/0x4000 [ 1870.288461] ? ext4_ext_index_trans_blocks+0x160/0x160 [ 1870.289679] ? ext4_es_remove_extent+0x103/0x3f0 [ 1870.290719] ? ext4_es_lookup_extent+0xbe0/0xbe0 [ 1870.291746] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 1870.292843] ? __ext4_journal_start_sb+0x210/0x420 [ 1870.293902] ? __ext4_journal_start_sb+0x1db/0x420 [ 1870.294984] ext4_fallocate+0x203a/0x3c70 [ 1870.295872] ? lock_acquire+0x197/0x490 [ 1870.296739] ? __x64_sys_fallocate+0xcf/0x140 [ 1870.297732] ? ext4_ext_truncate+0x240/0x240 [ 1870.298716] ? ext4_ext_truncate+0x240/0x240 [ 1870.299666] vfs_fallocate+0x48f/0xcb0 [ 1870.300542] __x64_sys_fallocate+0xcf/0x140 [ 1870.301471] do_syscall_64+0x33/0x40 [ 1870.302282] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1870.303395] RIP: 0033:0x7f0b243f9b19 [ 1870.304212] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1870.308205] RSP: 002b:00007f0b2194e188 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 1870.309879] RAX: ffffffffffffffda RBX: 00007f0b2450d020 RCX: 00007f0b243f9b19 [ 1870.311427] RDX: 0000000000010000 RSI: 0000000000000008 RDI: 0000000000000005 [ 1870.312986] RBP: 00007f0b2194e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1870.314542] R10: 0000000000001000 R11: 0000000000000246 R12: 0000000000000001 [ 1870.316143] R13: 00007ffcf4d0c5cf R14: 00007f0b2194e300 R15: 0000000000022000 [ 1883.870606] kmemleak: 35 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:40:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 3) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:40:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10012, 0x1000) 01:40:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x2) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:40:16 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:40:16 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:40:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) (fail_nth: 7) 01:40:16 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(0x0, 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:40:16 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) [ 1891.338181] FAULT_INJECTION: forcing a failure. [ 1891.338181] name failslab, interval 1, probability 0, space 0, times 0 [ 1891.340873] CPU: 1 PID: 28021 Comm: syz-executor.2 Not tainted 5.10.123 #1 [ 1891.342438] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1891.345012] Call Trace: [ 1891.345609] dump_stack+0x107/0x163 [ 1891.346433] should_fail.cold+0x5/0xa [ 1891.347372] ? alloc_pipe_info+0x1e0/0x580 [ 1891.348324] should_failslab+0x5/0x10 [ 1891.349187] __kmalloc+0x72/0x3e0 [ 1891.349966] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1891.351112] alloc_pipe_info+0x1e0/0x580 [ 1891.352108] splice_direct_to_actor+0x770/0x980 [ 1891.353230] ? _cond_resched+0x12/0x80 [ 1891.354108] ? inode_security+0x107/0x130 [ 1891.355054] ? pipe_to_sendpage+0x380/0x380 [ 1891.356022] ? selinux_file_permission+0x36/0x510 [ 1891.357130] ? do_splice_to+0x160/0x160 [ 1891.358080] ? security_file_permission+0x24e/0x570 [ 1891.359329] do_splice_direct+0x1c4/0x290 [ 1891.360336] ? splice_direct_to_actor+0x980/0x980 [ 1891.361517] ? selinux_file_permission+0x36/0x510 [ 1891.362651] ? security_file_permission+0x24e/0x570 [ 1891.363875] vfs_copy_file_range+0x57b/0x10f0 [ 1891.364987] ? generic_file_rw_checks+0x230/0x230 [ 1891.366145] ? __fget_files+0x296/0x480 [ 1891.367100] __do_sys_copy_file_range+0x176/0x410 [ 1891.368309] ? vfs_copy_file_range+0x10f0/0x10f0 [ 1891.369414] ? ksys_write+0x1a5/0x250 [ 1891.370324] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1891.371499] do_syscall_64+0x33/0x40 [ 1891.372390] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1891.373642] RIP: 0033:0x7fbd0f57fb19 [ 1891.374540] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1891.378960] RSP: 002b:00007fbd0caf5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 1891.380724] RAX: ffffffffffffffda RBX: 00007fbd0f692f60 RCX: 00007fbd0f57fb19 [ 1891.382439] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 1891.384092] RBP: 00007fbd0caf51d0 R08: 000000000200f5ef R09: 0000000000000000 [ 1891.385835] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1891.387489] R13: 00007ffd29ee03ff R14: 00007fbd0caf5300 R15: 0000000000022000 [ 1891.406042] FAULT_INJECTION: forcing a failure. [ 1891.406042] name failslab, interval 1, probability 0, space 0, times 0 [ 1891.407881] CPU: 0 PID: 28036 Comm: syz-executor.1 Not tainted 5.10.123 #1 [ 1891.409012] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1891.410860] Call Trace: [ 1891.411300] dump_stack+0x107/0x163 [ 1891.411893] should_fail.cold+0x5/0xa [ 1891.412513] ? ext4_find_extent+0xa39/0xd20 [ 1891.413238] should_failslab+0x5/0x10 [ 1891.413860] __kmalloc+0x72/0x3e0 [ 1891.414340] ? lock_downgrade+0x6d0/0x6d0 [ 1891.414854] ext4_find_extent+0xa39/0xd20 [ 1891.415346] ? do_raw_spin_unlock+0x4f/0x210 [ 1891.415838] ext4_ext_shift_extents+0xb0/0x10a0 [ 1891.416400] ? ext4_ext_next_allocated_block+0x2d0/0x2d0 [ 1891.417036] ? ext4_es_remove_extent+0x103/0x3f0 [ 1891.417588] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 1891.418169] ? __ext4_journal_start_sb+0x210/0x420 [ 1891.418738] ? __ext4_journal_start_sb+0x1db/0x420 [ 1891.419317] ext4_fallocate+0x2077/0x3c70 [ 1891.419797] ? lock_acquire+0x197/0x490 [ 1891.420258] ? __x64_sys_fallocate+0xcf/0x140 [ 1891.420793] ? ext4_ext_truncate+0x240/0x240 [ 1891.421292] ? ext4_ext_truncate+0x240/0x240 [ 1891.421809] vfs_fallocate+0x48f/0xcb0 [ 1891.422268] __x64_sys_fallocate+0xcf/0x140 [ 1891.422775] do_syscall_64+0x33/0x40 [ 1891.423217] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1891.423813] RIP: 0033:0x7f0b243f9b19 [ 1891.424247] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1891.426401] RSP: 002b:00007f0b2194e188 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 1891.427286] RAX: ffffffffffffffda RBX: 00007f0b2450d020 RCX: 00007f0b243f9b19 [ 1891.428114] RDX: 0000000000010000 RSI: 0000000000000008 RDI: 0000000000000004 [ 1891.428953] RBP: 00007f0b2194e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1891.429780] R10: 0000000000001000 R11: 0000000000000246 R12: 0000000000000001 [ 1891.430608] R13: 00007ffcf4d0c5cf R14: 00007f0b2194e300 R15: 0000000000022000 01:40:16 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:40:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x3) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:40:16 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) [ 1904.296670] kmemleak: 24 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:40:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:40:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x11200, 0x1000) 01:40:37 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:40:37 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:40:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) (fail_nth: 8) 01:40:37 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(0xffffffffffffffff, 0x0, r0, 0x0, 0x200f5ef, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:40:37 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(0x0, 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:40:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 1912.158965] FAULT_INJECTION: forcing a failure. [ 1912.158965] name failslab, interval 1, probability 0, space 0, times 0 [ 1912.161461] CPU: 0 PID: 28171 Comm: syz-executor.2 Not tainted 5.10.123 #1 [ 1912.162941] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1912.165347] Call Trace: [ 1912.165913] dump_stack+0x107/0x163 [ 1912.166686] should_fail.cold+0x5/0xa [ 1912.167508] ? create_object.isra.0+0x3a/0xa20 [ 1912.168480] should_failslab+0x5/0x10 [ 1912.169300] kmem_cache_alloc+0x5b/0x350 [ 1912.170170] ? create_object.isra.0+0x3ad/0xa20 [ 1912.171169] create_object.isra.0+0x3a/0xa20 [ 1912.172101] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1912.173194] __kmalloc_node+0x1ae/0x4a0 [ 1912.174045] memcg_alloc_page_obj_cgroups+0x6f/0xf0 [ 1912.175115] memcg_slab_post_alloc_hook+0x1f9/0x3f0 [ 1912.176188] ? trace_hardirqs_on+0x5b/0x180 [ 1912.177283] kmem_cache_alloc_trace+0x169/0x360 [ 1912.178304] alloc_pipe_info+0x105/0x580 [ 1912.179229] splice_direct_to_actor+0x770/0x980 [ 1912.180228] ? _cond_resched+0x12/0x80 [ 1912.181073] ? inode_security+0x107/0x130 [ 1912.181970] ? pipe_to_sendpage+0x380/0x380 [ 1912.182893] ? selinux_file_permission+0x36/0x510 [ 1912.183932] ? do_splice_to+0x160/0x160 [ 1912.184789] ? security_file_permission+0x24e/0x570 [ 1912.185890] do_splice_direct+0x1c4/0x290 [ 1912.186770] ? splice_direct_to_actor+0x980/0x980 [ 1912.187791] ? selinux_file_permission+0x36/0x510 [ 1912.188816] ? security_file_permission+0x24e/0x570 [ 1912.189897] vfs_copy_file_range+0x57b/0x10f0 [ 1912.190857] ? generic_file_rw_checks+0x230/0x230 [ 1912.191885] ? __fget_files+0x296/0x480 [ 1912.192746] __do_sys_copy_file_range+0x176/0x410 [ 1912.193798] ? vfs_copy_file_range+0x10f0/0x10f0 [ 1912.194803] ? ksys_write+0x1a5/0x250 [ 1912.195634] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1912.196664] do_syscall_64+0x33/0x40 [ 1912.197467] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1912.198558] RIP: 0033:0x7fbd0f57fb19 [ 1912.199354] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1912.203294] RSP: 002b:00007fbd0caf5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 1912.204914] RAX: ffffffffffffffda RBX: 00007fbd0f692f60 RCX: 00007fbd0f57fb19 [ 1912.206437] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 1912.207955] RBP: 00007fbd0caf51d0 R08: 000000000200f5ef R09: 0000000000000000 [ 1912.209483] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1912.211001] R13: 00007ffd29ee03ff R14: 00007fbd0caf5300 R15: 0000000000022000 01:40:37 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) [ 1912.317849] FAULT_INJECTION: forcing a failure. [ 1912.317849] name failslab, interval 1, probability 0, space 0, times 0 [ 1912.320605] CPU: 0 PID: 28173 Comm: syz-executor.1 Not tainted 5.10.123 #1 [ 1912.322181] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1912.324615] Call Trace: [ 1912.325196] dump_stack+0x107/0x163 [ 1912.325986] should_fail.cold+0x5/0xa [ 1912.326808] ? create_object.isra.0+0x3a/0xa20 [ 1912.327796] should_failslab+0x5/0x10 [ 1912.328611] kmem_cache_alloc+0x5b/0x350 [ 1912.329489] create_object.isra.0+0x3a/0xa20 [ 1912.330426] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1912.331511] kmem_cache_alloc+0x159/0x350 [ 1912.332413] ext4_mb_new_blocks+0x64d/0x4840 [ 1912.333390] ? find_held_lock+0x2c/0x110 [ 1912.334272] ? ext4_discard_preallocations+0xe10/0xe10 [ 1912.335403] ? __ext4_handle_dirty_metadata+0x1f3/0x730 [ 1912.336547] ext4_new_meta_blocks+0x1d9/0x320 [ 1912.337511] ? ext4_should_retry_alloc+0x230/0x230 [ 1912.338567] ? ext4_reserve_inode_write+0x114/0x230 [ 1912.339646] ext4_ext_insert_extent+0x1024/0x4150 [ 1912.340685] ? mem_cgroup_move_charge_pte_range+0x414/0xfa0 [ 1912.341928] ? get_implied_cluster_alloc.isra.0+0x770/0x770 [ 1912.343137] ? __ext4_ext_dirty+0x11c/0x230 [ 1912.344064] ext4_split_extent_at+0x435/0xe10 [ 1912.345053] ? ext4_ext_insert_extent+0x4150/0x4150 [ 1912.346141] ? ext4_find_extent+0x7b5/0xd20 [ 1912.347074] ext4_ext_remove_space+0x2a77/0x4000 [ 1912.348090] ? find_held_lock+0x2c/0x110 [ 1912.348971] ? do_raw_write_lock+0x11a/0x280 [ 1912.349920] ? do_raw_read_unlock+0x70/0x70 [ 1912.350846] ? ext4_ext_index_trans_blocks+0x160/0x160 [ 1912.351966] ? ext4_es_remove_extent+0x103/0x3f0 [ 1912.352986] ? ext4_es_lookup_extent+0xbe0/0xbe0 [ 1912.354001] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 1912.355063] ? __ext4_journal_start_sb+0x210/0x420 [ 1912.356109] ? __ext4_journal_start_sb+0x1db/0x420 [ 1912.357173] ext4_fallocate+0x203a/0x3c70 [ 1912.358054] ? lock_acquire+0x197/0x490 [ 1912.358896] ? __x64_sys_fallocate+0xcf/0x140 [ 1912.359864] ? ext4_ext_truncate+0x240/0x240 [ 1912.360810] ? ext4_ext_truncate+0x240/0x240 [ 1912.361751] vfs_fallocate+0x48f/0xcb0 [ 1912.362587] __x64_sys_fallocate+0xcf/0x140 [ 1912.363505] do_syscall_64+0x33/0x40 [ 1912.364298] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1912.365407] RIP: 0033:0x7f0b243f9b19 [ 1912.366200] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1912.370194] RSP: 002b:00007f0b2194e188 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 1912.371835] RAX: ffffffffffffffda RBX: 00007f0b2450d020 RCX: 00007f0b243f9b19 [ 1912.373396] RDX: 0000000000010000 RSI: 0000000000000008 RDI: 0000000000000005 [ 1912.374930] RBP: 00007f0b2194e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1912.376443] R10: 0000000000001000 R11: 0000000000000246 R12: 0000000000000001 [ 1912.377975] R13: 00007ffcf4d0c5cf R14: 00007f0b2194e300 R15: 0000000000022000 01:40:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x5) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:40:37 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(0xffffffffffffffff, 0x0, r0, 0x0, 0x200f5ef, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:40:37 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:40:38 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(0xffffffffffffffff, 0x0, r0, 0x0, 0x200f5ef, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:40:38 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:40:38 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:40:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x6) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 1925.822570] kmemleak: 46 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:40:59 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:40:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 5) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:40:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) (fail_nth: 9) 01:40:59 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:40:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x14000, 0x1000) 01:40:59 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r0, 0x0, 0xffffffffffffffff, 0x0, 0x200f5ef, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:40:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x7) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:40:59 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(0x0, 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) [ 1934.307660] FAULT_INJECTION: forcing a failure. [ 1934.307660] name failslab, interval 1, probability 0, space 0, times 0 [ 1934.310152] CPU: 1 PID: 28527 Comm: syz-executor.2 Not tainted 5.10.123 #1 [ 1934.311623] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1934.314130] Call Trace: [ 1934.314686] dump_stack+0x107/0x163 [ 1934.315468] should_fail.cold+0x5/0xa [ 1934.316392] ? iter_file_splice_write+0x16d/0xbe0 [ 1934.317407] should_failslab+0x5/0x10 [ 1934.318215] __kmalloc+0x72/0x3e0 [ 1934.318962] iter_file_splice_write+0x16d/0xbe0 [ 1934.319945] ? atime_needs_update+0x5f0/0x5f0 [ 1934.320912] ? generic_splice_sendpage+0x140/0x140 [ 1934.321948] ? pipe_to_user+0x170/0x170 [ 1934.322797] ? _cond_resched+0x12/0x80 [ 1934.323632] ? avc_policy_seqno+0x9/0x70 [ 1934.324500] ? selinux_file_permission+0x36/0x510 [ 1934.325514] ? lockdep_init_map_type+0x2c3/0x770 [ 1934.326533] ? generic_splice_sendpage+0x140/0x140 [ 1934.327601] direct_splice_actor+0x10f/0x170 [ 1934.328521] splice_direct_to_actor+0x387/0x980 [ 1934.329497] ? pipe_to_sendpage+0x380/0x380 [ 1934.330407] ? do_splice_to+0x160/0x160 [ 1934.331300] ? security_file_permission+0x24e/0x570 [ 1934.332362] do_splice_direct+0x1c4/0x290 [ 1934.333229] ? splice_direct_to_actor+0x980/0x980 [ 1934.334275] ? selinux_file_permission+0x36/0x510 [ 1934.335304] ? security_file_permission+0x24e/0x570 [ 1934.336376] vfs_copy_file_range+0x57b/0x10f0 [ 1934.337337] ? generic_file_rw_checks+0x230/0x230 [ 1934.338372] ? __fget_files+0x296/0x480 [ 1934.339235] __do_sys_copy_file_range+0x176/0x410 [ 1934.340275] ? vfs_copy_file_range+0x10f0/0x10f0 [ 1934.341277] ? ksys_write+0x1a5/0x250 [ 1934.342108] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1934.343135] do_syscall_64+0x33/0x40 [ 1934.343925] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1934.345015] RIP: 0033:0x7fbd0f57fb19 [ 1934.345816] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1934.349721] RSP: 002b:00007fbd0caf5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 1934.351332] RAX: ffffffffffffffda RBX: 00007fbd0f692f60 RCX: 00007fbd0f57fb19 [ 1934.352843] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 1934.354370] RBP: 00007fbd0caf51d0 R08: 000000000200f5ef R09: 0000000000000000 [ 1934.355872] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1934.357399] R13: 00007ffd29ee03ff R14: 00007fbd0caf5300 R15: 0000000000022000 [ 1934.413710] FAULT_INJECTION: forcing a failure. [ 1934.413710] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 1934.416754] CPU: 1 PID: 28534 Comm: syz-executor.1 Not tainted 5.10.123 #1 [ 1934.418215] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1934.420634] Call Trace: [ 1934.421260] dump_stack+0x107/0x163 [ 1934.422050] should_fail.cold+0x5/0xa [ 1934.422850] _copy_to_user+0x2e/0x180 [ 1934.423647] simple_read_from_buffer+0xcc/0x160 [ 1934.424624] proc_fail_nth_read+0x194/0x220 [ 1934.425536] ? proc_sessionid_read+0x220/0x220 [ 1934.426484] ? security_file_permission+0x24e/0x570 [ 1934.427529] ? perf_trace_initcall_start+0x111/0x370 [ 1934.428595] ? proc_sessionid_read+0x220/0x220 [ 1934.429564] vfs_read+0x228/0x580 [ 1934.430297] ksys_read+0x12d/0x250 [ 1934.431051] ? __ia32_sys_pwrite64+0x230/0x230 [ 1934.432023] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1934.433041] do_syscall_64+0x33/0x40 [ 1934.433845] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1934.434961] RIP: 0033:0x7f0b243ac69c [ 1934.435741] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1934.439643] RSP: 002b:00007f0b2194e170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1934.441263] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0b243ac69c [ 1934.442790] RDX: 000000000000000f RSI: 00007f0b2194e1e0 RDI: 0000000000000007 [ 1934.444276] RBP: 00007f0b2194e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1934.445771] R10: 0000000000001000 R11: 0000000000000246 R12: 0000000000000001 [ 1934.447258] R13: 00007ffcf4d0c5cf R14: 00007f0b2194e300 R15: 0000000000022000 01:40:59 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r0, 0x0, 0xffffffffffffffff, 0x0, 0x200f5ef, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 1949.459759] kmemleak: 9 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:41:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x8) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:41:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 6) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:41:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x5000000, 0x1000) 01:41:22 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:41:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) 01:41:22 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, 0x0, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:41:22 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r0, 0x0, 0xffffffffffffffff, 0x0, 0x200f5ef, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:41:22 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) [ 1956.907554] FAULT_INJECTION: forcing a failure. [ 1956.907554] name failslab, interval 1, probability 0, space 0, times 0 [ 1956.910055] CPU: 1 PID: 28658 Comm: syz-executor.2 Not tainted 5.10.123 #1 [ 1956.911642] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1956.914060] Call Trace: [ 1956.914624] dump_stack+0x107/0x163 [ 1956.915400] should_fail.cold+0x5/0xa [ 1956.916219] ? create_object.isra.0+0x3a/0xa20 [ 1956.917190] should_failslab+0x5/0x10 [ 1956.918012] kmem_cache_alloc+0x5b/0x350 [ 1956.918875] ? igrab+0xb0/0xb0 [ 1956.919570] create_object.isra.0+0x3a/0xa20 [ 1956.920503] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1956.921586] __kmalloc+0x16e/0x3e0 [ 1956.922366] iter_file_splice_write+0x16d/0xbe0 [ 1956.923349] ? atime_needs_update+0x5f0/0x5f0 [ 1956.924318] ? generic_splice_sendpage+0x140/0x140 [ 1956.925358] ? pipe_to_user+0x170/0x170 [ 1956.926218] ? _cond_resched+0x12/0x80 [ 1956.927076] ? avc_policy_seqno+0x9/0x70 [ 1956.927952] ? selinux_file_permission+0x36/0x510 [ 1956.928991] ? lockdep_init_map_type+0x2c3/0x770 [ 1956.930046] ? generic_splice_sendpage+0x140/0x140 [ 1956.931095] direct_splice_actor+0x10f/0x170 [ 1956.932040] splice_direct_to_actor+0x387/0x980 [ 1956.933040] ? pipe_to_sendpage+0x380/0x380 [ 1956.934004] ? do_splice_to+0x160/0x160 [ 1956.934848] ? security_file_permission+0x24e/0x570 [ 1956.935959] do_splice_direct+0x1c4/0x290 [ 1956.936846] ? splice_direct_to_actor+0x980/0x980 [ 1956.937880] ? selinux_file_permission+0x36/0x510 [ 1956.938909] ? security_file_permission+0x24e/0x570 [ 1956.939986] vfs_copy_file_range+0x57b/0x10f0 [ 1956.940950] ? generic_file_rw_checks+0x230/0x230 [ 1956.942025] ? __fget_files+0x296/0x480 [ 1956.942892] __do_sys_copy_file_range+0x176/0x410 [ 1956.943921] ? vfs_copy_file_range+0x10f0/0x10f0 [ 1956.944918] ? ksys_write+0x1a5/0x250 [ 1956.945749] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1956.946783] do_syscall_64+0x33/0x40 [ 1956.947576] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1956.948672] RIP: 0033:0x7fbd0f57fb19 [ 1956.949473] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1956.953378] RSP: 002b:00007fbd0caf5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 1956.955019] RAX: ffffffffffffffda RBX: 00007fbd0f692f60 RCX: 00007fbd0f57fb19 [ 1956.956536] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 1956.958044] RBP: 00007fbd0caf51d0 R08: 000000000200f5ef R09: 0000000000000000 [ 1956.959566] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1956.961071] R13: 00007ffd29ee03ff R14: 00007fbd0caf5300 R15: 0000000000022000 01:41:22 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:41:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x9) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:41:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x4, 0x10000, 0x1000) 01:41:22 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:41:22 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:41:22 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:41:22 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, 0x0, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:41:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xa) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:41:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1002) 01:41:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 7) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 1957.633786] FAULT_INJECTION: forcing a failure. [ 1957.633786] name failslab, interval 1, probability 0, space 0, times 0 [ 1957.636427] CPU: 0 PID: 29034 Comm: syz-executor.2 Not tainted 5.10.123 #1 [ 1957.637939] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1957.640336] Call Trace: [ 1957.640897] dump_stack+0x107/0x163 [ 1957.641666] should_fail.cold+0x5/0xa [ 1957.642502] ? jbd2__journal_start+0x18c/0x880 [ 1957.643467] should_failslab+0x5/0x10 [ 1957.644275] kmem_cache_alloc+0x5b/0x350 [ 1957.645156] jbd2__journal_start+0x18c/0x880 [ 1957.646109] __ext4_journal_start_sb+0x210/0x420 [ 1957.647121] ext4_dirty_inode+0xbc/0x130 [ 1957.647983] ? ext4_setattr+0x22b0/0x22b0 [ 1957.648859] __mark_inode_dirty+0x492/0xf10 [ 1957.649794] ? security_inode_need_killpriv+0x79/0xa0 [ 1957.650893] generic_update_time+0x21c/0x370 [ 1957.651837] file_update_time+0x436/0x520 [ 1957.652723] ? evict_inodes+0x420/0x420 [ 1957.653622] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 1957.655026] file_modified+0x7d/0xa0 [ 1957.656047] ext4_file_write_iter+0x8f5/0x1890 [ 1957.657304] ? stack_trace_consume_entry+0x160/0x160 [ 1957.658722] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1957.659979] ? kasan_save_stack+0x32/0x40 [ 1957.661115] ? kasan_save_stack+0x1b/0x40 [ 1957.662255] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1957.663605] ? iter_file_splice_write+0x16d/0xbe0 [ 1957.664946] ? direct_splice_actor+0x10f/0x170 [ 1957.666207] ? splice_direct_to_actor+0x387/0x980 [ 1957.667522] ? do_splice_direct+0x1c4/0x290 [ 1957.668702] ? vfs_copy_file_range+0x57b/0x10f0 [ 1957.670005] ? __do_sys_copy_file_range+0x176/0x410 [ 1957.671362] do_iter_readv_writev+0x476/0x750 [ 1957.672609] ? new_sync_write+0x660/0x660 [ 1957.673754] ? selinux_file_permission+0x36/0x510 [ 1957.675127] do_iter_write+0x18d/0x670 [ 1957.676227] vfs_iter_write+0x70/0xa0 [ 1957.677296] iter_file_splice_write+0x71d/0xbe0 [ 1957.678631] ? generic_splice_sendpage+0x140/0x140 [ 1957.679998] ? avc_policy_seqno+0x9/0x70 [ 1957.681116] ? selinux_file_permission+0x36/0x510 [ 1957.682442] ? lockdep_init_map_type+0x2c3/0x770 [ 1957.683774] ? generic_splice_sendpage+0x140/0x140 [ 1957.685117] direct_splice_actor+0x10f/0x170 [ 1957.686257] splice_direct_to_actor+0x387/0x980 [ 1957.687400] ? pipe_to_sendpage+0x380/0x380 [ 1957.688379] ? do_splice_to+0x160/0x160 [ 1957.689262] ? security_file_permission+0x24e/0x570 [ 1957.690559] do_splice_direct+0x1c4/0x290 [ 1957.691503] ? splice_direct_to_actor+0x980/0x980 [ 1957.692592] ? selinux_file_permission+0x36/0x510 [ 1957.693673] ? security_file_permission+0x24e/0x570 [ 1957.694846] vfs_copy_file_range+0x57b/0x10f0 [ 1957.695921] ? generic_file_rw_checks+0x230/0x230 [ 1957.697045] ? __fget_files+0x296/0x480 [ 1957.697985] __do_sys_copy_file_range+0x176/0x410 [ 1957.699089] ? vfs_copy_file_range+0x10f0/0x10f0 [ 1957.700237] ? ksys_write+0x1a5/0x250 [ 1957.701289] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1957.702639] do_syscall_64+0x33/0x40 [ 1957.703491] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1957.704636] RIP: 0033:0x7fbd0f57fb19 [ 1957.705485] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1957.709834] RSP: 002b:00007fbd0caf5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 1957.711941] RAX: ffffffffffffffda RBX: 00007fbd0f692f60 RCX: 00007fbd0f57fb19 [ 1957.713913] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 1957.715877] RBP: 00007fbd0caf51d0 R08: 000000000200f5ef R09: 0000000000000000 [ 1957.717857] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1957.719760] R13: 00007ffd29ee03ff R14: 00007fbd0caf5300 R15: 0000000000022000 01:41:23 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, 0x0, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) [ 1971.988072] kmemleak: 21 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:41:54 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:41:54 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:41:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0xf, 0x10000, 0x1000) 01:41:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xb) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:41:54 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:41:54 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:41:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 8) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:41:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1012) [ 1988.707754] FAULT_INJECTION: forcing a failure. [ 1988.707754] name failslab, interval 1, probability 0, space 0, times 0 [ 1988.710492] CPU: 1 PID: 29227 Comm: syz-executor.2 Not tainted 5.10.123 #1 [ 1988.712033] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1988.714417] Call Trace: [ 1988.714998] dump_stack+0x107/0x163 [ 1988.715762] should_fail.cold+0x5/0xa [ 1988.716621] ? create_object.isra.0+0x3a/0xa20 [ 1988.717586] should_failslab+0x5/0x10 [ 1988.718401] kmem_cache_alloc+0x5b/0x350 [ 1988.719268] create_object.isra.0+0x3a/0xa20 [ 1988.720263] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1988.721439] kmem_cache_alloc+0x159/0x350 [ 1988.722428] jbd2__journal_start+0x18c/0x880 [ 1988.723444] __ext4_journal_start_sb+0x210/0x420 [ 1988.724481] ext4_dirty_inode+0xbc/0x130 [ 1988.725337] ? ext4_setattr+0x22b0/0x22b0 [ 1988.726344] __mark_inode_dirty+0x492/0xf10 [ 1988.727394] ? security_inode_need_killpriv+0x79/0xa0 [ 1988.728636] generic_update_time+0x21c/0x370 [ 1988.729668] file_update_time+0x436/0x520 [ 1988.730643] ? evict_inodes+0x420/0x420 [ 1988.731599] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 1988.732698] file_modified+0x7d/0xa0 [ 1988.733496] ext4_file_write_iter+0x8f5/0x1890 [ 1988.734552] ? stack_trace_consume_entry+0x160/0x160 [ 1988.735648] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1988.736699] ? kasan_save_stack+0x32/0x40 [ 1988.737570] ? kasan_save_stack+0x1b/0x40 [ 1988.738462] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1988.739614] ? iter_file_splice_write+0x16d/0xbe0 [ 1988.740620] ? direct_splice_actor+0x10f/0x170 [ 1988.741590] ? splice_direct_to_actor+0x387/0x980 [ 1988.742820] ? do_splice_direct+0x1c4/0x290 [ 1988.743767] ? vfs_copy_file_range+0x57b/0x10f0 [ 1988.744814] ? __do_sys_copy_file_range+0x176/0x410 [ 1988.745950] do_iter_readv_writev+0x476/0x750 [ 1988.747023] ? new_sync_write+0x660/0x660 [ 1988.747913] ? selinux_file_permission+0x36/0x510 [ 1988.748983] do_iter_write+0x18d/0x670 [ 1988.749863] vfs_iter_write+0x70/0xa0 [ 1988.750869] iter_file_splice_write+0x71d/0xbe0 [ 1988.752279] ? generic_splice_sendpage+0x140/0x140 [ 1988.753722] ? avc_policy_seqno+0x9/0x70 [ 1988.754898] ? selinux_file_permission+0x36/0x510 [ 1988.756310] ? lockdep_init_map_type+0x2c3/0x770 [ 1988.757643] ? generic_splice_sendpage+0x140/0x140 [ 1988.758956] direct_splice_actor+0x10f/0x170 [ 1988.760129] splice_direct_to_actor+0x387/0x980 [ 1988.761376] ? pipe_to_sendpage+0x380/0x380 [ 1988.762565] ? do_splice_to+0x160/0x160 [ 1988.763353] ? security_file_permission+0x24e/0x570 [ 1988.764260] do_splice_direct+0x1c4/0x290 [ 1988.764965] ? splice_direct_to_actor+0x980/0x980 [ 1988.765783] ? selinux_file_permission+0x36/0x510 [ 1988.766612] ? security_file_permission+0x24e/0x570 [ 1988.767566] vfs_copy_file_range+0x57b/0x10f0 [ 1988.768376] ? generic_file_rw_checks+0x230/0x230 [ 1988.769281] ? __fget_files+0x296/0x480 [ 1988.770051] __do_sys_copy_file_range+0x176/0x410 [ 1988.770886] ? vfs_copy_file_range+0x10f0/0x10f0 [ 1988.771770] ? ksys_write+0x1a5/0x250 [ 1988.772426] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1988.773244] do_syscall_64+0x33/0x40 [ 1988.773877] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1988.774751] RIP: 0033:0x7fbd0f57fb19 [ 1988.775387] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1988.778531] RSP: 002b:00007fbd0caf5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 1988.779823] RAX: ffffffffffffffda RBX: 00007fbd0f692f60 RCX: 00007fbd0f57fb19 [ 1988.781116] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 1988.782521] RBP: 00007fbd0caf51d0 R08: 000000000200f5ef R09: 0000000000000000 [ 1988.783780] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1988.785046] R13: 00007ffd29ee03ff R14: 00007fbd0caf5300 R15: 0000000000022000 01:41:54 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, 0x0, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:41:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xc) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:41:54 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(0x0, 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:41:54 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:41:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xd) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:41:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x10, 0x10000, 0x1000) 01:41:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 9) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:41:54 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, 0x0, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:41:54 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) [ 1989.308746] FAULT_INJECTION: forcing a failure. [ 1989.308746] name failslab, interval 1, probability 0, space 0, times 0 [ 1989.311430] CPU: 0 PID: 29627 Comm: syz-executor.2 Not tainted 5.10.123 #1 [ 1989.312951] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1989.315363] Call Trace: [ 1989.315925] dump_stack+0x107/0x163 [ 1989.316697] should_fail.cold+0x5/0xa [ 1989.317504] ? create_object.isra.0+0x3a/0xa20 [ 1989.318476] should_failslab+0x5/0x10 [ 1989.319282] kmem_cache_alloc+0x5b/0x350 [ 1989.320150] create_object.isra.0+0x3a/0xa20 [ 1989.321082] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1989.322175] kmem_cache_alloc+0x159/0x350 [ 1989.323063] start_this_handle+0x674/0x1390 [ 1989.323974] ? kmem_cache_alloc+0x159/0x350 [ 1989.324900] ? mark_held_locks+0x9e/0xe0 [ 1989.325757] ? __jbd2_journal_unfile_buffer+0xb0/0xb0 [ 1989.326882] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1989.327901] ? kmem_cache_alloc+0x2b0/0x350 [ 1989.328828] jbd2__journal_start+0x38c/0x880 [ 1989.329763] __ext4_journal_start_sb+0x210/0x420 [ 1989.330797] ext4_dirty_inode+0xbc/0x130 [ 1989.331660] ? ext4_setattr+0x22b0/0x22b0 [ 1989.332538] __mark_inode_dirty+0x492/0xf10 [ 1989.333449] ? security_inode_need_killpriv+0x79/0xa0 [ 1989.334562] generic_update_time+0x21c/0x370 [ 1989.335501] file_update_time+0x436/0x520 [ 1989.336388] ? evict_inodes+0x420/0x420 [ 1989.337232] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 1989.338312] file_modified+0x7d/0xa0 [ 1989.339129] ext4_file_write_iter+0x8f5/0x1890 [ 1989.340097] ? stack_trace_consume_entry+0x160/0x160 [ 1989.341178] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1989.342146] ? kasan_save_stack+0x32/0x40 [ 1989.343042] ? kasan_save_stack+0x1b/0x40 [ 1989.343920] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1989.345007] ? iter_file_splice_write+0x16d/0xbe0 [ 1989.346016] ? direct_splice_actor+0x10f/0x170 [ 1989.346992] ? splice_direct_to_actor+0x387/0x980 [ 1989.348002] ? do_splice_direct+0x1c4/0x290 [ 1989.348915] ? vfs_copy_file_range+0x57b/0x10f0 [ 1989.349905] ? __do_sys_copy_file_range+0x176/0x410 [ 1989.350973] do_iter_readv_writev+0x476/0x750 [ 1989.351900] ? new_sync_write+0x660/0x660 [ 1989.352767] ? selinux_file_permission+0x36/0x510 [ 1989.353791] do_iter_write+0x18d/0x670 [ 1989.354637] vfs_iter_write+0x70/0xa0 [ 1989.355436] iter_file_splice_write+0x71d/0xbe0 [ 1989.356420] ? generic_splice_sendpage+0x140/0x140 [ 1989.357451] ? avc_policy_seqno+0x9/0x70 [ 1989.358308] ? selinux_file_permission+0x36/0x510 [ 1989.359327] ? lockdep_init_map_type+0x2c3/0x770 [ 1989.360327] ? generic_splice_sendpage+0x140/0x140 [ 1989.361364] direct_splice_actor+0x10f/0x170 [ 1989.362307] splice_direct_to_actor+0x387/0x980 [ 1989.363304] ? pipe_to_sendpage+0x380/0x380 [ 1989.364215] ? do_splice_to+0x160/0x160 [ 1989.365050] ? security_file_permission+0x24e/0x570 [ 1989.366148] do_splice_direct+0x1c4/0x290 [ 1989.367052] ? splice_direct_to_actor+0x980/0x980 [ 1989.368089] ? selinux_file_permission+0x36/0x510 [ 1989.369101] ? security_file_permission+0x24e/0x570 [ 1989.370192] vfs_copy_file_range+0x57b/0x10f0 [ 1989.371143] ? generic_file_rw_checks+0x230/0x230 [ 1989.372176] ? __fget_files+0x296/0x480 [ 1989.373044] __do_sys_copy_file_range+0x176/0x410 [ 1989.374089] ? vfs_copy_file_range+0x10f0/0x10f0 [ 1989.375087] ? ksys_write+0x1a5/0x250 [ 1989.375910] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1989.376936] do_syscall_64+0x33/0x40 [ 1989.377718] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1989.378821] RIP: 0033:0x7fbd0f57fb19 [ 1989.379616] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1989.383577] RSP: 002b:00007fbd0caf5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 1989.385207] RAX: ffffffffffffffda RBX: 00007fbd0f692f60 RCX: 00007fbd0f57fb19 [ 1989.386743] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 1989.388271] RBP: 00007fbd0caf51d0 R08: 000000000200f5ef R09: 0000000000000000 [ 1989.389802] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1989.391319] R13: 00007ffd29ee03ff R14: 00007fbd0caf5300 R15: 0000000000022000 [ 2002.226447] kmemleak: 28 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:42:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 10) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:42:17 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:42:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(r2, &(0x7f00000000c0)='./file0\x00', 0x0) openat(r2, &(0x7f0000000080)='./file0\x00', 0x4800, 0x5c) r3 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x8800000) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r4, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r3, {0xffffffffffffffff, 0xee00}}, './file0\x00'}) ioctl$BTRFS_IOC_SET_FEATURES(r5, 0x40309439, &(0x7f00000001c0)={0x2, 0x2, 0xa}) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r3, 0x8, 0x10000, 0x1000) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r6, 0x8905, &(0x7f0000000280)) 01:42:17 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:42:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xe) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:42:17 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, 0x0, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:42:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10002, 0x1000) 01:42:17 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(0x0, 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 2011.849095] FAULT_INJECTION: forcing a failure. [ 2011.849095] name failslab, interval 1, probability 0, space 0, times 0 [ 2011.851635] CPU: 0 PID: 29782 Comm: syz-executor.2 Not tainted 5.10.123 #1 [ 2011.853194] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2011.855855] Call Trace: [ 2011.856449] dump_stack+0x107/0x163 [ 2011.857277] should_fail.cold+0x5/0xa [ 2011.858140] ? create_object.isra.0+0x3a/0xa20 [ 2011.859179] should_failslab+0x5/0x10 [ 2011.860042] kmem_cache_alloc+0x5b/0x350 [ 2011.860963] create_object.isra.0+0x3a/0xa20 [ 2011.861941] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2011.863087] kmem_cache_alloc+0x159/0x350 [ 2011.864037] jbd2__journal_start+0x18c/0x880 [ 2011.865027] __ext4_journal_start_sb+0x210/0x420 [ 2011.866091] ext4_file_write_iter+0xd79/0x1890 [ 2011.867085] ? stack_trace_consume_entry+0x160/0x160 [ 2011.868183] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2011.869154] ? kasan_save_stack+0x32/0x40 [ 2011.870032] ? kasan_save_stack+0x1b/0x40 [ 2011.870929] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2011.872004] ? iter_file_splice_write+0x16d/0xbe0 [ 2011.873027] ? direct_splice_actor+0x10f/0x170 [ 2011.873993] ? splice_direct_to_actor+0x387/0x980 [ 2011.875021] ? do_splice_direct+0x1c4/0x290 [ 2011.875961] ? vfs_copy_file_range+0x57b/0x10f0 [ 2011.876968] ? __do_sys_copy_file_range+0x176/0x410 [ 2011.878068] do_iter_readv_writev+0x476/0x750 [ 2011.879062] ? new_sync_write+0x660/0x660 [ 2011.879963] ? selinux_file_permission+0x36/0x510 [ 2011.881031] do_iter_write+0x18d/0x670 [ 2011.881886] vfs_iter_write+0x70/0xa0 [ 2011.882715] iter_file_splice_write+0x71d/0xbe0 [ 2011.883740] ? generic_splice_sendpage+0x140/0x140 [ 2011.884813] ? avc_policy_seqno+0x9/0x70 [ 2011.885695] ? selinux_file_permission+0x36/0x510 [ 2011.886758] ? lockdep_init_map_type+0x2c3/0x770 [ 2011.887789] ? generic_splice_sendpage+0x140/0x140 [ 2011.888859] direct_splice_actor+0x10f/0x170 [ 2011.889817] splice_direct_to_actor+0x387/0x980 [ 2011.890854] ? pipe_to_sendpage+0x380/0x380 [ 2011.891808] ? do_splice_to+0x160/0x160 [ 2011.892679] ? security_file_permission+0x24e/0x570 [ 2011.893755] do_splice_direct+0x1c4/0x290 [ 2011.894651] ? splice_direct_to_actor+0x980/0x980 [ 2011.895671] ? selinux_file_permission+0x36/0x510 [ 2011.896699] ? security_file_permission+0x24e/0x570 [ 2011.897776] vfs_copy_file_range+0x57b/0x10f0 [ 2011.898742] ? generic_file_rw_checks+0x230/0x230 [ 2011.899781] ? __fget_files+0x296/0x480 [ 2011.900645] __do_sys_copy_file_range+0x176/0x410 [ 2011.901661] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2011.902675] ? ksys_write+0x1a5/0x250 [ 2011.903486] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2011.904500] do_syscall_64+0x33/0x40 [ 2011.905287] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2011.906366] RIP: 0033:0x7fbd0f57fb19 [ 2011.907158] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2011.911029] RSP: 002b:00007fbd0caf5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2011.912684] RAX: ffffffffffffffda RBX: 00007fbd0f692f60 RCX: 00007fbd0f57fb19 [ 2011.914254] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 2011.915819] RBP: 00007fbd0caf51d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2011.917368] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2011.918920] R13: 00007ffd29ee03ff R14: 00007fbd0caf5300 R15: 0000000000022000 01:42:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xf) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:42:17 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:42:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x10) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:42:17 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r1, &(0x7f0000000100), &(0x7f0000000180)=0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r2, 0x4, 0x2000) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = fork() setsockopt$inet6_tcp_int(r2, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r3, 0x9, 0x0) recvfrom$inet6(r2, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) [ 2026.262431] kmemleak: 22 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:42:39 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r1, &(0x7f0000000100), &(0x7f0000000180)=0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r2, 0x4, 0x2000) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = fork() setsockopt$inet6_tcp_int(r2, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r3, 0x9, 0x0) recvfrom$inet6(r2, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:42:39 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:42:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10003, 0x1000) 01:42:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) socketpair(0x1f, 0x800, 0x9, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r1, 0x89fa, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000180)={'ip6tnl0\x00', 0x0, 0x4, 0xff, 0x0, 0x2, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, @dev={0xfe, 0x80, '\x00', 0x1d}, 0x7800, 0x1, 0x7, 0x8}}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r3, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x1a8, 0x0, 0x10, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x178, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xbc, 0x5, "bd5ac5b99cfe0383425d32a6cc6caa9ae727f62637dd9214e581daff8004bddc0a016ba9d9547ed07c63048a6a1567edd253d39115833521e1c1a2ed24937321aa3d22a1b9d35b3f94d2e3f253f197a05dbb92ccb7a50e6a6ca9b48e2aaae6fcd659d22d2763bbce3b4d0d26ef4e0df4d2294708c4b2b8ecd433ce7fbd37134838de652fc5c0e6b94ce738aab9f28348744152d847e78fa9a1276aa8a9b03878e420134d9fa81693eba43f2163816c960e24083827537164"}, @ETHTOOL_A_BITSET_BITS={0x9c, 0x3, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\\@{\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '*\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffff801}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '[\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '.\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x400}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, ')![+\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x81}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc736}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}]}]}, @ETHTOOL_A_BITSET_MASK={0x19, 0x5, "02f4a9b16977777792aee86c4302d7be183300a640"}]}]}, 0x1a8}, 0x1, 0x0, 0x0, 0x48000}, 0x8040) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:42:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x12) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:42:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(0x0, 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:42:39 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:42:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 11) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 2034.217721] FAULT_INJECTION: forcing a failure. [ 2034.217721] name failslab, interval 1, probability 0, space 0, times 0 [ 2034.220273] CPU: 1 PID: 30131 Comm: syz-executor.2 Not tainted 5.10.123 #1 [ 2034.221684] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2034.224092] Call Trace: [ 2034.224647] dump_stack+0x107/0x163 [ 2034.225415] should_fail.cold+0x5/0xa [ 2034.226201] ? __iomap_dio_rw+0x1ee/0x11a0 [ 2034.227231] should_failslab+0x5/0x10 [ 2034.228013] kmem_cache_alloc_trace+0x55/0x360 [ 2034.228977] __iomap_dio_rw+0x1ee/0x11a0 [ 2034.229815] ? jbd2_journal_stop+0x188/0xe70 [ 2034.230747] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2034.231702] ? ext4_orphan_add+0x253/0x9d0 [ 2034.232613] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2034.233619] ? ext4_empty_dir+0x9c0/0x9c0 [ 2034.234503] ? jbd2__journal_start+0xf3/0x880 [ 2034.235498] iomap_dio_rw+0x31/0x90 [ 2034.236277] ext4_file_write_iter+0xaaf/0x1890 [ 2034.237251] ? stack_trace_consume_entry+0x160/0x160 [ 2034.238344] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2034.239323] ? kasan_save_stack+0x32/0x40 [ 2034.240211] ? kasan_save_stack+0x1b/0x40 [ 2034.241099] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2034.242161] ? iter_file_splice_write+0x16d/0xbe0 [ 2034.243201] ? direct_splice_actor+0x10f/0x170 [ 2034.244176] ? splice_direct_to_actor+0x387/0x980 [ 2034.245193] ? do_splice_direct+0x1c4/0x290 [ 2034.246104] ? vfs_copy_file_range+0x57b/0x10f0 [ 2034.247130] ? __do_sys_copy_file_range+0x176/0x410 [ 2034.248205] do_iter_readv_writev+0x476/0x750 [ 2034.249156] ? new_sync_write+0x660/0x660 [ 2034.250034] ? selinux_file_permission+0x36/0x510 [ 2034.251116] do_iter_write+0x18d/0x670 [ 2034.251975] vfs_iter_write+0x70/0xa0 [ 2034.252790] iter_file_splice_write+0x71d/0xbe0 [ 2034.253797] ? generic_splice_sendpage+0x140/0x140 [ 2034.254862] ? avc_policy_seqno+0x9/0x70 [ 2034.255746] ? selinux_file_permission+0x36/0x510 [ 2034.256774] ? lockdep_init_map_type+0x2c3/0x770 [ 2034.257781] ? generic_splice_sendpage+0x140/0x140 [ 2034.258841] direct_splice_actor+0x10f/0x170 [ 2034.259792] splice_direct_to_actor+0x387/0x980 [ 2034.260791] ? pipe_to_sendpage+0x380/0x380 [ 2034.261702] ? do_splice_to+0x160/0x160 [ 2034.262546] ? security_file_permission+0x24e/0x570 [ 2034.263636] do_splice_direct+0x1c4/0x290 [ 2034.264509] ? splice_direct_to_actor+0x980/0x980 [ 2034.265519] ? selinux_file_permission+0x36/0x510 [ 2034.266541] ? security_file_permission+0x24e/0x570 [ 2034.267647] vfs_copy_file_range+0x57b/0x10f0 [ 2034.268603] ? generic_file_rw_checks+0x230/0x230 [ 2034.269602] ? __fget_files+0x296/0x480 [ 2034.270465] __do_sys_copy_file_range+0x176/0x410 [ 2034.271508] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2034.272497] ? ksys_write+0x1a5/0x250 [ 2034.273303] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2034.274327] do_syscall_64+0x33/0x40 [ 2034.275134] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2034.276215] RIP: 0033:0x7fbd0f57fb19 [ 2034.277085] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2034.282008] RSP: 002b:00007fbd0caf5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2034.283741] RAX: ffffffffffffffda RBX: 00007fbd0f692f60 RCX: 00007fbd0f57fb19 [ 2034.285237] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 2034.286697] RBP: 00007fbd0caf51d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2034.288189] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2034.289646] R13: 00007ffd29ee03ff R14: 00007fbd0caf5300 R15: 0000000000022000 01:42:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x4f) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:42:39 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:42:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 12) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:42:40 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r1, &(0x7f0000000100), &(0x7f0000000180)=0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r2, 0x4, 0x2000) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = fork() setsockopt$inet6_tcp_int(r2, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r3, 0x9, 0x0) recvfrom$inet6(r2, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) [ 2034.556399] FAULT_INJECTION: forcing a failure. [ 2034.556399] name failslab, interval 1, probability 0, space 0, times 0 [ 2034.559120] CPU: 1 PID: 30226 Comm: syz-executor.2 Not tainted 5.10.123 #1 [ 2034.560682] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2034.563005] Call Trace: [ 2034.563541] dump_stack+0x107/0x163 [ 2034.564355] should_fail.cold+0x5/0xa [ 2034.565257] ? create_object.isra.0+0x3a/0xa20 [ 2034.566170] should_failslab+0x5/0x10 [ 2034.567038] kmem_cache_alloc+0x5b/0x350 [ 2034.567846] create_object.isra.0+0x3a/0xa20 [ 2034.568795] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2034.569840] kmem_cache_alloc+0x159/0x350 [ 2034.570792] jbd2__journal_start+0x18c/0x880 [ 2034.571851] __ext4_journal_start_sb+0x210/0x420 [ 2034.572834] ext4_file_write_iter+0xd79/0x1890 [ 2034.573783] ? stack_trace_consume_entry+0x160/0x160 [ 2034.574891] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2034.575861] ? kasan_save_stack+0x32/0x40 [ 2034.576797] ? kasan_save_stack+0x1b/0x40 [ 2034.577691] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2034.578803] ? iter_file_splice_write+0x16d/0xbe0 [ 2034.579758] ? direct_splice_actor+0x10f/0x170 [ 2034.580679] ? splice_direct_to_actor+0x387/0x980 [ 2034.581624] ? do_splice_direct+0x1c4/0x290 [ 2034.582494] ? vfs_copy_file_range+0x57b/0x10f0 [ 2034.583435] ? __do_sys_copy_file_range+0x176/0x410 [ 2034.584838] do_iter_readv_writev+0x476/0x750 [ 2034.586102] ? new_sync_write+0x660/0x660 [ 2034.587283] ? selinux_file_permission+0x36/0x510 [ 2034.588705] do_iter_write+0x18d/0x670 [ 2034.589674] vfs_iter_write+0x70/0xa0 [ 2034.590469] iter_file_splice_write+0x71d/0xbe0 [ 2034.591585] ? generic_splice_sendpage+0x140/0x140 [ 2034.592571] ? avc_policy_seqno+0x9/0x70 [ 2034.593406] ? selinux_file_permission+0x36/0x510 [ 2034.594432] ? lockdep_init_map_type+0x2c3/0x770 [ 2034.595485] ? generic_splice_sendpage+0x140/0x140 [ 2034.596560] direct_splice_actor+0x10f/0x170 [ 2034.597625] splice_direct_to_actor+0x387/0x980 [ 2034.598576] ? pipe_to_sendpage+0x380/0x380 [ 2034.599547] ? do_splice_to+0x160/0x160 [ 2034.600333] ? security_file_permission+0x24e/0x570 [ 2034.601384] do_splice_direct+0x1c4/0x290 [ 2034.602341] ? splice_direct_to_actor+0x980/0x980 [ 2034.603445] ? selinux_file_permission+0x36/0x510 [ 2034.604499] ? security_file_permission+0x24e/0x570 [ 2034.605597] vfs_copy_file_range+0x57b/0x10f0 [ 2034.606519] ? generic_file_rw_checks+0x230/0x230 [ 2034.607542] ? __fget_files+0x296/0x480 [ 2034.608347] __do_sys_copy_file_range+0x176/0x410 [ 2034.609359] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2034.610470] ? ksys_write+0x1a5/0x250 [ 2034.611315] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2034.612370] do_syscall_64+0x33/0x40 [ 2034.613151] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2034.614276] RIP: 0033:0x7fbd0f57fb19 [ 2034.615143] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2034.619124] RSP: 002b:00007fbd0caf5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2034.620637] RAX: ffffffffffffffda RBX: 00007fbd0f692f60 RCX: 00007fbd0f57fb19 [ 2034.622169] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 2034.623776] RBP: 00007fbd0caf51d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2034.625424] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2034.627008] R13: 00007ffd29ee03ff R14: 00007fbd0caf5300 R15: 0000000000022000 01:42:40 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r1, &(0x7f0000000100), &(0x7f0000000180)=0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r2, 0x4, 0x2000) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = fork() setsockopt$inet6_tcp_int(r2, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r3, 0x9, 0x0) recvfrom$inet6(r2, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:42:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x50) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:42:40 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:42:40 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x0) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:42:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) mknod(&(0x7f0000000080)='./file0\x00', 0x8, 0xeb4) [ 2050.682034] kmemleak: 31 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:43:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) sendfile(r2, 0xffffffffffffffff, 0x0, 0x2) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"/1086], 0x43e) 01:43:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x64) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:43:04 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:43:04 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x0) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:43:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10004, 0x1000) 01:43:04 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r1, &(0x7f0000000100), &(0x7f0000000180)=0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r2, 0x4, 0x2000) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = fork() setsockopt$inet6_tcp_int(r2, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r3, 0x9, 0x0) recvfrom$inet6(r2, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:43:04 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:43:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 13) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 2058.970690] FAULT_INJECTION: forcing a failure. [ 2058.970690] name failslab, interval 1, probability 0, space 0, times 0 [ 2058.973327] CPU: 1 PID: 30485 Comm: syz-executor.2 Not tainted 5.10.123 #1 [ 2058.974806] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2058.977265] Call Trace: [ 2058.977830] dump_stack+0x107/0x163 [ 2058.978636] should_fail.cold+0x5/0xa [ 2058.979475] ? jbd2__journal_start+0x18c/0x880 [ 2058.980460] should_failslab+0x5/0x10 [ 2058.981469] kmem_cache_alloc+0x5b/0x350 [ 2058.982602] jbd2__journal_start+0x18c/0x880 [ 2058.983850] __ext4_journal_start_sb+0x210/0x420 [ 2058.985305] ext4_iomap_begin+0x481/0x6f0 [ 2058.986450] ? ext4_iomap_begin_report+0x5a0/0x5a0 [ 2058.987799] ? iomap_dio_rw+0x31/0x90 [ 2058.988787] ? do_iter_write+0x18d/0x670 [ 2058.989671] ? truncate_exceptional_pvec_entries.part.0+0x510/0x510 [ 2058.991057] ? splice_direct_to_actor+0x387/0x980 [ 2058.992101] ? do_splice_direct+0x1c4/0x290 [ 2058.993028] ? vfs_copy_file_range+0x57b/0x10f0 [ 2058.994031] iomap_apply+0x164/0x9e0 [ 2058.994810] ? iomap_dio_rw+0x90/0x90 [ 2058.995671] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 2058.996913] ? mark_held_locks+0x9e/0xe0 [ 2058.997796] ? filemap_check_errors+0xa5/0x150 [ 2058.998776] __iomap_dio_rw+0x6cd/0x11a0 [ 2058.999669] ? iomap_dio_rw+0x90/0x90 [ 2059.000515] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2059.001512] ? ext4_orphan_add+0x253/0x9d0 [ 2059.002438] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2059.003561] ? ext4_empty_dir+0x9c0/0x9c0 [ 2059.004463] ? jbd2__journal_start+0xf3/0x880 [ 2059.005451] iomap_dio_rw+0x31/0x90 [ 2059.006253] ext4_file_write_iter+0xaaf/0x1890 [ 2059.007268] ? stack_trace_consume_entry+0x160/0x160 [ 2059.008389] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2059.009355] ? kasan_save_stack+0x32/0x40 [ 2059.010253] ? kasan_save_stack+0x1b/0x40 [ 2059.011139] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2059.012256] ? iter_file_splice_write+0x16d/0xbe0 [ 2059.013271] ? direct_splice_actor+0x10f/0x170 [ 2059.014260] ? splice_direct_to_actor+0x387/0x980 [ 2059.015327] ? do_splice_direct+0x1c4/0x290 [ 2059.016268] ? vfs_copy_file_range+0x57b/0x10f0 [ 2059.017261] ? __do_sys_copy_file_range+0x176/0x410 [ 2059.018302] do_iter_readv_writev+0x476/0x750 [ 2059.019296] ? new_sync_write+0x660/0x660 [ 2059.020371] ? selinux_file_permission+0x36/0x510 [ 2059.021504] do_iter_write+0x18d/0x670 [ 2059.022482] vfs_iter_write+0x70/0xa0 [ 2059.023337] iter_file_splice_write+0x71d/0xbe0 [ 2059.024492] ? generic_splice_sendpage+0x140/0x140 [ 2059.025787] ? avc_policy_seqno+0x9/0x70 [ 2059.026686] ? selinux_file_permission+0x36/0x510 [ 2059.027767] ? lockdep_init_map_type+0x2c3/0x770 [ 2059.028916] ? generic_splice_sendpage+0x140/0x140 [ 2059.030115] direct_splice_actor+0x10f/0x170 [ 2059.031108] splice_direct_to_actor+0x387/0x980 [ 2059.032139] ? pipe_to_sendpage+0x380/0x380 [ 2059.033094] ? do_splice_to+0x160/0x160 [ 2059.034128] ? security_file_permission+0x24e/0x570 [ 2059.035253] do_splice_direct+0x1c4/0x290 [ 2059.036164] ? splice_direct_to_actor+0x980/0x980 [ 2059.037226] ? selinux_file_permission+0x36/0x510 [ 2059.038337] ? security_file_permission+0x24e/0x570 [ 2059.039470] vfs_copy_file_range+0x57b/0x10f0 [ 2059.040462] ? generic_file_rw_checks+0x230/0x230 [ 2059.041626] ? __fget_files+0x296/0x480 [ 2059.042514] __do_sys_copy_file_range+0x176/0x410 [ 2059.043594] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2059.044728] ? ksys_write+0x1a5/0x250 [ 2059.045570] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2059.046747] do_syscall_64+0x33/0x40 [ 2059.047837] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2059.048999] RIP: 0033:0x7fbd0f57fb19 [ 2059.049892] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2059.054024] RSP: 002b:00007fbd0caf5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2059.055719] RAX: ffffffffffffffda RBX: 00007fbd0f692f60 RCX: 00007fbd0f57fb19 [ 2059.057521] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 2059.059079] RBP: 00007fbd0caf51d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2059.060737] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2059.062497] R13: 00007ffd29ee03ff R14: 00007fbd0caf5300 R15: 0000000000022000 01:43:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x90) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:43:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 14) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:43:04 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:43:04 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r1, &(0x7f0000000100), &(0x7f0000000180)=0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r2, 0x4, 0x2000) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = fork() setsockopt$inet6_tcp_int(r2, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r3, 0x9, 0x0) recvfrom$inet6(r2, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) [ 2059.310445] FAULT_INJECTION: forcing a failure. [ 2059.310445] name failslab, interval 1, probability 0, space 0, times 0 [ 2059.313045] CPU: 1 PID: 30711 Comm: syz-executor.2 Not tainted 5.10.123 #1 [ 2059.314444] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2059.316837] Call Trace: [ 2059.317387] dump_stack+0x107/0x163 [ 2059.318156] should_fail.cold+0x5/0xa [ 2059.318921] ? create_object.isra.0+0x3a/0xa20 [ 2059.319903] should_failslab+0x5/0x10 [ 2059.320685] kmem_cache_alloc+0x5b/0x350 [ 2059.321535] create_object.isra.0+0x3a/0xa20 [ 2059.322449] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2059.323493] kmem_cache_alloc_trace+0x151/0x360 [ 2059.324488] __iomap_dio_rw+0x1ee/0x11a0 [ 2059.325337] ? jbd2_journal_stop+0x188/0xe70 [ 2059.326262] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2059.327198] ? ext4_orphan_add+0x253/0x9d0 [ 2059.328087] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2059.329098] ? ext4_empty_dir+0x9c0/0x9c0 [ 2059.329957] ? jbd2__journal_start+0xf3/0x880 [ 2059.330862] iomap_dio_rw+0x31/0x90 [ 2059.331647] ext4_file_write_iter+0xaaf/0x1890 [ 2059.332567] ? stack_trace_consume_entry+0x160/0x160 [ 2059.333613] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2059.334535] ? kasan_save_stack+0x32/0x40 [ 2059.335393] ? kasan_save_stack+0x1b/0x40 [ 2059.336249] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2059.337282] ? iter_file_splice_write+0x16d/0xbe0 [ 2059.338264] ? direct_splice_actor+0x10f/0x170 [ 2059.339218] ? splice_direct_to_actor+0x387/0x980 [ 2059.340187] ? do_splice_direct+0x1c4/0x290 [ 2059.341063] ? vfs_copy_file_range+0x57b/0x10f0 [ 2059.342004] ? __do_sys_copy_file_range+0x176/0x410 [ 2059.343045] do_iter_readv_writev+0x476/0x750 [ 2059.343958] ? new_sync_write+0x660/0x660 [ 2059.344827] ? selinux_file_permission+0x36/0x510 [ 2059.345829] do_iter_write+0x18d/0x670 [ 2059.346645] vfs_iter_write+0x70/0xa0 [ 2059.347429] iter_file_splice_write+0x71d/0xbe0 [ 2059.348399] ? generic_splice_sendpage+0x140/0x140 [ 2059.349377] ? avc_policy_seqno+0x9/0x70 [ 2059.350202] ? selinux_file_permission+0x36/0x510 [ 2059.351183] ? lockdep_init_map_type+0x2c3/0x770 [ 2059.352184] ? generic_splice_sendpage+0x140/0x140 [ 2059.353168] direct_splice_actor+0x10f/0x170 [ 2059.354069] splice_direct_to_actor+0x387/0x980 [ 2059.355006] ? pipe_to_sendpage+0x380/0x380 [ 2059.355889] ? do_splice_to+0x160/0x160 [ 2059.356702] ? security_file_permission+0x24e/0x570 [ 2059.357725] do_splice_direct+0x1c4/0x290 [ 2059.358552] ? splice_direct_to_actor+0x980/0x980 [ 2059.359547] ? selinux_file_permission+0x36/0x510 [ 2059.360524] ? security_file_permission+0x24e/0x570 [ 2059.361543] vfs_copy_file_range+0x57b/0x10f0 [ 2059.362443] ? generic_file_rw_checks+0x230/0x230 [ 2059.363419] ? __fget_files+0x296/0x480 [ 2059.364270] __do_sys_copy_file_range+0x176/0x410 [ 2059.365245] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2059.366173] ? ksys_write+0x1a5/0x250 [ 2059.366944] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2059.367931] do_syscall_64+0x33/0x40 [ 2059.368683] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2059.369738] RIP: 0033:0x7fbd0f57fb19 [ 2059.370491] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2059.374226] RSP: 002b:00007fbd0caf5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2059.375749] RAX: ffffffffffffffda RBX: 00007fbd0f692f60 RCX: 00007fbd0f57fb19 [ 2059.377482] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 2059.378891] RBP: 00007fbd0caf51d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2059.380449] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2059.382040] R13: 00007ffd29ee03ff R14: 00007fbd0caf5300 R15: 0000000000022000 01:43:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x102) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:43:04 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x0) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:43:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10005, 0x1000) 01:43:05 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:43:05 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:43:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x1, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000000080)='./file0\x00', 0x9) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f00000000c0)) fallocate(r2, 0x8, 0x10000, 0x1000) [ 2074.505915] kmemleak: 34 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:43:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x108) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:43:27 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x0) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:43:27 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(0x0, 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:43:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10008, 0x1000) 01:43:27 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:43:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 15) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:43:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000000080)='./file0\x00', 0xfe) r4 = socket$inet_udp(0x2, 0x2, 0x0) creat(&(0x7f0000000180)='./file1\x00', 0x48) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(r4, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r4, &(0x7f00000000c0), &(0x7f0000000100)='./file1\x00', 0x8, 0x3) fallocate(r2, 0x8, 0x10000, 0x1000) 01:43:27 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x0, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) [ 2082.263625] FAULT_INJECTION: forcing a failure. [ 2082.263625] name failslab, interval 1, probability 0, space 0, times 0 [ 2082.266284] CPU: 1 PID: 31056 Comm: syz-executor.2 Not tainted 5.10.123 #1 [ 2082.267787] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2082.270206] Call Trace: [ 2082.270778] dump_stack+0x107/0x163 [ 2082.271563] should_fail.cold+0x5/0xa [ 2082.272378] ? ext4_find_extent+0xa39/0xd20 [ 2082.273303] should_failslab+0x5/0x10 [ 2082.274114] __kmalloc+0x72/0x3e0 [ 2082.274856] ext4_find_extent+0xa39/0xd20 [ 2082.275770] ext4_ext_map_blocks+0x1c8/0x5b90 [ 2082.276737] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2082.277848] ? SOFTIRQ_verbose+0x10/0x10 [ 2082.278707] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2082.279825] ? SOFTIRQ_verbose+0x10/0x10 [ 2082.280693] ? ext4_ext_release+0x10/0x10 [ 2082.281576] ? lock_release+0x6b0/0x6b0 [ 2082.282425] ? ext4_es_lookup_extent+0x489/0xbe0 [ 2082.283434] ? lock_downgrade+0x6d0/0x6d0 [ 2082.284333] ? down_read+0x10f/0x420 [ 2082.285122] ? down_write_killable+0x180/0x180 [ 2082.286093] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2082.287116] ? ext4_es_lookup_extent+0xc4/0xbe0 [ 2082.288131] ext4_map_blocks+0x9c8/0x1970 [ 2082.289023] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 2082.289970] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2082.290988] ? jbd2__journal_start+0xf3/0x880 [ 2082.291949] ? __ext4_journal_start_sb+0x210/0x420 [ 2082.292983] ? __ext4_journal_start_sb+0x1db/0x420 [ 2082.294024] ext4_iomap_begin+0x3a9/0x6f0 [ 2082.294916] ? ext4_iomap_begin_report+0x5a0/0x5a0 [ 2082.295959] ? iomap_dio_rw+0x31/0x90 [ 2082.296766] ? do_iter_write+0x18d/0x670 [ 2082.297632] ? truncate_exceptional_pvec_entries.part.0+0x510/0x510 [ 2082.298973] ? splice_direct_to_actor+0x387/0x980 [ 2082.300011] ? do_splice_direct+0x1c4/0x290 [ 2082.300920] ? vfs_copy_file_range+0x57b/0x10f0 [ 2082.301911] iomap_apply+0x164/0x9e0 [ 2082.302695] ? iomap_dio_rw+0x90/0x90 [ 2082.303507] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 2082.304733] ? mark_held_locks+0x9e/0xe0 [ 2082.305609] ? filemap_check_errors+0xa5/0x150 [ 2082.306580] __iomap_dio_rw+0x6cd/0x11a0 [ 2082.307450] ? iomap_dio_rw+0x90/0x90 [ 2082.308273] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2082.309239] ? ext4_orphan_add+0x253/0x9d0 [ 2082.310131] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2082.311170] ? ext4_empty_dir+0x9c0/0x9c0 [ 2082.312046] ? jbd2__journal_start+0xf3/0x880 [ 2082.313002] iomap_dio_rw+0x31/0x90 [ 2082.313773] ext4_file_write_iter+0xaaf/0x1890 [ 2082.314740] ? stack_trace_consume_entry+0x160/0x160 [ 2082.315830] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2082.316791] ? kasan_save_stack+0x32/0x40 [ 2082.317661] ? kasan_save_stack+0x1b/0x40 [ 2082.318537] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2082.319620] ? iter_file_splice_write+0x16d/0xbe0 [ 2082.320635] ? direct_splice_actor+0x10f/0x170 [ 2082.321602] ? splice_direct_to_actor+0x387/0x980 [ 2082.322615] ? do_splice_direct+0x1c4/0x290 [ 2082.323536] ? vfs_copy_file_range+0x57b/0x10f0 [ 2082.324514] ? __do_sys_copy_file_range+0x176/0x410 [ 2082.325575] do_iter_readv_writev+0x476/0x750 [ 2082.326524] ? new_sync_write+0x660/0x660 [ 2082.327410] ? selinux_file_permission+0x36/0x510 [ 2082.328452] do_iter_write+0x18d/0x670 [ 2082.329294] vfs_iter_write+0x70/0xa0 [ 2082.330105] iter_file_splice_write+0x71d/0xbe0 [ 2082.331113] ? generic_splice_sendpage+0x140/0x140 [ 2082.332187] ? avc_policy_seqno+0x9/0x70 [ 2082.333056] ? selinux_file_permission+0x36/0x510 [ 2082.334081] ? lockdep_init_map_type+0x2c3/0x770 [ 2082.335089] ? generic_splice_sendpage+0x140/0x140 [ 2082.336138] direct_splice_actor+0x10f/0x170 [ 2082.337075] splice_direct_to_actor+0x387/0x980 [ 2082.338066] ? pipe_to_sendpage+0x380/0x380 [ 2082.338984] ? do_splice_to+0x160/0x160 [ 2082.339846] ? security_file_permission+0x24e/0x570 [ 2082.340920] do_splice_direct+0x1c4/0x290 [ 2082.341800] ? splice_direct_to_actor+0x980/0x980 [ 2082.342816] ? selinux_file_permission+0x36/0x510 [ 2082.343851] ? security_file_permission+0x24e/0x570 [ 2082.344919] vfs_copy_file_range+0x57b/0x10f0 [ 2082.345874] ? generic_file_rw_checks+0x230/0x230 [ 2082.346900] ? __fget_files+0x296/0x480 [ 2082.347772] __do_sys_copy_file_range+0x176/0x410 [ 2082.348797] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2082.349794] ? ksys_write+0x1a5/0x250 [ 2082.350609] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2082.351648] do_syscall_64+0x33/0x40 [ 2082.352440] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2082.353522] RIP: 0033:0x7fbd0f57fb19 [ 2082.354308] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2082.358198] RSP: 002b:00007fbd0caf5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2082.359811] RAX: ffffffffffffffda RBX: 00007fbd0f692f60 RCX: 00007fbd0f57fb19 [ 2082.361314] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 2082.362812] RBP: 00007fbd0caf51d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2082.364339] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2082.365847] R13: 00007ffd29ee03ff R14: 00007fbd0caf5300 R15: 0000000000022000 01:43:27 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:43:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x10a) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:43:28 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x0, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:43:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x10c) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:43:28 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:43:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x0) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 2096.077462] kmemleak: 27 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 2105.035661] FAULT_INJECTION: forcing a failure. [ 2105.035661] name failslab, interval 1, probability 0, space 0, times 0 [ 2105.038330] CPU: 1 PID: 31499 Comm: syz-executor.2 Not tainted 5.10.123 #1 [ 2105.039833] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2105.042272] Call Trace: [ 2105.042841] dump_stack+0x107/0x163 [ 2105.043627] should_fail.cold+0x5/0xa [ 2105.044450] ? create_object.isra.0+0x3a/0xa20 [ 2105.045435] should_failslab+0x5/0x10 [ 2105.046250] kmem_cache_alloc+0x5b/0x350 01:43:50 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x0) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:43:50 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x0, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:43:50 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x0, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:43:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10010, 0x1000) 01:43:50 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x1da) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:43:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 16) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:43:50 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(0x0, 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:43:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_REG(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)={0x28, r3, 0x621, 0x0, 0x0, {}, [@NL80211_ATTR_REG_RULES={0xc, 0x22, 0x0, 0x1, [{0x4}, {0x4}]}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'aa\x00'}]}, 0x28}}, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f0000000280)={{0x5, 0x9}, 0x100, './file0\x00'}) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fstat(r1, &(0x7f0000000080)) fallocate(r5, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) [ 2105.047260] create_object.isra.0+0x3a/0xa20 [ 2105.048631] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2105.050052] __kmalloc+0x16e/0x3e0 [ 2105.050966] ext4_find_extent+0xa39/0xd20 [ 2105.052045] ext4_ext_map_blocks+0x1c8/0x5b90 [ 2105.053201] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2105.054521] ? SOFTIRQ_verbose+0x10/0x10 [ 2105.055552] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2105.056880] ? SOFTIRQ_verbose+0x10/0x10 [ 2105.057923] ? ext4_ext_release+0x10/0x10 [ 2105.058980] ? lock_release+0x6b0/0x6b0 [ 2105.060016] ? ext4_es_lookup_extent+0x489/0xbe0 [ 2105.061128] ? lock_downgrade+0x6d0/0x6d0 [ 2105.062028] ? down_read+0x10f/0x420 [ 2105.062821] ? down_write_killable+0x180/0x180 [ 2105.063807] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2105.064837] ? ext4_es_lookup_extent+0xc4/0xbe0 [ 2105.065841] ext4_map_blocks+0x9c8/0x1970 [ 2105.066743] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 2105.067707] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2105.068741] ? jbd2__journal_start+0xf3/0x880 [ 2105.069706] ? __ext4_journal_start_sb+0x210/0x420 [ 2105.070789] ? __ext4_journal_start_sb+0x1db/0x420 [ 2105.071865] ext4_iomap_begin+0x3a9/0x6f0 [ 2105.072792] ? ext4_iomap_begin_report+0x5a0/0x5a0 [ 2105.073845] ? iomap_dio_rw+0x31/0x90 [ 2105.074661] ? do_iter_write+0x18d/0x670 [ 2105.075573] ? truncate_exceptional_pvec_entries.part.0+0x510/0x510 [ 2105.076937] ? splice_direct_to_actor+0x387/0x980 [ 2105.077995] ? do_splice_direct+0x1c4/0x290 [ 2105.078918] ? vfs_copy_file_range+0x57b/0x10f0 [ 2105.079954] iomap_apply+0x164/0x9e0 [ 2105.080746] ? iomap_dio_rw+0x90/0x90 [ 2105.081583] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 2105.082826] ? mark_held_locks+0x9e/0xe0 [ 2105.083717] ? filemap_check_errors+0xa5/0x150 [ 2105.084701] __iomap_dio_rw+0x6cd/0x11a0 [ 2105.085557] ? iomap_dio_rw+0x90/0x90 [ 2105.086384] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2105.087356] ? ext4_orphan_add+0x253/0x9d0 [ 2105.088280] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2105.089346] ? ext4_empty_dir+0x9c0/0x9c0 [ 2105.090228] ? jbd2__journal_start+0xf3/0x880 [ 2105.091194] iomap_dio_rw+0x31/0x90 [ 2105.091984] ext4_file_write_iter+0xaaf/0x1890 [ 2105.092962] ? stack_trace_consume_entry+0x160/0x160 [ 2105.094054] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2105.095026] ? kasan_save_stack+0x32/0x40 [ 2105.095918] ? kasan_save_stack+0x1b/0x40 [ 2105.096805] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2105.097881] ? iter_file_splice_write+0x16d/0xbe0 [ 2105.098909] ? direct_splice_actor+0x10f/0x170 [ 2105.099893] ? splice_direct_to_actor+0x387/0x980 [ 2105.100920] ? do_splice_direct+0x1c4/0x290 [ 2105.101835] ? vfs_copy_file_range+0x57b/0x10f0 [ 2105.102827] ? __do_sys_copy_file_range+0x176/0x410 [ 2105.103907] do_iter_readv_writev+0x476/0x750 [ 2105.104876] ? new_sync_write+0x660/0x660 [ 2105.105761] ? selinux_file_permission+0x36/0x510 [ 2105.106813] do_iter_write+0x18d/0x670 [ 2105.107664] vfs_iter_write+0x70/0xa0 [ 2105.108496] iter_file_splice_write+0x71d/0xbe0 [ 2105.109512] ? generic_splice_sendpage+0x140/0x140 [ 2105.110568] ? avc_policy_seqno+0x9/0x70 [ 2105.111432] ? selinux_file_permission+0x36/0x510 [ 2105.112477] ? lockdep_init_map_type+0x2c3/0x770 [ 2105.113484] ? generic_splice_sendpage+0x140/0x140 [ 2105.114532] direct_splice_actor+0x10f/0x170 [ 2105.115475] splice_direct_to_actor+0x387/0x980 [ 2105.116492] ? pipe_to_sendpage+0x380/0x380 [ 2105.117419] ? do_splice_to+0x160/0x160 [ 2105.118282] ? security_file_permission+0x24e/0x570 [ 2105.119362] do_splice_direct+0x1c4/0x290 [ 2105.120270] ? splice_direct_to_actor+0x980/0x980 [ 2105.121298] ? selinux_file_permission+0x36/0x510 [ 2105.122338] ? security_file_permission+0x24e/0x570 [ 2105.123422] vfs_copy_file_range+0x57b/0x10f0 [ 2105.124396] ? generic_file_rw_checks+0x230/0x230 [ 2105.125437] ? __fget_files+0x296/0x480 [ 2105.126312] __do_sys_copy_file_range+0x176/0x410 [ 2105.127353] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2105.128382] ? ksys_write+0x1a5/0x250 [ 2105.129213] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2105.130252] do_syscall_64+0x33/0x40 [ 2105.131052] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2105.132155] RIP: 0033:0x7fbd0f57fb19 [ 2105.132951] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2105.136893] RSP: 002b:00007fbd0caf5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2105.138524] RAX: ffffffffffffffda RBX: 00007fbd0f692f60 RCX: 00007fbd0f57fb19 [ 2105.140077] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 2105.141614] RBP: 00007fbd0caf51d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2105.143167] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2105.144705] R13: 00007ffd29ee03ff R14: 00007fbd0caf5300 R15: 0000000000022000 01:43:50 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x201) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:43:50 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x0, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:43:50 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x0, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:43:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x281) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:43:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 17) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:43:51 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(0x0, 0x80) [ 2105.740329] FAULT_INJECTION: forcing a failure. [ 2105.740329] name failslab, interval 1, probability 0, space 0, times 0 [ 2105.742793] CPU: 1 PID: 31727 Comm: syz-executor.2 Not tainted 5.10.123 #1 [ 2105.744286] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2105.746701] Call Trace: [ 2105.747268] dump_stack+0x107/0x163 [ 2105.748075] should_fail.cold+0x5/0xa [ 2105.748892] ? ext4_find_extent+0xa39/0xd20 [ 2105.749814] should_failslab+0x5/0x10 [ 2105.750626] __kmalloc+0x72/0x3e0 [ 2105.751377] ext4_find_extent+0xa39/0xd20 [ 2105.752283] ext4_ext_map_blocks+0x1c8/0x5b90 [ 2105.753253] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2105.754359] ? SOFTIRQ_verbose+0x10/0x10 [ 2105.755225] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2105.756350] ? SOFTIRQ_verbose+0x10/0x10 [ 2105.757223] ? ext4_ext_release+0x10/0x10 [ 2105.758114] ? lock_release+0x6b0/0x6b0 [ 2105.758980] ? ext4_es_lookup_extent+0x489/0xbe0 [ 2105.759993] ? lock_downgrade+0x6d0/0x6d0 [ 2105.760889] ? down_read+0x10f/0x420 [ 2105.761681] ? down_write_killable+0x180/0x180 [ 2105.762647] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2105.763666] ? ext4_es_lookup_extent+0xc4/0xbe0 [ 2105.764689] ext4_map_blocks+0x9c8/0x1970 [ 2105.765583] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 2105.766539] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2105.767553] ? jbd2__journal_start+0xf3/0x880 [ 2105.768522] ? __ext4_journal_start_sb+0x210/0x420 [ 2105.769560] ? __ext4_journal_start_sb+0x1db/0x420 [ 2105.770609] ext4_iomap_begin+0x3a9/0x6f0 [ 2105.771505] ? ext4_iomap_begin_report+0x5a0/0x5a0 [ 2105.772555] ? iomap_dio_rw+0x31/0x90 [ 2105.773366] ? do_iter_write+0x18d/0x670 [ 2105.774235] ? truncate_exceptional_pvec_entries.part.0+0x510/0x510 [ 2105.775576] ? splice_direct_to_actor+0x387/0x980 [ 2105.776616] ? do_splice_direct+0x1c4/0x290 [ 2105.777527] ? vfs_copy_file_range+0x57b/0x10f0 [ 2105.778525] iomap_apply+0x164/0x9e0 [ 2105.779307] ? iomap_dio_rw+0x90/0x90 [ 2105.780128] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 2105.781362] ? mark_held_locks+0x9e/0xe0 [ 2105.782242] ? filemap_check_errors+0xa5/0x150 [ 2105.783219] __iomap_dio_rw+0x6cd/0x11a0 [ 2105.784095] ? iomap_dio_rw+0x90/0x90 [ 2105.784926] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2105.785901] ? ext4_orphan_add+0x253/0x9d0 [ 2105.786808] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2105.787865] ? ext4_empty_dir+0x9c0/0x9c0 [ 2105.788739] ? jbd2__journal_start+0xf3/0x880 [ 2105.789712] iomap_dio_rw+0x31/0x90 [ 2105.790490] ext4_file_write_iter+0xaaf/0x1890 [ 2105.791461] ? stack_trace_consume_entry+0x160/0x160 [ 2105.792573] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2105.793547] ? kasan_save_stack+0x32/0x40 [ 2105.794429] ? kasan_save_stack+0x1b/0x40 [ 2105.795305] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2105.796393] ? iter_file_splice_write+0x16d/0xbe0 [ 2105.797413] ? direct_splice_actor+0x10f/0x170 [ 2105.798378] ? splice_direct_to_actor+0x387/0x980 01:43:51 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(0x0, 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) [ 2105.799403] ? do_splice_direct+0x1c4/0x290 [ 2105.800553] ? vfs_copy_file_range+0x57b/0x10f0 [ 2105.801542] ? __do_sys_copy_file_range+0x176/0x410 [ 2105.802615] do_iter_readv_writev+0x476/0x750 [ 2105.803571] ? new_sync_write+0x660/0x660 [ 2105.804460] ? selinux_file_permission+0x36/0x510 [ 2105.805515] do_iter_write+0x18d/0x670 [ 2105.806378] vfs_iter_write+0x70/0xa0 [ 2105.807193] iter_file_splice_write+0x71d/0xbe0 [ 2105.808213] ? generic_splice_sendpage+0x140/0x140 [ 2105.809271] ? avc_policy_seqno+0x9/0x70 [ 2105.810134] ? selinux_file_permission+0x36/0x510 [ 2105.811170] ? lockdep_init_map_type+0x2c3/0x770 [ 2105.812192] ? generic_splice_sendpage+0x140/0x140 [ 2105.813238] direct_splice_actor+0x10f/0x170 [ 2105.814181] splice_direct_to_actor+0x387/0x980 [ 2105.815179] ? pipe_to_sendpage+0x380/0x380 [ 2105.816128] ? do_splice_to+0x160/0x160 [ 2105.816988] ? security_file_permission+0x24e/0x570 [ 2105.818066] do_splice_direct+0x1c4/0x290 [ 2105.818947] ? splice_direct_to_actor+0x980/0x980 [ 2105.819980] ? selinux_file_permission+0x36/0x510 [ 2105.821014] ? security_file_permission+0x24e/0x570 [ 2105.822095] vfs_copy_file_range+0x57b/0x10f0 [ 2105.823053] ? generic_file_rw_checks+0x230/0x230 [ 2105.824092] ? __fget_files+0x296/0x480 [ 2105.824962] __do_sys_copy_file_range+0x176/0x410 [ 2105.825994] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2105.827018] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2105.828062] do_syscall_64+0x33/0x40 [ 2105.828860] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2105.829952] RIP: 0033:0x7fbd0f57fb19 [ 2105.830747] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2105.834674] RSP: 002b:00007fbd0caf5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2105.836319] RAX: ffffffffffffffda RBX: 00007fbd0f692f60 RCX: 00007fbd0f57fb19 [ 2105.837836] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 2105.839354] RBP: 00007fbd0caf51d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2105.840887] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2105.842409] R13: 00007ffd29ee03ff R14: 00007fbd0caf5300 R15: 0000000000022000 01:43:51 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x0, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:43:51 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x0, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:43:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10011, 0x1000) 01:43:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x300) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:43:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x10000, 0x6, &(0x7f00000015c0)=[{&(0x7f0000000180)="baa6470e2facd1b0eb6b98b4e57f7040c68daa005eb805d12a7c81c25c84755fc6e1e4810c19cbbc5c4735b2361f76c7ff70148f3f92c7d28124f920db33bfa39c566c659fa4fa890dbe8dd3ad4fde6928670dd47c3a3a41ae5a7d4ef7160110c6a3ec25c370e22b35630e7241c61155a722bfce7c620eb6566203c569d0078185", 0x81, 0x800}, {&(0x7f0000000280)="c998d625eef0ba458a4cae190abd63437393d3da1b019a15844975fcde9edeba01f7bb99aaec77aeb941e9e352a46fa341a0044b65d0080138a1efa72f1d6ed3a550d18194c6c9e6079093fd136d1d1ca813f7718f151e71aaed708634d4ee0891c77c191881a24d556663673deb48ddf103ebc4ad9d32face9dc6eab1f55b376aceb1ad90e9db17bd945b961a17b5f6acee8c0f65e02f556e52ff92683a5633a4d32f", 0xa3, 0x3}, {&(0x7f0000000340)="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", 0x1000, 0x64d6}, {&(0x7f0000001340)="dc73a3d5afaa71c55614ff68f8beeabba87da1952799ff8f5105cdce6b765e0688ba79de4054bf8b6f5d177d5be97e299bf7871e9e20aa0b39da0a240ad69c4fe0a875840bbf808bab74f401915ddd200739d2a6372ab9d5760046a507e355e5d02c59e4a7dea320fc742ff5c5ba4f0c17ffa1b9ae0516f24aa11cd2fa08d9ca671b36dadbbf15f0435ac32239affec6d39fe2fb54544d5aa5c16661c29b6dc8ec15234116dee672659a01e8f67ab73f4cdeff760342035d9f7acc2d776dbafdb2df5b1270ac2d3e49fa1c0225132a4e973a7cb60fc13ad276dd8e0a86730e83bff49d5d70b24105663d8b950677d75b", 0xf0, 0x10000}, {&(0x7f0000001440)="a6ce09733fc4e7fd36ce04569a201ec34012d2b3307fde09eefdb8df6a0c77fcd931de6714054325e4049a2afd74382152fde8863310a52d8c347d00e9c03d5cc066419c88976d39d60a8a8a732af0236ff553500a293238d677ada43397c0d44f40b2a90cfb197ade415c1c8b3995c725400c1ac2163518cf0a7f442c3cb6b3b37bec6a940f28b2cdd9572ff18b00f2bad670df739076e031f3bdc6eceb6dce92d6a45196035e644844325892", 0xad, 0x8}, {&(0x7f0000001500)="aa27356658dc4441a36fe75f851c361cc34110ce1ab5c0d4bc55efdd1e91ee3d855fb84c959ce4d66932bfa1f86c39a84e47ad6f544345d218511f17324957637f17013a77affaf6773de243af", 0x4d, 0xf3a5}], 0x0, &(0x7f0000001680)={[{@session={'session', 0x3d, 0x26}}, {@map_normal}, {@uid={'uid', 0x3d, 0xee01}}, {@dmode={'dmode', 0x3d, 0xbd}}, {@overriderock}, {@unhide}, {@map_normal}], [{@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@obj_role={'obj_role', 0x3d, '/-,'}}, {@smackfsroot={'smackfsroot', 0x3d, '\'-\\{'}}, {@audit}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) renameat2(r0, &(0x7f0000000080)='./file0\x00', r3, &(0x7f0000001780)='./file0\x00', 0x0) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:43:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x408) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:43:51 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x0, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:43:51 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x0, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:43:51 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(0x0, 0x80) [ 2118.745433] kmemleak: 38 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:44:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 18) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:44:14 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:44:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10012, 0x1000) 01:44:14 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x0) fallocate(r2, 0x8, 0x10000, 0x1000) 01:44:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x500) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:44:14 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(0x0, 0x80) 01:44:14 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x0, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:44:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000280)={0x0, 0x0, 0x2, 0x0, '\x00', [{0x8, 0x6, 0x80000001, 0xee1, 0x7fff, 0x5}, {0x7fffffff, 0x9, 0x4, 0xd71, 0x10000, 0xfff}], ['\x00', '\x00']}) [ 2128.636607] FAULT_INJECTION: forcing a failure. [ 2128.636607] name failslab, interval 1, probability 0, space 0, times 0 [ 2128.639416] CPU: 0 PID: 32302 Comm: syz-executor.2 Not tainted 5.10.123 #1 [ 2128.641029] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2128.643431] Call Trace: [ 2128.644000] dump_stack+0x107/0x163 [ 2128.644781] should_fail.cold+0x5/0xa [ 2128.645590] ? create_object.isra.0+0x3a/0xa20 [ 2128.646562] should_failslab+0x5/0x10 [ 2128.647371] kmem_cache_alloc+0x5b/0x350 [ 2128.648249] ? __es_remove_extent+0x70f/0x15c0 [ 2128.649219] create_object.isra.0+0x3a/0xa20 [ 2128.650154] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2128.651230] kmem_cache_alloc+0x159/0x350 [ 2128.652121] __es_insert_extent+0x3a9/0x12f0 [ 2128.653048] ? do_raw_write_lock+0x11a/0x280 [ 2128.653994] ? do_raw_read_unlock+0x70/0x70 [ 2128.654922] ext4_es_insert_extent+0x2dc/0xbb0 [ 2128.655889] ? ext4_es_scan_clu+0x2e0/0x2e0 [ 2128.656816] ? lock_downgrade+0x6d0/0x6d0 [ 2128.657712] ? __ext4_handle_dirty_super+0x100/0x100 [ 2128.658802] ? __es_find_extent_range+0x197/0x4b0 [ 2128.659841] ? __ext4_handle_dirty_super+0x100/0x100 [ 2128.660931] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2128.661981] ext4_ext_map_blocks+0x1946/0x5b90 [ 2128.662980] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 01:44:14 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) [ 2128.664110] ? SOFTIRQ_verbose+0x10/0x10 [ 2128.665152] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2128.666274] ? SOFTIRQ_verbose+0x10/0x10 [ 2128.667141] ? ext4_ext_release+0x10/0x10 [ 2128.668055] ? lock_release+0x6b0/0x6b0 [ 2128.668902] ? ext4_es_lookup_extent+0x489/0xbe0 [ 2128.669921] ? lock_downgrade+0x6d0/0x6d0 [ 2128.670815] ? down_read+0x10f/0x420 [ 2128.671625] ? down_write_killable+0x180/0x180 [ 2128.672605] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2128.673647] ? ext4_es_lookup_extent+0xc4/0xbe0 [ 2128.674666] ext4_map_blocks+0x9c8/0x1970 [ 2128.675575] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 2128.676553] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2128.677576] ? jbd2__journal_start+0xf3/0x880 [ 2128.678550] ? __ext4_journal_start_sb+0x210/0x420 [ 2128.679609] ? __ext4_journal_start_sb+0x1db/0x420 [ 2128.680687] ext4_iomap_begin+0x3a9/0x6f0 [ 2128.681600] ? ext4_iomap_begin_report+0x5a0/0x5a0 [ 2128.682658] ? iomap_dio_rw+0x31/0x90 [ 2128.683487] ? do_iter_write+0x18d/0x670 [ 2128.684375] ? truncate_exceptional_pvec_entries.part.0+0x510/0x510 [ 2128.685747] ? splice_direct_to_actor+0x387/0x980 [ 2128.686779] ? do_splice_direct+0x1c4/0x290 [ 2128.687705] ? vfs_copy_file_range+0x57b/0x10f0 [ 2128.688715] iomap_apply+0x164/0x9e0 [ 2128.689502] ? iomap_dio_rw+0x90/0x90 [ 2128.690310] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 2128.691542] ? mark_held_locks+0x9e/0xe0 [ 2128.692429] ? filemap_check_errors+0xa5/0x150 [ 2128.693413] __iomap_dio_rw+0x6cd/0x11a0 [ 2128.694283] ? iomap_dio_rw+0x90/0x90 [ 2128.695113] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2128.696104] ? ext4_orphan_add+0x253/0x9d0 [ 2128.697000] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2128.698051] ? ext4_empty_dir+0x9c0/0x9c0 [ 2128.698928] ? jbd2__journal_start+0xf3/0x880 [ 2128.699890] iomap_dio_rw+0x31/0x90 [ 2128.700696] ext4_file_write_iter+0xaaf/0x1890 [ 2128.701678] ? stack_trace_consume_entry+0x160/0x160 [ 2128.702773] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2128.703753] ? kasan_save_stack+0x32/0x40 [ 2128.704638] ? kasan_save_stack+0x1b/0x40 [ 2128.705533] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2128.706598] ? iter_file_splice_write+0x16d/0xbe0 [ 2128.707638] ? direct_splice_actor+0x10f/0x170 [ 2128.708616] ? splice_direct_to_actor+0x387/0x980 [ 2128.709641] ? do_splice_direct+0x1c4/0x290 [ 2128.710566] ? vfs_copy_file_range+0x57b/0x10f0 [ 2128.711562] ? __do_sys_copy_file_range+0x176/0x410 [ 2128.712634] do_iter_readv_writev+0x476/0x750 [ 2128.713588] ? new_sync_write+0x660/0x660 [ 2128.714488] ? selinux_file_permission+0x36/0x510 [ 2128.715533] do_iter_write+0x18d/0x670 [ 2128.716408] vfs_iter_write+0x70/0xa0 [ 2128.717218] iter_file_splice_write+0x71d/0xbe0 [ 2128.718245] ? generic_splice_sendpage+0x140/0x140 [ 2128.719292] ? avc_policy_seqno+0x9/0x70 [ 2128.720174] ? selinux_file_permission+0x36/0x510 [ 2128.721202] ? lockdep_init_map_type+0x2c3/0x770 [ 2128.722222] ? generic_splice_sendpage+0x140/0x140 [ 2128.723265] direct_splice_actor+0x10f/0x170 [ 2128.724222] splice_direct_to_actor+0x387/0x980 [ 2128.725215] ? pipe_to_sendpage+0x380/0x380 [ 2128.726147] ? do_splice_to+0x160/0x160 [ 2128.726988] ? security_file_permission+0x24e/0x570 [ 2128.728091] do_splice_direct+0x1c4/0x290 [ 2128.728955] ? splice_direct_to_actor+0x980/0x980 [ 2128.729972] ? selinux_file_permission+0x36/0x510 [ 2128.731005] ? security_file_permission+0x24e/0x570 [ 2128.732087] vfs_copy_file_range+0x57b/0x10f0 [ 2128.733049] ? generic_file_rw_checks+0x230/0x230 [ 2128.734075] ? __fget_files+0x296/0x480 [ 2128.734940] __do_sys_copy_file_range+0x176/0x410 [ 2128.735968] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2128.736987] ? ksys_write+0x1a5/0x250 [ 2128.737802] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2128.738826] do_syscall_64+0x33/0x40 [ 2128.739614] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2128.740702] RIP: 0033:0x7fbd0f57fb19 [ 2128.741496] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2128.745512] RSP: 002b:00007fbd0caf5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2128.747141] RAX: ffffffffffffffda RBX: 00007fbd0f692f60 RCX: 00007fbd0f57fb19 [ 2128.748668] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 2128.750200] RBP: 00007fbd0caf51d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2128.751709] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2128.753237] R13: 00007ffd29ee03ff R14: 00007fbd0caf5300 R15: 0000000000022000 01:44:14 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x0, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:44:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x600) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:44:14 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:44:14 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:44:14 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x0) 01:44:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10018, 0x1000) 01:44:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x700) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 2142.529432] kmemleak: 44 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:44:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:44:36 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x0) 01:44:36 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x0) fallocate(r2, 0x8, 0x10000, 0x1000) 01:44:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10064, 0x1000) 01:44:36 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:44:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x801) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:44:36 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:44:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 19) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 2150.701072] FAULT_INJECTION: forcing a failure. [ 2150.701072] name failslab, interval 1, probability 0, space 0, times 0 [ 2150.703881] CPU: 0 PID: 32665 Comm: syz-executor.2 Not tainted 5.10.123 #1 [ 2150.705646] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2150.708041] Call Trace: [ 2150.708721] dump_stack+0x107/0x163 [ 2150.709648] should_fail.cold+0x5/0xa [ 2150.710618] ? ext4_find_extent+0xa39/0xd20 [ 2150.711714] should_failslab+0x5/0x10 [ 2150.712696] __kmalloc+0x72/0x3e0 [ 2150.713532] ext4_find_extent+0xa39/0xd20 [ 2150.714406] ? kfree+0xd7/0x380 [ 2150.715114] ext4_ext_map_blocks+0x1c8/0x5b90 [ 2150.716080] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2150.717198] ? SOFTIRQ_verbose+0x10/0x10 [ 2150.718050] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2150.719156] ? SOFTIRQ_verbose+0x10/0x10 [ 2150.720021] ? ext4_ext_release+0x10/0x10 [ 2150.720973] ? ext4_map_blocks+0x5e0/0x1970 [ 2150.721931] ? lock_release+0x6b0/0x6b0 [ 2150.722820] ? find_held_lock+0x2c/0x110 [ 2150.723729] ? down_write+0xe0/0x150 [ 2150.724566] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 2150.725689] ext4_map_blocks+0x652/0x1970 [ 2150.726617] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 2150.727613] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2150.728754] ? jbd2__journal_start+0xf3/0x880 [ 2150.729703] ? __ext4_journal_start_sb+0x210/0x420 [ 2150.730935] ? __ext4_journal_start_sb+0x1db/0x420 [ 2150.731973] ext4_iomap_begin+0x3a9/0x6f0 [ 2150.733054] ? ext4_iomap_begin_report+0x5a0/0x5a0 [ 2150.734294] ? iomap_dio_rw+0x31/0x90 [ 2150.735269] ? truncate_exceptional_pvec_entries.part.0+0x510/0x510 [ 2150.736881] ? splice_direct_to_actor+0x387/0x980 [ 2150.737892] ? do_splice_direct+0x1c4/0x290 [ 2150.738981] ? vfs_copy_file_range+0x57b/0x10f0 [ 2150.740172] iomap_apply+0x164/0x9e0 [ 2150.741146] ? iomap_dio_rw+0x90/0x90 [ 2150.742113] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 2150.743573] ? mark_held_locks+0x9e/0xe0 [ 2150.744468] ? filemap_check_errors+0xa5/0x150 [ 2150.745625] __iomap_dio_rw+0x6cd/0x11a0 [ 2150.746476] ? iomap_dio_rw+0x90/0x90 [ 2150.747451] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2150.748427] ? ext4_orphan_add+0x253/0x9d0 [ 2150.749504] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2150.750746] ? ext4_empty_dir+0x9c0/0x9c0 [ 2150.751615] ? jbd2__journal_start+0xf3/0x880 [ 2150.752778] iomap_dio_rw+0x31/0x90 [ 2150.753700] ext4_file_write_iter+0xaaf/0x1890 [ 2150.754674] ? stack_trace_consume_entry+0x160/0x160 [ 2150.755961] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2150.756935] ? kasan_save_stack+0x32/0x40 [ 2150.757979] ? kasan_save_stack+0x1b/0x40 [ 2150.759030] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2150.760324] ? iter_file_splice_write+0x16d/0xbe0 [ 2150.761357] ? direct_splice_actor+0x10f/0x170 [ 2150.762504] ? splice_direct_to_actor+0x387/0x980 [ 2150.763527] ? do_splice_direct+0x1c4/0x290 [ 2150.764627] ? vfs_copy_file_range+0x57b/0x10f0 [ 2150.765795] ? __do_sys_copy_file_range+0x176/0x410 [ 2150.766864] do_iter_readv_writev+0x476/0x750 [ 2150.767966] ? new_sync_write+0x660/0x660 [ 2150.768863] ? selinux_file_permission+0x36/0x510 [ 2150.769907] do_iter_write+0x18d/0x670 [ 2150.770751] vfs_iter_write+0x70/0xa0 [ 2150.771552] iter_file_splice_write+0x71d/0xbe0 [ 2150.772570] ? generic_splice_sendpage+0x140/0x140 [ 2150.773672] ? avc_policy_seqno+0x9/0x70 [ 2150.774567] ? selinux_file_permission+0x36/0x510 [ 2150.775638] ? lockdep_init_map_type+0x2c3/0x770 [ 2150.776702] ? generic_splice_sendpage+0x140/0x140 [ 2150.777794] direct_splice_actor+0x10f/0x170 [ 2150.778774] splice_direct_to_actor+0x387/0x980 [ 2150.779814] ? pipe_to_sendpage+0x380/0x380 [ 2150.780799] ? do_splice_to+0x160/0x160 [ 2150.781677] ? security_file_permission+0x24e/0x570 [ 2150.782796] do_splice_direct+0x1c4/0x290 [ 2150.783718] ? splice_direct_to_actor+0x980/0x980 [ 2150.784791] ? selinux_file_permission+0x36/0x510 [ 2150.785862] ? security_file_permission+0x24e/0x570 [ 2150.786982] vfs_copy_file_range+0x57b/0x10f0 [ 2150.787979] ? generic_file_rw_checks+0x230/0x230 [ 2150.789061] ? __fget_files+0x296/0x480 [ 2150.789969] __do_sys_copy_file_range+0x176/0x410 [ 2150.791041] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2150.792083] ? ksys_write+0x1a5/0x250 [ 2150.792960] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2150.794032] do_syscall_64+0x33/0x40 [ 2150.794858] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2150.795994] RIP: 0033:0x7fbd0f57fb19 [ 2150.796830] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2150.800911] RSP: 002b:00007fbd0caf5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2150.802598] RAX: ffffffffffffffda RBX: 00007fbd0f692f60 RCX: 00007fbd0f57fb19 [ 2150.804166] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 2150.805749] RBP: 00007fbd0caf51d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2150.807323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2150.808936] R13: 00007ffd29ee03ff R14: 00007fbd0caf5300 R15: 0000000000022000 [ 2163.838870] kmemleak: 10 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:44:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x1010d, 0x1000) 01:44:57 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:44:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x1000, 0x0) openat(r4, &(0x7f00000000c0)='./file0\x00', 0x200000, 0x100) fallocate(r2, 0x8, 0x10000, 0x1000) 01:44:57 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:44:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 20) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:44:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x804) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:44:57 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x0) 01:44:57 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x0) fallocate(r2, 0x8, 0x10000, 0x1000) [ 2172.411466] FAULT_INJECTION: forcing a failure. [ 2172.411466] name failslab, interval 1, probability 0, space 0, times 0 [ 2172.414218] CPU: 0 PID: 32795 Comm: syz-executor.2 Not tainted 5.10.123 #1 [ 2172.415800] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2172.418287] Call Trace: [ 2172.418861] dump_stack+0x107/0x163 [ 2172.419660] should_fail.cold+0x5/0xa [ 2172.420490] ? ext4_find_extent+0xa39/0xd20 [ 2172.421452] should_failslab+0x5/0x10 [ 2172.422278] __kmalloc+0x72/0x3e0 [ 2172.423028] ext4_find_extent+0xa39/0xd20 [ 2172.423919] ? kfree+0xd7/0x380 [ 2172.424657] ext4_ext_map_blocks+0x1c8/0x5b90 [ 2172.425660] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2172.426787] ? SOFTIRQ_verbose+0x10/0x10 [ 2172.427666] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2172.428817] ? SOFTIRQ_verbose+0x10/0x10 [ 2172.429722] ? ext4_ext_release+0x10/0x10 [ 2172.430629] ? ext4_map_blocks+0x5e0/0x1970 [ 2172.431569] ? lock_release+0x6b0/0x6b0 [ 2172.432434] ? find_held_lock+0x2c/0x110 [ 2172.433340] ? down_write+0xe0/0x150 [ 2172.434139] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 2172.435247] ext4_map_blocks+0x652/0x1970 [ 2172.436150] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 2172.437129] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2172.438175] ? jbd2__journal_start+0xf3/0x880 [ 2172.439170] ? __ext4_journal_start_sb+0x210/0x420 [ 2172.440238] ? __ext4_journal_start_sb+0x1db/0x420 [ 2172.441323] ext4_iomap_begin+0x3a9/0x6f0 [ 2172.442251] ? ext4_iomap_begin_report+0x5a0/0x5a0 [ 2172.443334] ? iomap_dio_rw+0x31/0x90 [ 2172.444180] ? truncate_exceptional_pvec_entries.part.0+0x510/0x510 [ 2172.445563] ? splice_direct_to_actor+0x387/0x980 [ 2172.446615] ? do_splice_direct+0x1c4/0x290 [ 2172.447551] ? vfs_copy_file_range+0x57b/0x10f0 [ 2172.448600] iomap_apply+0x164/0x9e0 [ 2172.449415] ? iomap_dio_rw+0x90/0x90 [ 2172.450244] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 2172.451497] ? mark_held_locks+0x9e/0xe0 [ 2172.452417] ? filemap_check_errors+0xa5/0x150 [ 2172.453423] __iomap_dio_rw+0x6cd/0x11a0 [ 2172.454330] ? iomap_dio_rw+0x90/0x90 [ 2172.455402] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2172.456650] ? ext4_orphan_add+0x253/0x9d0 [ 2172.457765] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2172.459060] ? ext4_empty_dir+0x9c0/0x9c0 [ 2172.460144] ? jbd2__journal_start+0xf3/0x880 [ 2172.461351] iomap_dio_rw+0x31/0x90 [ 2172.462316] ext4_file_write_iter+0xaaf/0x1890 [ 2172.463547] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2172.464790] ? trace_hardirqs_on+0x5b/0x180 [ 2172.465969] ? asm_sysvec_call_function_single+0x12/0x20 [ 2172.467222] do_iter_readv_writev+0x476/0x750 [ 2172.468210] ? new_sync_write+0x660/0x660 [ 2172.469128] ? selinux_file_permission+0x36/0x510 [ 2172.470209] do_iter_write+0x18d/0x670 [ 2172.471080] vfs_iter_write+0x70/0xa0 [ 2172.471919] iter_file_splice_write+0x71d/0xbe0 [ 2172.472969] ? generic_splice_sendpage+0x140/0x140 [ 2172.474051] ? avc_policy_seqno+0x9/0x70 [ 2172.474945] ? selinux_file_permission+0x36/0x510 [ 2172.476000] ? lockdep_init_map_type+0x2c3/0x770 [ 2172.477071] ? generic_splice_sendpage+0x140/0x140 [ 2172.478147] direct_splice_actor+0x10f/0x170 [ 2172.479107] splice_direct_to_actor+0x387/0x980 [ 2172.480153] ? pipe_to_sendpage+0x380/0x380 [ 2172.481104] ? do_splice_to+0x160/0x160 [ 2172.481975] ? security_file_permission+0x24e/0x570 [ 2172.483071] do_splice_direct+0x1c4/0x290 [ 2172.483991] ? splice_direct_to_actor+0x980/0x980 [ 2172.485051] ? selinux_file_permission+0x36/0x510 [ 2172.486109] ? security_file_permission+0x24e/0x570 [ 2172.487216] vfs_copy_file_range+0x57b/0x10f0 [ 2172.488197] ? generic_file_rw_checks+0x230/0x230 [ 2172.489286] ? __fget_files+0x296/0x480 [ 2172.490171] __do_sys_copy_file_range+0x176/0x410 [ 2172.491236] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2172.492261] ? ksys_write+0x1a5/0x250 [ 2172.493120] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2172.494191] do_syscall_64+0x33/0x40 [ 2172.494997] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2172.496108] RIP: 0033:0x7fbd0f57fb19 [ 2172.496949] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2172.500971] RSP: 002b:00007fbd0caf5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2172.502648] RAX: ffffffffffffffda RBX: 00007fbd0f692f60 RCX: 00007fbd0f57fb19 [ 2172.504208] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 2172.505946] RBP: 00007fbd0caf51d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2172.507552] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2172.509108] R13: 00007ffd29ee03ff R14: 00007fbd0caf5300 R15: 0000000000022000 01:44:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x900) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:44:58 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:44:58 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:44:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 21) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 2172.797144] FAULT_INJECTION: forcing a failure. [ 2172.797144] name failslab, interval 1, probability 0, space 0, times 0 [ 2172.799681] CPU: 0 PID: 32932 Comm: syz-executor.2 Not tainted 5.10.123 #1 [ 2172.801190] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2172.803597] Call Trace: [ 2172.804166] dump_stack+0x107/0x163 [ 2172.804957] should_fail.cold+0x5/0xa [ 2172.805777] ? ext4_mb_new_blocks+0x64d/0x4840 [ 2172.806762] should_failslab+0x5/0x10 [ 2172.807583] kmem_cache_alloc+0x5b/0x350 [ 2172.808466] ext4_mb_new_blocks+0x64d/0x4840 [ 2172.809454] ? kasan_unpoison_shadow+0x33/0x40 [ 2172.810433] ? ext4_cache_extents+0x68/0x2d0 [ 2172.811367] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2172.812449] ? ext4_discard_preallocations+0xe10/0xe10 [ 2172.813579] ? ext4_ext_search_right+0x2e3/0xbd0 [ 2172.814593] ? ext4_inode_to_goal_block+0x320/0x430 [ 2172.815672] ext4_ext_map_blocks+0x1ec0/0x5b90 [ 2172.816692] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2172.817806] ? SOFTIRQ_verbose+0x10/0x10 [ 2172.818668] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2172.819786] ? _raw_spin_unlock_irq+0x1f/0x30 [ 2172.820737] ? trace_hardirqs_on+0x5b/0x180 [ 2172.821650] ? _raw_spin_unlock_irq+0x1f/0x30 [ 2172.822608] ? finish_task_switch+0x126/0x5d0 [ 2172.823555] ? ext4_ext_release+0x10/0x10 [ 2172.824429] ? ext4_map_blocks+0x5e0/0x1970 [ 2172.825357] ? lock_release+0x6b0/0x6b0 [ 2172.826203] ? io_schedule_timeout+0x140/0x140 [ 2172.827188] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 2172.828254] ext4_map_blocks+0x652/0x1970 [ 2172.829162] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 2172.830112] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2172.831136] ? jbd2__journal_start+0xf3/0x880 [ 2172.832118] ? __ext4_journal_start_sb+0x210/0x420 [ 2172.833172] ? __ext4_journal_start_sb+0x1db/0x420 [ 2172.834226] ext4_iomap_begin+0x3a9/0x6f0 [ 2172.835118] ? ext4_iomap_begin_report+0x5a0/0x5a0 [ 2172.836154] ? iomap_dio_rw+0x31/0x90 [ 2172.836989] ? truncate_exceptional_pvec_entries.part.0+0x510/0x510 [ 2172.838329] ? splice_direct_to_actor+0x387/0x980 [ 2172.839355] ? do_splice_direct+0x1c4/0x290 [ 2172.840264] ? vfs_copy_file_range+0x57b/0x10f0 [ 2172.841265] iomap_apply+0x164/0x9e0 [ 2172.842049] ? iomap_dio_rw+0x90/0x90 [ 2172.842857] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 2172.844090] ? mark_held_locks+0x9e/0xe0 [ 2172.844984] ? filemap_check_errors+0xa5/0x150 [ 2172.845958] __iomap_dio_rw+0x6cd/0x11a0 [ 2172.846813] ? iomap_dio_rw+0x90/0x90 [ 2172.847639] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2172.848615] ? ext4_orphan_add+0x253/0x9d0 [ 2172.849513] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2172.850565] ? ext4_empty_dir+0x9c0/0x9c0 [ 2172.851439] ? jbd2__journal_start+0xf3/0x880 [ 2172.852400] iomap_dio_rw+0x31/0x90 [ 2172.853196] ext4_file_write_iter+0xaaf/0x1890 [ 2172.854174] ? stack_trace_consume_entry+0x160/0x160 [ 2172.855273] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2172.856239] ? kasan_save_stack+0x32/0x40 [ 2172.857129] ? kasan_save_stack+0x1b/0x40 [ 2172.858007] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2172.859077] ? iter_file_splice_write+0x16d/0xbe0 [ 2172.860103] ? direct_splice_actor+0x10f/0x170 [ 2172.861081] ? splice_direct_to_actor+0x387/0x980 [ 2172.862128] ? do_splice_direct+0x1c4/0x290 [ 2172.863043] ? vfs_copy_file_range+0x57b/0x10f0 [ 2172.864076] ? __do_sys_copy_file_range+0x176/0x410 [ 2172.865460] do_iter_readv_writev+0x476/0x750 [ 2172.866627] ? new_sync_write+0x660/0x660 [ 2172.867692] ? selinux_file_permission+0x36/0x510 [ 2172.868971] do_iter_write+0x18d/0x670 [ 2172.869994] vfs_iter_write+0x70/0xa0 [ 2172.870966] iter_file_splice_write+0x71d/0xbe0 [ 2172.872188] ? generic_splice_sendpage+0x140/0x140 [ 2172.873470] ? avc_policy_seqno+0x9/0x70 [ 2172.874512] ? selinux_file_permission+0x36/0x510 [ 2172.875755] ? lockdep_init_map_type+0x2c3/0x770 [ 2172.877035] ? generic_splice_sendpage+0x140/0x140 [ 2172.878291] direct_splice_actor+0x10f/0x170 [ 2172.879435] splice_direct_to_actor+0x387/0x980 [ 2172.880596] ? pipe_to_sendpage+0x380/0x380 [ 2172.881545] ? do_splice_to+0x160/0x160 [ 2172.882396] ? security_file_permission+0x24e/0x570 [ 2172.883481] do_splice_direct+0x1c4/0x290 [ 2172.884371] ? splice_direct_to_actor+0x980/0x980 [ 2172.885427] ? selinux_file_permission+0x36/0x510 [ 2172.886456] ? security_file_permission+0x24e/0x570 [ 2172.887558] vfs_copy_file_range+0x57b/0x10f0 [ 2172.888522] ? generic_file_rw_checks+0x230/0x230 [ 2172.889569] ? __fget_files+0x296/0x480 [ 2172.890446] __do_sys_copy_file_range+0x176/0x410 [ 2172.891491] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2172.892519] ? ksys_write+0x1a5/0x250 [ 2172.893368] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2172.894404] do_syscall_64+0x33/0x40 [ 2172.895198] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2172.896310] RIP: 0033:0x7fbd0f57fb19 [ 2172.897119] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2172.901030] RSP: 002b:00007fbd0caf5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2172.902659] RAX: ffffffffffffffda RBX: 00007fbd0f692f60 RCX: 00007fbd0f57fb19 [ 2172.904157] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 2172.905691] RBP: 00007fbd0caf51d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2172.907195] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2172.908726] R13: 00007ffd29ee03ff R14: 00007fbd0caf5300 R15: 0000000000022000 01:44:58 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, 0x0, 0x0) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:44:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xa00) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:44:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 22) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:44:58 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) [ 2173.180711] FAULT_INJECTION: forcing a failure. [ 2173.180711] name failslab, interval 1, probability 0, space 0, times 0 [ 2173.183082] CPU: 0 PID: 33045 Comm: syz-executor.2 Not tainted 5.10.123 #1 [ 2173.184427] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2173.186599] Call Trace: [ 2173.187103] dump_stack+0x107/0x163 [ 2173.187797] should_fail.cold+0x5/0xa [ 2173.188536] ? create_object.isra.0+0x3a/0xa20 [ 2173.189421] should_failslab+0x5/0x10 [ 2173.190141] kmem_cache_alloc+0x5b/0x350 [ 2173.191097] create_object.isra.0+0x3a/0xa20 [ 2173.191910] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2173.192908] __kmalloc+0x16e/0x3e0 [ 2173.193595] ext4_find_extent+0xa39/0xd20 [ 2173.194395] ? kfree+0xd7/0x380 [ 2173.195004] ext4_ext_map_blocks+0x1c8/0x5b90 [ 2173.195884] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2173.196852] ? SOFTIRQ_verbose+0x10/0x10 [ 2173.197639] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2173.198614] ? SOFTIRQ_verbose+0x10/0x10 [ 2173.199395] ? ext4_ext_release+0x10/0x10 [ 2173.200151] ? ext4_map_blocks+0x5e0/0x1970 [ 2173.200966] ? lock_release+0x6b0/0x6b0 [ 2173.201705] ? find_held_lock+0x2c/0x110 [ 2173.202481] ? down_write+0xe0/0x150 [ 2173.203158] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 2173.204078] ext4_map_blocks+0x652/0x1970 [ 2173.204854] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 2173.205677] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2173.206556] ? jbd2__journal_start+0xf3/0x880 [ 2173.207402] ? __ext4_journal_start_sb+0x210/0x420 [ 2173.208334] ? __ext4_journal_start_sb+0x1db/0x420 [ 2173.209247] ext4_iomap_begin+0x3a9/0x6f0 [ 2173.210007] ? ext4_iomap_begin_report+0x5a0/0x5a0 [ 2173.210899] ? iomap_dio_rw+0x31/0x90 [ 2173.211601] ? truncate_exceptional_pvec_entries.part.0+0x510/0x510 [ 2173.212767] ? splice_direct_to_actor+0x387/0x980 [ 2173.213647] ? do_splice_direct+0x1c4/0x290 [ 2173.214431] ? vfs_copy_file_range+0x57b/0x10f0 [ 2173.215295] iomap_apply+0x164/0x9e0 [ 2173.215966] ? iomap_dio_rw+0x90/0x90 [ 2173.216694] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 2173.217757] ? mark_held_locks+0x9e/0xe0 [ 2173.218524] ? filemap_check_errors+0xa5/0x150 [ 2173.219366] __iomap_dio_rw+0x6cd/0x11a0 [ 2173.220101] ? iomap_dio_rw+0x90/0x90 [ 2173.220842] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2173.221682] ? ext4_orphan_add+0x253/0x9d0 [ 2173.222448] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2173.223348] ? ext4_empty_dir+0x9c0/0x9c0 [ 2173.224085] ? jbd2__journal_start+0xf3/0x880 [ 2173.224935] iomap_dio_rw+0x31/0x90 [ 2173.225602] ext4_file_write_iter+0xaaf/0x1890 [ 2173.226441] ? stack_trace_consume_entry+0x160/0x160 [ 2173.227364] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2173.228193] ? kasan_save_stack+0x32/0x40 [ 2173.228953] ? kasan_save_stack+0x1b/0x40 [ 2173.229716] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2173.230627] ? iter_file_splice_write+0x16d/0xbe0 [ 2173.231502] ? direct_splice_actor+0x10f/0x170 [ 2173.232327] ? splice_direct_to_actor+0x387/0x980 [ 2173.233246] ? do_splice_direct+0x1c4/0x290 [ 2173.234061] ? vfs_copy_file_range+0x57b/0x10f0 [ 2173.234897] ? __do_sys_copy_file_range+0x176/0x410 [ 2173.235811] do_iter_readv_writev+0x476/0x750 [ 2173.236632] ? new_sync_write+0x660/0x660 [ 2173.237401] ? selinux_file_permission+0x36/0x510 [ 2173.238292] do_iter_write+0x18d/0x670 [ 2173.239002] vfs_iter_write+0x70/0xa0 [ 2173.239683] iter_file_splice_write+0x71d/0xbe0 [ 2173.240548] ? generic_splice_sendpage+0x140/0x140 [ 2173.241446] ? avc_policy_seqno+0x9/0x70 [ 2173.242168] ? selinux_file_permission+0x36/0x510 [ 2173.243009] ? lockdep_init_map_type+0x2c3/0x770 [ 2173.243882] ? generic_splice_sendpage+0x140/0x140 [ 2173.244774] direct_splice_actor+0x10f/0x170 [ 2173.245595] splice_direct_to_actor+0x387/0x980 [ 2173.246508] ? pipe_to_sendpage+0x380/0x380 [ 2173.247335] ? do_splice_to+0x160/0x160 [ 2173.248033] ? security_file_permission+0x24e/0x570 [ 2173.248968] do_splice_direct+0x1c4/0x290 [ 2173.249720] ? splice_direct_to_actor+0x980/0x980 [ 2173.250587] ? selinux_file_permission+0x36/0x510 [ 2173.251464] ? security_file_permission+0x24e/0x570 [ 2173.252364] vfs_copy_file_range+0x57b/0x10f0 [ 2173.253288] ? generic_file_rw_checks+0x230/0x230 [ 2173.254123] ? __fget_files+0x296/0x480 [ 2173.254863] __do_sys_copy_file_range+0x176/0x410 [ 2173.255745] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2173.256624] ? ksys_write+0x1a5/0x250 [ 2173.257316] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2173.258196] do_syscall_64+0x33/0x40 [ 2173.258842] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2173.259878] RIP: 0033:0x7fbd0f57fb19 [ 2173.260545] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2173.263912] RSP: 002b:00007fbd0caf5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2173.265284] RAX: ffffffffffffffda RBX: 00007fbd0f692f60 RCX: 00007fbd0f57fb19 [ 2173.266612] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 2173.267825] RBP: 00007fbd0caf51d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2173.269198] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2173.270406] R13: 00007ffd29ee03ff R14: 00007fbd0caf5300 R15: 0000000000022000 01:44:58 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(0xffffffffffffffff, 0x8, 0x10000, 0x1000) 01:44:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10300, 0x1000) 01:44:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x24) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) copy_file_range(r3, &(0x7f0000000080)=0x6356, r2, &(0x7f00000000c0)=0x2, 0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:44:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xa01) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 2188.966588] kmemleak: 39 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:45:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10500, 0x1000) 01:45:23 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, 0x0, 0x0) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:45:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(0xffffffffffffffff, 0x8, 0x10000, 0x1000) 01:45:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xb00) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:45:23 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:45:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x8201, 0x101) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800003) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:45:23 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:45:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 23) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 2197.921021] FAULT_INJECTION: forcing a failure. [ 2197.921021] name failslab, interval 1, probability 0, space 0, times 0 [ 2197.924095] CPU: 0 PID: 33257 Comm: syz-executor.2 Not tainted 5.10.123 #1 [ 2197.925878] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2197.928267] Call Trace: [ 2197.928968] dump_stack+0x107/0x163 [ 2197.929756] should_fail.cold+0x5/0xa [ 2197.930741] ? ext4_mb_new_blocks+0x64d/0x4840 [ 2197.931906] should_failslab+0x5/0x10 [ 2197.932874] kmem_cache_alloc+0x5b/0x350 [ 2197.933931] ext4_mb_new_blocks+0x64d/0x4840 [ 2197.935081] ? kasan_unpoison_shadow+0x33/0x40 [ 2197.936239] ? ext4_cache_extents+0x68/0x2d0 [ 2197.937369] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2197.938570] ? ext4_discard_preallocations+0xe10/0xe10 [ 2197.939682] ? ext4_ext_search_right+0x2e3/0xbd0 [ 2197.940682] ? ext4_inode_to_goal_block+0x320/0x430 [ 2197.941762] ext4_ext_map_blocks+0x1ec0/0x5b90 [ 2197.942745] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2197.943843] ? SOFTIRQ_verbose+0x10/0x10 [ 2197.944697] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2197.945815] ? _raw_spin_unlock_irq+0x1f/0x30 [ 2197.946759] ? trace_hardirqs_on+0x5b/0x180 [ 2197.947663] ? _raw_spin_unlock_irq+0x1f/0x30 [ 2197.948604] ? finish_task_switch+0x126/0x5d0 [ 2197.949552] ? ext4_ext_release+0x10/0x10 [ 2197.950425] ? ext4_map_blocks+0x5e0/0x1970 [ 2197.951335] ? lock_release+0x6b0/0x6b0 [ 2197.952179] ? io_schedule_timeout+0x140/0x140 [ 2197.953186] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 2197.954251] ext4_map_blocks+0x652/0x1970 [ 2197.955138] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 2197.956077] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2197.957094] ? jbd2__journal_start+0xf3/0x880 [ 2197.958039] ? __ext4_journal_start_sb+0x210/0x420 [ 2197.959065] ? __ext4_journal_start_sb+0x1db/0x420 [ 2197.960104] ext4_iomap_begin+0x3a9/0x6f0 [ 2197.960996] ? ext4_iomap_begin_report+0x5a0/0x5a0 [ 2197.962030] ? iomap_dio_rw+0x31/0x90 [ 2197.962839] ? truncate_exceptional_pvec_entries.part.0+0x510/0x510 [ 2197.964160] ? splice_direct_to_actor+0x387/0x980 [ 2197.965186] ? do_splice_direct+0x1c4/0x290 [ 2197.966086] ? vfs_copy_file_range+0x57b/0x10f0 [ 2197.967073] iomap_apply+0x164/0x9e0 [ 2197.967853] ? iomap_dio_rw+0x90/0x90 [ 2197.968655] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 2197.969876] ? mark_held_locks+0x9e/0xe0 [ 2197.970744] ? filemap_check_errors+0xa5/0x150 [ 2197.971717] __iomap_dio_rw+0x6cd/0x11a0 [ 2197.972564] ? iomap_dio_rw+0x90/0x90 [ 2197.973391] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2197.974358] ? ext4_orphan_add+0x253/0x9d0 [ 2197.975255] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2197.976296] ? ext4_empty_dir+0x9c0/0x9c0 [ 2197.977196] ? jbd2__journal_start+0xf3/0x880 [ 2197.978157] iomap_dio_rw+0x31/0x90 [ 2197.978933] ext4_file_write_iter+0xaaf/0x1890 [ 2197.979907] ? stack_trace_consume_entry+0x160/0x160 [ 2197.980997] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2197.981954] ? kasan_save_stack+0x32/0x40 [ 2197.982821] ? kasan_save_stack+0x1b/0x40 [ 2197.983692] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2197.984758] ? iter_file_splice_write+0x16d/0xbe0 [ 2197.985780] ? direct_splice_actor+0x10f/0x170 [ 2197.986737] ? splice_direct_to_actor+0x387/0x980 [ 2197.987743] ? do_splice_direct+0x1c4/0x290 [ 2197.988647] ? vfs_copy_file_range+0x57b/0x10f0 [ 2197.989655] ? __do_sys_copy_file_range+0x176/0x410 [ 2197.990722] do_iter_readv_writev+0x476/0x750 [ 2197.991675] ? new_sync_write+0x660/0x660 [ 2197.992563] ? selinux_file_permission+0x36/0x510 [ 2197.993621] do_iter_write+0x18d/0x670 [ 2197.994464] vfs_iter_write+0x70/0xa0 [ 2197.995272] iter_file_splice_write+0x71d/0xbe0 [ 2197.996280] ? generic_splice_sendpage+0x140/0x140 [ 2197.997354] ? avc_policy_seqno+0x9/0x70 [ 2197.998216] ? selinux_file_permission+0x36/0x510 [ 2197.999231] ? lockdep_init_map_type+0x2c3/0x770 [ 2198.000246] ? generic_splice_sendpage+0x140/0x140 [ 2198.001305] direct_splice_actor+0x10f/0x170 [ 2198.002246] splice_direct_to_actor+0x387/0x980 [ 2198.003238] ? pipe_to_sendpage+0x380/0x380 [ 2198.004157] ? do_splice_to+0x160/0x160 [ 2198.004998] ? security_file_permission+0x24e/0x570 [ 2198.006075] do_splice_direct+0x1c4/0x290 [ 2198.006956] ? splice_direct_to_actor+0x980/0x980 [ 2198.007976] ? selinux_file_permission+0x36/0x510 [ 2198.009017] ? security_file_permission+0x24e/0x570 [ 2198.010089] vfs_copy_file_range+0x57b/0x10f0 [ 2198.011050] ? generic_file_rw_checks+0x230/0x230 [ 2198.012072] ? __fget_files+0x296/0x480 [ 2198.012962] __do_sys_copy_file_range+0x176/0x410 [ 2198.013990] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2198.014989] ? ksys_write+0x1a5/0x250 [ 2198.015812] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2198.016834] do_syscall_64+0x33/0x40 [ 2198.017632] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2198.018724] RIP: 0033:0x7fbd0f57fb19 [ 2198.019524] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2198.023460] RSP: 002b:00007fbd0caf5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2198.025092] RAX: ffffffffffffffda RBX: 00007fbd0f692f60 RCX: 00007fbd0f57fb19 [ 2198.026611] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 2198.028129] RBP: 00007fbd0caf51d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2198.029658] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2198.031190] R13: 00007ffd29ee03ff R14: 00007fbd0caf5300 R15: 0000000000022000 01:45:23 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x0) fallocate(r2, 0x8, 0x10000, 0x1000) 01:45:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 24) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:45:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xc00) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:45:23 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, 0x0, 0x0) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:45:23 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, 0x0, 0x0) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:45:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(r4, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9c, 0x9, 0x3, 0x5}) 01:45:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xc01) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:45:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(0xffffffffffffffff, 0x8, 0x10000, 0x1000) 01:45:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10d01, 0x1000) 01:45:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:45:24 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:45:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xd00) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:45:24 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, 0x0, 0x0) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:45:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x11100, 0x1000) [ 2214.620262] kmemleak: 50 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:45:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x11200, 0x1000) 01:45:49 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10500, 0x1000) 01:45:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x2) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:45:49 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x0, 0x10000, 0x1000) 01:45:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000080), &(0x7f00000000c0)=0x30) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:45:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xe00) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:45:49 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:45:49 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, 0x0, 0x0) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:45:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xf00) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 2238.917561] kmemleak: 14 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:46:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x1200) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:46:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x3) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:46:12 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x0) 01:46:12 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x0, 0x10000, 0x1000) 01:46:12 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:46:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x11800, 0x1000) 01:46:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) copy_file_range(r2, &(0x7f0000000080)=0x8, r0, &(0x7f00000000c0)=0x7fff, 0x100, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r3 = creat(&(0x7f0000000240)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = eventfd2(0xffff, 0x80800) fallocate(r4, 0x0, 0x401, 0x8800004) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x8000, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000180)) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r3, 0x8, 0x10000, 0x1000) 01:46:12 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:46:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:46:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x1681) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:46:12 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:46:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x5) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:46:12 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) [ 2262.973788] kmemleak: 17 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:46:38 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:46:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x2000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:46:38 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x400, 0x1) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r0, 0x8, 0x10000, 0x1000) r2 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(r2, &(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat(r2, 0x0, 0x8000, 0x100) copy_file_range(r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x300000000000000) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r5) r6 = pidfd_getfd(r1, r0, 0x0) openat(r6, &(0x7f0000000180)='./file0\x00', 0x60a401, 0x82) 01:46:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x14000, 0x1000) 01:46:38 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x0, 0x10000, 0x1000) 01:46:38 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x0) fallocate(r2, 0x8, 0x10000, 0x1000) 01:46:38 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:46:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x6) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:46:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x3f00) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:46:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x7) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:46:38 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:46:38 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:46:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(r4, 0xffffffffffffffff, 0x0) fchmod(r4, 0xc9) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:46:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:46:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x8) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:46:38 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x0, 0x1000) 01:46:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x0) fallocate(r2, 0x8, 0x10000, 0x1000) 01:46:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x16400, 0x1000) [ 2289.316723] kmemleak: 32 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:47:03 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x40b4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:47:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x9) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:47:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x20000, 0x1000) 01:47:03 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x400, 0x1) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r0, 0x8, 0x10000, 0x1000) r2 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(r2, &(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat(r2, 0x0, 0x8000, 0x100) copy_file_range(r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x300000000000000) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r5) r6 = pidfd_getfd(r1, r0, 0x0) openat(r6, &(0x7f0000000180)='./file0\x00', 0x60a401, 0x82) 01:47:03 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:47:03 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, 0x0, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:47:03 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x0, 0x1000) 01:47:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) creat(&(0x7f00000000c0)='./file0\x00', 0x20) fallocate(r2, 0x8, 0x10000, 0x1000) 01:47:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xa) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:47:03 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x400, 0x1) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r0, 0x8, 0x10000, 0x1000) r2 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(r2, &(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat(r2, 0x0, 0x8000, 0x100) copy_file_range(r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x300000000000000) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r5) r6 = pidfd_getfd(r1, r0, 0x0) openat(r6, &(0x7f0000000180)='./file0\x00', 0x60a401, 0x82) 01:47:03 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x4f00) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:47:03 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, 0x0, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:47:03 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:47:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xb) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 2310.351960] kmemleak: 26 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:47:24 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x20000, 0x1000) 01:47:24 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, 0x0, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:47:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x5000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:47:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r3, 0xc0709411, &(0x7f0000000080)={{0x0, 0x0, 0xca, 0x8, 0x7, 0xfffffffffffffffe, 0x0, 0x3, 0xfffffffd, 0x4731, 0x1ff, 0x76b, 0x1f, 0x1c7, 0x1}, 0x8, [0x0]}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000180)={{r4, 0xfffffffffffffff8, 0x101, 0x0, 0x100000000, 0x7, 0x0, 0xfff, 0x7f, 0x7, 0x7c92, 0x0, 0xffffffffffffffe0, 0x9, 0x4}, 0x8, [0x0]}) 01:47:24 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x0, 0x1000) 01:47:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x4000000, 0x1000) 01:47:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xc) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:47:24 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, 0x0, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:47:24 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:47:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xd) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:47:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x50b4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:47:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xe) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:47:24 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, 0x0, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:47:24 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:47:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x2) 01:47:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x6400) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:47:24 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xc) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:47:24 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x0) 01:47:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@mcast1, 0x0, 0x0, 0x0, 0xf0b0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(r2, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r2, 0x4010942a, &(0x7f0000000080)={0x0, 0x798e}) r3 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x8800000) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) fsetxattr$security_selinux(r5, &(0x7f0000000100), &(0x7f0000000180)='system_u:object_r:useradd_exec_t:s0\x00', 0x24, 0x3) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r3, 0x8, 0x10000, 0x1000) copy_file_range(r4, &(0x7f00000001c0), 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x6, 0x0) 01:47:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xf) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 2319.497610] audit: type=1400 audit(1655862444.984:49): avc: denied { relabelfrom } for pid=35742 comm="syz-executor.5" name="" dev="pipefs" ino=33550 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=fifo_file permissive=1 [ 2334.425402] kmemleak: 25 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:47:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) flock(0xffffffffffffffff, 0x5) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:47:48 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, 0x0, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:47:48 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x0) 01:47:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x3) 01:47:48 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:47:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x10) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:47:48 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) creat(&(0x7f00000000c0)='./file0\x00', 0x20) fallocate(r2, 0x8, 0x10000, 0x1000) 01:47:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x8008) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:47:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x8102) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:47:49 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:47:49 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:47:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x12) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 2357.828439] kmemleak: 37 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:48:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x8116) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:48:12 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x12) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:48:12 executing program 5: stat(&(0x7f00000001c0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x2000, &(0x7f00000001c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@mmap}], [{@uid_lt={'uid<', r0}}]}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) r3 = creat(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000080)={0xe922, 0x3, 0x1, 0x1000, 0x3}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/tty/ldiscs\x00', 0x0, 0x0) stat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440)) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(r5, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x80000000, 0xffff}}, './file0\x00'}) listxattr(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000280)=""/237, 0xed) r6 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r3, 0x8, 0x10000, 0x1000) 01:48:12 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x0) 01:48:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x18) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:48:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x9) 01:48:12 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:48:12 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:48:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="1000000017020090b1aa3931bb1fcb0fcf7ba1cc72beda07002e2f66696c6530ea65b0cfa0cc68ab39d6eb282b9ce0050750409e860f2eb3fddde10bee096b86d60cc1cec822e5c8c075b9affcd7ac168edc44e2fa9ce4085bc113d7636905fd85a48df5442cdce2e989aa65fa0ebc2a1a87c75a1eff77b669ee6bc3df327866b46d4d124eb276efa8a1f56d9c6427fa27dc8a64305fccbc02d018fa78ba28e2e1d17be96d1cad035d"], 0x10) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat$cgroup_pressure(r2, &(0x7f0000000100)='io.pressure\x00', 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(r4, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r4, 0x40189429, &(0x7f0000000280)={0x1, 0x10000097, 0x7ffffffc}) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x21, 0x1}, 0x7) fallocate(r2, 0x8, 0x10000, 0x1000) 01:48:13 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:48:13 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x9000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:48:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x30) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:48:13 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x0, 0x1000) 01:48:13 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:48:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80c00, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:48:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x50) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:48:13 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xb440) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:48:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x16) 01:48:13 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x11800, 0x1000) 01:48:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x12, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) clone3(&(0x7f0000000300)={0x80000, &(0x7f0000000080)=0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100), {0x36}, &(0x7f0000000180)=""/151, 0x97, &(0x7f0000000280)=""/37, &(0x7f00000002c0)=[0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0], 0x7, {r3}}, 0x58) ioctl$FITRIM(r4, 0xc0185879, &(0x7f0000000380)={0x5, 0x7, 0x1}) fallocate(r2, 0x8, 0x10000, 0x1000) 01:48:13 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:48:13 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xb450) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 2383.257129] kmemleak: 61 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:48:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(r1, 0xffffffffffffffff, 0x0) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x200f5ef, 0x0) r3 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$lock(r4, 0x6, &(0x7f0000000080)={0x1, 0x0, 0x7, 0x80000001, 0xffffffffffffffff}) fallocate(r4, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r3, 0x8, 0x10000, 0x1000) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000000c0)=0x20) 01:48:36 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x12, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) clone3(&(0x7f0000000300)={0x80000, &(0x7f0000000080)=0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100), {0x36}, &(0x7f0000000180)=""/151, 0x97, &(0x7f0000000280)=""/37, &(0x7f00000002c0)=[0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0], 0x7, {r3}}, 0x58) ioctl$FITRIM(r4, 0xc0185879, &(0x7f0000000380)={0x5, 0x7, 0x1}) fallocate(r2, 0x8, 0x10000, 0x1000) 01:48:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x2b) 01:48:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xda01) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:48:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x60) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:48:36 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{0x0}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:48:36 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:48:36 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000280)={0x0, 0x0, 0x2, 0x0, '\x00', [{0x8, 0x6, 0x80000001, 0xee1, 0x7fff, 0x5}, {0x7fffffff, 0x9, 0x4, 0xd71, 0x10000, 0xfff}], ['\x00', '\x00']}) 01:48:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) r4 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) creat(&(0x7f0000000300)='./file1\x00', 0x81) mkdirat(r4, &(0x7f00000000c0)='./file0\x00', 0x0) execveat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000100)='%+&^!#}\\@-^(\x00', &(0x7f0000000180)='\a*\x00'], &(0x7f00000002c0)=[&(0x7f0000000200)='\\*(\'#+\xcb&{])}\'\x00', &(0x7f0000000280)='$\x00'], 0x1000) 01:48:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xff00) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:48:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x64) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:48:36 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{0x0}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:48:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xff01) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 2405.488017] kmemleak: 48 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:49:00 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(0x0, 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:49:00 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:49:00 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{0x0}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:49:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x102) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:49:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0xc00) 01:49:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x3e7b0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:49:00 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(0x0, 0x80) 01:49:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) read(r0, &(0x7f00000000c0), 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) copy_file_range(r4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x300000000000000) ioctl$AUTOFS_IOC_CATATONIC(r3, 0x9362, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000080)={0x3a, 0xb, 0xe, 0x9, 0x9, 0x3f, 0x3, 0x159, 0x8b3659b93adaa112}) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:49:00 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:49:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x3e7c0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:49:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x10d) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:49:00 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{0x0}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) [ 2430.691686] kmemleak: 14 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:49:26 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{0x0}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:49:26 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) r4 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) creat(&(0x7f0000000300)='./file1\x00', 0x81) mkdirat(r4, &(0x7f00000000c0)='./file0\x00', 0x0) execveat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000100)='%+&^!#}\\@-^(\x00', &(0x7f0000000180)='\a*\x00'], &(0x7f00000002c0)=[&(0x7f0000000200)='\\*(\'#+\xcb&{])}\'\x00', &(0x7f0000000280)='$\x00'], 0x1000) 01:49:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x3e7d0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:49:26 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:49:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x10f) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:49:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0xf00) 01:49:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0xf, 0x5, 0x80, 0x0, 0x7f, 0x1224c, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext={0x3ff, 0xa4cd}, 0x52240, 0x5, 0x2, 0x6, 0x1f, 0xd4, 0x0, 0x0, 0x401, 0x0, 0x5}, r0, 0x3, r0, 0xc) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x82440, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@nodevmap}, {@cache_fscache}, {@access_any}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@dfltuid}, {@debug={'debug', 0x3d, 0x80}}, {@access_uid={'access', 0x3d, 0xee00}}, {@access_client}, {@version_L}]}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x200f5ef, 0x0) r3 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f0000000100)=0x10) fallocate(r3, 0x8, 0x10000, 0x1000) 01:49:26 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) [ 2440.633742] ====================================================== [ 2440.633742] WARNING: the mand mount option is being deprecated and [ 2440.633742] will be removed in v5.15! [ 2440.633742] ====================================================== 01:49:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x1da) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:49:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x40000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:49:26 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:49:26 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(0x0, 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:49:26 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{0x0}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:49:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x481c0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:49:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x201) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:49:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1002) 01:49:26 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x201) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:49:26 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0x1}], 0x1}, 0x0) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:49:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$AUTOFS_IOC_SETTIMEOUT(0xffffffffffffffff, 0x80049367, &(0x7f0000000080)=0x5) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r3, 0xf501, 0x0) fallocate(r2, 0x8, 0x10000, 0x1000) [ 2455.687173] kmemleak: 16 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:49:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x481d0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:49:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0xc4000, 0xa0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:49:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1003) 01:49:49 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:49:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x281) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:49:49 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0x1}], 0x1}, 0x0) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:49:49 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:49:49 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{0x0}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:49:49 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0x1}], 0x1}, 0x0) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:49:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x300) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:49:49 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(0x0, 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:49:49 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:49:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x481e0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:49:50 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:49:50 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:49:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1004) 01:49:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) umount2(&(0x7f0000000080)='./file0\x00', 0xe) fallocate(r2, 0x8, 0x10000, 0x1000) 01:49:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x408) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:49:50 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x481f0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:49:50 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:49:50 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x48200) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:49:50 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:49:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x500) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:49:50 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x408) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:49:50 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x50000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 2477.996145] kmemleak: 43 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:50:11 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:50:11 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x408) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:50:11 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x5c07f) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:50:11 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0x1}], 0x1}, 0x0) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:50:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) fsync(r4) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:50:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x600) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:50:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1005) 01:50:11 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) umount2(&(0x7f0000000080)='./file0\x00', 0xe) fallocate(r2, 0x8, 0x10000, 0x1000) 01:50:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x700) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:50:11 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0x1}], 0x1}, 0x0) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:50:11 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0x1}], 0x1}, 0x0) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:50:11 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x80000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 2500.707985] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:50:35 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x700) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:50:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1008) 01:50:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x804) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:50:35 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) fsync(r4) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:50:35 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:50:35 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:50:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xa0000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:50:35 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x120) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0xa00, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f00000000c0)) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) truncate(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(r2, 0x8, 0x10000, 0x1000) 01:50:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x100000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:50:36 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:50:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x900) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:50:36 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1003) 01:50:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x1da688) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:50:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) [ 2524.369551] kmemleak: 28 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:50:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = syz_io_uring_complete(0x0) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000280), 0x400040, 0x0) io_submit(0x0, 0x3, &(0x7f00000003c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r2, &(0x7f0000000080)="bffb6128812befce143adde8a5ebc97ba0b3b7b3107673687dcc4b38dd7341217cacf9cd9a39c3be91c4c2af7dcac6b69e1b2605dd371b0afc1284639a8e3da1a666865a6f0983545467d25c3d4dfaadacafe4539620068b387665d9f5fa20a2d9d862dc494b5b51613e94d565bb08e130c6838277c80974de2a9c1b558b307f8722050967c5d02d2dca8d62d5bca2f2f3e76da19571e9556e98b55e5ac6f4404a93aef94b48132bda97b34952898543edb508ce", 0xb4, 0x7, 0x0, 0x3}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5, 0x3, r3, &(0x7f00000001c0)="d34b2b1378f3307a6efd3288cb1e367a3008947b8a63f4d566c965e538be3b2e63bdb6e1fba3ffc253a6a3372ae8155c", 0x30, 0x4, 0x0, 0x1}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x8, 0x2, r4, &(0x7f00000002c0)="a46ded300fc0c06a6c18a528150cb1e153a83131d536fb4a0b550608484f57e85941bdf8c939783f3f819547c63364e2385a194238e066594dcbd564bc176cd30cb5dc94a14432e795aa66095643eee403f237604192008d001e74913f2a4eac840877fbe83514d15316dd4cee300950579f6ac9133efd00f74b602c079b4cc569dfe573a06502080685213b2941f98eee8de41018fab65adcf685c999d9fe6f", 0xa0, 0xfffffffffffffffa, 0x0, 0x1, r1}]) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000400)={0x0, 0x2}) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x8800000) fsetxattr$security_ima(r1, &(0x7f0000000480), &(0x7f00000004c0)=@v1={0x2, "3fc940a4dbd28b857319da9a10a325"}, 0x10, 0x3) truncate(&(0x7f0000001580)='./file0\x00', 0x80) openat(r1, &(0x7f0000000440)='./file0\x00', 0x14000, 0x82) fallocate(r0, 0x73, 0x10000, 0x1000) 01:50:57 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:50:57 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:50:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x800000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:50:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xa00) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:50:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1010) 01:50:57 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:50:57 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x1, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000000080)='./file0\x00', 0x9) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f00000000c0)) fallocate(r2, 0x8, 0x10000, 0x1000) [ 2544.401400] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:51:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1011) 01:51:18 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, 0x0, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:51:18 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, 0x0, 0x0) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:51:18 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x505140, 0x9a) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x0, 0x10000, 0x1000) 01:51:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x820400) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:51:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xb00) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:51:18 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:51:18 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:51:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xc00) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:51:18 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x14000, 0x1000) 01:51:18 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, 0x0, 0x0) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:51:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(0xfffffffffffffffc, 0x0, 0x3, r1, 0x2) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:51:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x1000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:51:19 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:51:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xd00) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:51:19 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) (fail_nth: 1) 01:51:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x2000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:51:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1012) 01:51:19 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, 0x0, 0x0) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:51:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:51:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xd01) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 2554.086322] FAULT_INJECTION: forcing a failure. [ 2554.086322] name failslab, interval 1, probability 0, space 0, times 0 [ 2554.088781] CPU: 0 PID: 39531 Comm: syz-executor.7 Not tainted 5.10.123 #1 [ 2554.090295] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2554.092751] Call Trace: [ 2554.093336] dump_stack+0x107/0x163 [ 2554.094137] should_fail.cold+0x5/0xa [ 2554.094967] ? jbd2__journal_start+0x18c/0x880 [ 2554.095963] should_failslab+0x5/0x10 [ 2554.096792] kmem_cache_alloc+0x5b/0x350 [ 2554.097688] jbd2__journal_start+0x18c/0x880 [ 2554.098664] __ext4_journal_start_sb+0x210/0x420 [ 2554.099704] ext4_dirty_inode+0xbc/0x130 [ 2554.100583] ? ext4_setattr+0x22b0/0x22b0 [ 2554.101476] __mark_inode_dirty+0x492/0xf10 [ 2554.102441] generic_update_time+0x21c/0x370 [ 2554.103404] file_update_time+0x436/0x520 [ 2554.104306] ? evict_inodes+0x420/0x420 [ 2554.105168] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 2554.106258] file_modified+0x7d/0xa0 [ 2554.107061] ext4_fallocate+0x17b1/0x3c70 [ 2554.107954] ? lock_acquire+0x197/0x490 [ 2554.108813] ? __x64_sys_fallocate+0xcf/0x140 [ 2554.109803] ? ext4_ext_truncate+0x240/0x240 [ 2554.110771] ? ext4_ext_truncate+0x240/0x240 [ 2554.111718] vfs_fallocate+0x48f/0xcb0 [ 2554.112574] __x64_sys_fallocate+0xcf/0x140 [ 2554.113514] do_syscall_64+0x33/0x40 [ 2554.114351] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2554.115463] RIP: 0033:0x7f629e8a5b19 [ 2554.116276] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2554.120279] RSP: 002b:00007f629bdfa188 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 2554.121933] RAX: ffffffffffffffda RBX: 00007f629e9b9020 RCX: 00007f629e8a5b19 [ 2554.123467] RDX: 0000000000010000 RSI: 0000000000000008 RDI: 0000000000000005 [ 2554.125013] RBP: 00007f629bdfa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2554.126571] R10: 0000000000001000 R11: 0000000000000246 R12: 0000000000000001 [ 2554.128113] R13: 00007ffff91782ef R14: 00007f629bdfa300 R15: 0000000000022000 01:51:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x200f5ef) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:51:19 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:51:19 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140), 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:51:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xe00) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:51:19 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 1) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:51:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x2010000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 2554.440167] FAULT_INJECTION: forcing a failure. [ 2554.440167] name failslab, interval 1, probability 0, space 0, times 0 [ 2554.442897] CPU: 0 PID: 39783 Comm: syz-executor.6 Not tainted 5.10.123 #1 [ 2554.444411] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2554.446822] Call Trace: [ 2554.447382] dump_stack+0x107/0x163 [ 2554.448156] should_fail.cold+0x5/0xa [ 2554.448970] ? alloc_pipe_info+0x105/0x580 [ 2554.449892] should_failslab+0x5/0x10 [ 2554.450702] kmem_cache_alloc_trace+0x55/0x360 [ 2554.451691] alloc_pipe_info+0x105/0x580 [ 2554.452571] splice_direct_to_actor+0x770/0x980 [ 2554.453565] ? _cond_resched+0x12/0x80 [ 2554.454408] ? inode_security+0x107/0x130 [ 2554.455287] ? pipe_to_sendpage+0x380/0x380 [ 2554.456202] ? selinux_file_permission+0x36/0x510 [ 2554.457234] ? do_splice_to+0x160/0x160 [ 2554.458094] ? security_file_permission+0x24e/0x570 [ 2554.459166] do_splice_direct+0x1c4/0x290 [ 2554.460047] ? splice_direct_to_actor+0x980/0x980 [ 2554.461066] ? selinux_file_permission+0x36/0x510 [ 2554.462102] ? security_file_permission+0x24e/0x570 [ 2554.463174] vfs_copy_file_range+0x57b/0x10f0 [ 2554.464139] ? generic_file_rw_checks+0x230/0x230 [ 2554.465165] ? __fget_files+0x296/0x480 [ 2554.466044] __do_sys_copy_file_range+0x176/0x410 [ 2554.467076] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2554.468081] ? ksys_write+0x1a5/0x250 [ 2554.468900] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2554.469941] do_syscall_64+0x33/0x40 [ 2554.470731] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2554.471824] RIP: 0033:0x7f288225bb19 [ 2554.472615] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2554.476561] RSP: 002b:00007f287f7d1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2554.478196] RAX: ffffffffffffffda RBX: 00007f288236ef60 RCX: 00007f288225bb19 [ 2554.479713] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 2554.481234] RBP: 00007f287f7d11d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2554.482765] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2554.484284] R13: 00007ffff3a8541f R14: 00007f287f7d1300 R15: 0000000000022000 01:51:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1018) 01:51:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xf00) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:51:20 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:51:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) openat(r0, &(0x7f0000000080)='./file1\x00', 0x202000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0xfffffffffffffff7, 0x1000) [ 2566.431642] kmemleak: 48 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:51:41 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) (fail_nth: 2) 01:51:41 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 2) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:51:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x10000, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(r1, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000200)) copy_file_range(r2, 0x0, r0, 0x0, 0x200f5ef, 0x0) r3 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x8000000080) sendfile(r4, r0, &(0x7f0000000080)=0x6, 0x3) fallocate(r3, 0x8, 0x10000, 0x1000) 01:51:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1064) 01:51:41 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140), 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:51:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xf01) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:51:41 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, 0x0, 0x0) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:51:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x3000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 2575.987764] FAULT_INJECTION: forcing a failure. [ 2575.987764] name failslab, interval 1, probability 0, space 0, times 0 [ 2575.990274] CPU: 1 PID: 39929 Comm: syz-executor.6 Not tainted 5.10.123 #1 [ 2575.991777] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2575.994238] Call Trace: [ 2575.994819] dump_stack+0x107/0x163 [ 2575.995610] should_fail.cold+0x5/0xa [ 2575.996437] ? create_object.isra.0+0x3a/0xa20 [ 2575.997431] should_failslab+0x5/0x10 [ 2575.998280] kmem_cache_alloc+0x5b/0x350 [ 2575.999172] create_object.isra.0+0x3a/0xa20 [ 2576.000130] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2576.001245] kmem_cache_alloc_trace+0x151/0x360 [ 2576.002279] alloc_pipe_info+0x105/0x580 [ 2576.003173] splice_direct_to_actor+0x770/0x980 [ 2576.004186] ? _cond_resched+0x12/0x80 [ 2576.005027] ? inode_security+0x107/0x130 [ 2576.005922] ? pipe_to_sendpage+0x380/0x380 [ 2576.006871] ? selinux_file_permission+0x36/0x510 [ 2576.007917] ? do_splice_to+0x160/0x160 [ 2576.008773] ? security_file_permission+0x24e/0x570 [ 2576.009863] do_splice_direct+0x1c4/0x290 [ 2576.010774] ? splice_direct_to_actor+0x980/0x980 [ 2576.011812] ? selinux_file_permission+0x36/0x510 [ 2576.012857] ? security_file_permission+0x24e/0x570 [ 2576.013931] vfs_copy_file_range+0x57b/0x10f0 [ 2576.014907] ? generic_file_rw_checks+0x230/0x230 [ 2576.015940] ? __fget_files+0x296/0x480 [ 2576.016818] __do_sys_copy_file_range+0x176/0x410 [ 2576.017851] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2576.018893] ? ksys_write+0x1a5/0x250 [ 2576.019719] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2576.020764] do_syscall_64+0x33/0x40 [ 2576.021547] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2576.022651] RIP: 0033:0x7f288225bb19 [ 2576.023449] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2576.027411] RSP: 002b:00007f287f7d1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2576.029046] RAX: ffffffffffffffda RBX: 00007f288236ef60 RCX: 00007f288225bb19 [ 2576.030584] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 2576.032110] RBP: 00007f287f7d11d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2576.033639] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2576.035171] R13: 00007ffff3a8541f R14: 00007f287f7d1300 R15: 0000000000022000 [ 2576.064717] FAULT_INJECTION: forcing a failure. [ 2576.064717] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2576.068105] CPU: 1 PID: 39931 Comm: syz-executor.7 Not tainted 5.10.123 #1 [ 2576.069807] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2576.072589] Call Trace: [ 2576.073232] dump_stack+0x107/0x163 [ 2576.074131] should_fail.cold+0x5/0xa [ 2576.075067] _copy_from_user+0x2e/0x1b0 [ 2576.076045] kstrtouint_from_user+0xbd/0x220 [ 2576.077115] ? kstrtou8_from_user+0x200/0x200 [ 2576.078224] ? lock_acquire+0x197/0x490 [ 2576.079186] ? ksys_write+0x12d/0x250 [ 2576.080127] proc_fail_nth_write+0x78/0x220 [ 2576.081175] ? proc_task_getattr+0x1e0/0x1e0 [ 2576.082262] ? __fget_files+0x296/0x480 [ 2576.083235] ? proc_task_getattr+0x1e0/0x1e0 [ 2576.084293] vfs_write+0x29a/0xa20 [ 2576.085155] ksys_write+0x12d/0x250 [ 2576.086047] ? __ia32_sys_read+0xb0/0xb0 [ 2576.087034] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2576.088201] do_syscall_64+0x33/0x40 [ 2576.089103] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2576.090350] RIP: 0033:0x7f629e8585ff [ 2576.091259] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 2576.095710] RSP: 002b:00007f629be1b170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 2576.097541] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f629e8585ff [ 2576.099260] RDX: 0000000000000001 RSI: 00007f629be1b1e0 RDI: 0000000000000007 [ 2576.100968] RBP: 00007f629be1b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2576.102697] R10: 0000000000001000 R11: 0000000000000293 R12: 0000000000000001 [ 2576.104398] R13: 00007ffff91782ef R14: 00007f629be1b300 R15: 0000000000022000 01:51:41 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) r2 = openat(r1, &(0x7f0000000140)='./file0\x00', 0x101542, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x200f5ef, 0x0) r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x6742630a68f69fd4, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x0) r6 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$F2FS_IOC_RESIZE_FS(r0, 0x4008f510, &(0x7f0000000180)) fallocate(r6, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r4, 0x8, 0x10000, 0x1000) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x4000, 0x6a) 01:51:41 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, 0x0, 0x0) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:51:41 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140), 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:51:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x4000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 2590.510472] kmemleak: 28 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:52:12 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:52:12 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0xffffffffffffffff, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:52:12 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 3) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:52:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x28) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:52:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x1200) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:52:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x5000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:52:12 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, 0x0, 0x0) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:52:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1100) [ 2607.157076] FAULT_INJECTION: forcing a failure. [ 2607.157076] name failslab, interval 1, probability 0, space 0, times 0 [ 2607.159872] CPU: 0 PID: 40265 Comm: syz-executor.6 Not tainted 5.10.123 #1 [ 2607.161379] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2607.163843] Call Trace: [ 2607.164409] dump_stack+0x107/0x163 [ 2607.165182] should_fail.cold+0x5/0xa [ 2607.165993] ? alloc_pipe_info+0x1e0/0x580 [ 2607.166903] should_failslab+0x5/0x10 [ 2607.167706] __kmalloc+0x72/0x3e0 [ 2607.168444] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2607.169526] alloc_pipe_info+0x1e0/0x580 [ 2607.170395] splice_direct_to_actor+0x770/0x980 [ 2607.171488] ? _cond_resched+0x12/0x80 [ 2607.172314] ? inode_security+0x107/0x130 [ 2607.173188] ? pipe_to_sendpage+0x380/0x380 [ 2607.174098] ? selinux_file_permission+0x36/0x510 [ 2607.175130] ? do_splice_to+0x160/0x160 [ 2607.175968] ? security_file_permission+0x24e/0x570 [ 2607.177032] do_splice_direct+0x1c4/0x290 [ 2607.177914] ? splice_direct_to_actor+0x980/0x980 [ 2607.178940] ? selinux_file_permission+0x36/0x510 [ 2607.179960] ? security_file_permission+0x24e/0x570 [ 2607.181024] vfs_copy_file_range+0x57b/0x10f0 [ 2607.181993] ? generic_file_rw_checks+0x230/0x230 [ 2607.183053] ? __fget_files+0x296/0x480 [ 2607.183916] __do_sys_copy_file_range+0x176/0x410 [ 2607.184937] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2607.185929] ? ksys_write+0x1a5/0x250 [ 2607.186756] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2607.187782] do_syscall_64+0x33/0x40 [ 2607.188566] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2607.189651] RIP: 0033:0x7f288225bb19 [ 2607.190439] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2607.194364] RSP: 002b:00007f287f7d1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2607.195980] RAX: ffffffffffffffda RBX: 00007f288236ef60 RCX: 00007f288225bb19 [ 2607.197491] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 2607.199003] RBP: 00007f287f7d11d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2607.200506] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2607.202008] R13: 00007ffff3a8541f R14: 00007f287f7d1300 R15: 0000000000022000 [ 2621.877398] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:52:37 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x3, 0x10000, 0x1000) 01:52:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r0, 0x0, 0xffffffffffffffff, 0x0, 0x200f5ef, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(r3, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r3, 0x82307201, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) fallocate(r1, 0x8, 0x10000, 0x1000) 01:52:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x1800) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:52:37 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0xffffffffffffffff, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:52:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x6000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:52:37 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:52:37 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140), 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:52:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x372d) [ 2631.701440] FAULT_INJECTION: forcing a failure. [ 2631.701440] name failslab, interval 1, probability 0, space 0, times 0 [ 2631.704260] CPU: 1 PID: 40499 Comm: syz-executor.6 Not tainted 5.10.123 #1 [ 2631.705867] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2631.708763] Call Trace: [ 2631.709475] dump_stack+0x107/0x163 [ 2631.710318] should_fail.cold+0x5/0xa [ 2631.711219] ? create_object.isra.0+0x3a/0xa20 [ 2631.712273] should_failslab+0x5/0x10 [ 2631.713150] kmem_cache_alloc+0x5b/0x350 [ 2631.714245] create_object.isra.0+0x3a/0xa20 [ 2631.715355] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2631.716625] __kmalloc+0x16e/0x3e0 [ 2631.717456] alloc_pipe_info+0x1e0/0x580 [ 2631.718471] splice_direct_to_actor+0x770/0x980 [ 2631.719699] ? _cond_resched+0x12/0x80 [ 2631.720706] ? inode_security+0x107/0x130 [ 2631.721665] ? pipe_to_sendpage+0x380/0x380 [ 2631.722663] ? selinux_file_permission+0x36/0x510 [ 2631.723792] ? do_splice_to+0x160/0x160 [ 2631.724717] ? security_file_permission+0x24e/0x570 [ 2631.725902] do_splice_direct+0x1c4/0x290 [ 2631.727008] ? splice_direct_to_actor+0x980/0x980 [ 2631.728301] ? selinux_file_permission+0x36/0x510 [ 2631.729450] ? security_file_permission+0x24e/0x570 [ 2631.730744] vfs_copy_file_range+0x57b/0x10f0 [ 2631.731894] ? generic_file_rw_checks+0x230/0x230 [ 2631.733122] ? __fget_files+0x296/0x480 [ 2631.734163] __do_sys_copy_file_range+0x176/0x410 [ 2631.735324] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2631.736450] ? ksys_write+0x1a5/0x250 [ 2631.737371] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2631.738625] do_syscall_64+0x33/0x40 [ 2631.739669] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2631.740888] RIP: 0033:0x7f288225bb19 [ 2631.741780] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2631.746338] RSP: 002b:00007f287f7d1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2631.748188] RAX: ffffffffffffffda RBX: 00007f288236ef60 RCX: 00007f288225bb19 [ 2631.749918] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 2631.751901] RBP: 00007f287f7d11d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2631.753644] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2631.755399] R13: 00007ffff3a8541f R14: 00007f287f7d1300 R15: 0000000000022000 01:52:37 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140), 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:52:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(r1, 0xffffffffffffffff, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5eb, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:52:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x188f) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:52:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x7000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:52:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x2000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:52:37 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140), 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:52:37 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0xffffffffffffffff, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:52:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x373d) 01:52:37 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x4, 0x10000, 0x1000) 01:52:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000580), 0x2) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x983814bc437cbd7a) fallocate(r3, 0x0, 0x80000000, 0x87ffffd) r4 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(r4, &(0x7f00000000c0)='./file0\x00', 0x0) execveat(r4, &(0x7f0000000080)='./file1\x00', &(0x7f0000000340)=[&(0x7f00000000c0)='!+\xfb\x00', &(0x7f0000000100)='![\x00', &(0x7f0000000180)='$}\'-]', &(0x7f00000001c0)=')#%):\xcf}.\x00', &(0x7f0000000200)='*&/]\x00', &(0x7f0000000280)='[--\x00', &(0x7f00000002c0)='}\x00', &(0x7f0000000300)='\'[\x00'], &(0x7f0000000540)=[&(0x7f0000000380)='*\x00', &(0x7f00000003c0)='}\x00', &(0x7f0000000400)='\x00', &(0x7f0000000440)='-\x00', &(0x7f0000000480)=')\x00', &(0x7f00000004c0)='%\x00', &(0x7f0000000500)='\\E!\x00'], 0x3500) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:52:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x8000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 2647.139262] kmemleak: 26 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:53:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x19b000, 0x22) 01:53:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x3000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:53:02 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0xf, 0x10000, 0x1000) 01:53:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0xff3f) 01:53:02 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x8010000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:53:02 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0xffffffffffffffff, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:53:02 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, 0x0, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:53:02 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 5) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 2656.764935] FAULT_INJECTION: forcing a failure. [ 2656.764935] name failslab, interval 1, probability 0, space 0, times 0 [ 2656.767502] CPU: 0 PID: 41068 Comm: syz-executor.6 Not tainted 5.10.123 #1 [ 2656.768983] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2656.771446] Call Trace: [ 2656.772020] dump_stack+0x107/0x163 [ 2656.772813] should_fail.cold+0x5/0xa [ 2656.773638] ? iter_file_splice_write+0x16d/0xbe0 [ 2656.774684] should_failslab+0x5/0x10 [ 2656.775508] __kmalloc+0x72/0x3e0 [ 2656.776266] iter_file_splice_write+0x16d/0xbe0 [ 2656.777265] ? atime_needs_update+0x5f0/0x5f0 [ 2656.778240] ? generic_splice_sendpage+0x140/0x140 [ 2656.779363] ? pipe_to_user+0x170/0x170 [ 2656.780218] ? _cond_resched+0x12/0x80 [ 2656.781060] ? avc_policy_seqno+0x9/0x70 [ 2656.781931] ? selinux_file_permission+0x36/0x510 [ 2656.782978] ? lockdep_init_map_type+0x2c3/0x770 [ 2656.784010] ? generic_splice_sendpage+0x140/0x140 [ 2656.785066] direct_splice_actor+0x10f/0x170 [ 2656.786026] splice_direct_to_actor+0x387/0x980 [ 2656.787044] ? pipe_to_sendpage+0x380/0x380 [ 2656.788023] ? do_splice_to+0x160/0x160 [ 2656.788884] ? security_file_permission+0x24e/0x570 [ 2656.789975] do_splice_direct+0x1c4/0x290 [ 2656.790880] ? splice_direct_to_actor+0x980/0x980 [ 2656.791942] ? selinux_file_permission+0x36/0x510 [ 2656.793018] ? security_file_permission+0x24e/0x570 [ 2656.794116] vfs_copy_file_range+0x57b/0x10f0 [ 2656.795133] ? generic_file_rw_checks+0x230/0x230 [ 2656.796181] ? __fget_files+0x296/0x480 [ 2656.797090] __do_sys_copy_file_range+0x176/0x410 [ 2656.798137] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2656.799197] ? ksys_write+0x1a5/0x250 [ 2656.800035] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2656.801073] do_syscall_64+0x33/0x40 [ 2656.801900] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2656.802999] RIP: 0033:0x7f288225bb19 [ 2656.803814] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2656.807923] RSP: 002b:00007f287f7d1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2656.809568] RAX: ffffffffffffffda RBX: 00007f288236ef60 RCX: 00007f288225bb19 [ 2656.811104] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 2656.812655] RBP: 00007f287f7d11d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2656.814199] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2656.815751] R13: 00007ffff3a8541f R14: 00007f287f7d1300 R15: 0000000000022000 01:53:02 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, 0x0, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:53:02 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x8040000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:53:02 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 6) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 2657.014071] FAULT_INJECTION: forcing a failure. [ 2657.014071] name failslab, interval 1, probability 0, space 0, times 0 [ 2657.016789] CPU: 1 PID: 41182 Comm: syz-executor.6 Not tainted 5.10.123 #1 [ 2657.018260] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2657.020696] Call Trace: [ 2657.021254] dump_stack+0x107/0x163 [ 2657.022045] should_fail.cold+0x5/0xa [ 2657.022866] ? create_object.isra.0+0x3a/0xa20 [ 2657.023861] should_failslab+0x5/0x10 [ 2657.024686] kmem_cache_alloc+0x5b/0x350 [ 2657.025560] ? igrab+0xb0/0xb0 [ 2657.026253] create_object.isra.0+0x3a/0xa20 [ 2657.027202] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2657.028292] __kmalloc+0x16e/0x3e0 [ 2657.029055] iter_file_splice_write+0x16d/0xbe0 [ 2657.030040] ? atime_needs_update+0x5f0/0x5f0 [ 2657.031012] ? generic_splice_sendpage+0x140/0x140 [ 2657.032077] ? pipe_to_user+0x170/0x170 [ 2657.032925] ? _cond_resched+0x59/0x80 [ 2657.033765] ? avc_policy_seqno+0x9/0x70 [ 2657.034628] ? selinux_file_permission+0x36/0x510 [ 2657.035669] ? lockdep_init_map_type+0x2c3/0x770 [ 2657.036681] ? generic_splice_sendpage+0x140/0x140 [ 2657.037735] direct_splice_actor+0x10f/0x170 [ 2657.038676] splice_direct_to_actor+0x387/0x980 [ 2657.039688] ? pipe_to_sendpage+0x380/0x380 [ 2657.040611] ? do_splice_to+0x160/0x160 [ 2657.041456] ? security_file_permission+0x24e/0x570 [ 2657.042531] do_splice_direct+0x1c4/0x290 [ 2657.043427] ? splice_direct_to_actor+0x980/0x980 [ 2657.044452] ? selinux_file_permission+0x36/0x510 [ 2657.045483] ? security_file_permission+0x24e/0x570 [ 2657.046559] vfs_copy_file_range+0x57b/0x10f0 [ 2657.047529] ? generic_file_rw_checks+0x230/0x230 [ 2657.048560] ? __fget_files+0x296/0x480 [ 2657.049430] __do_sys_copy_file_range+0x176/0x410 [ 2657.050461] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2657.051479] ? ksys_write+0x1a5/0x250 [ 2657.052301] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2657.053330] do_syscall_64+0x33/0x40 [ 2657.054123] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2657.055224] RIP: 0033:0x7f288225bb19 [ 2657.056024] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2657.059978] RSP: 002b:00007f287f7d1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2657.061604] RAX: ffffffffffffffda RBX: 00007f288236ef60 RCX: 00007f288225bb19 [ 2657.063133] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 2657.064654] RBP: 00007f287f7d11d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2657.066179] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2657.067719] R13: 00007ffff3a8541f R14: 00007f287f7d1300 R15: 0000000000022000 01:53:02 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0xffffffffffffffff, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:53:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x3f00) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 2671.702610] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:53:25 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0xffffffffffffffff, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:53:25 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 7) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:53:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x8800000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:53:25 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x10, 0x10000, 0x1000) 01:53:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:53:25 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, 0x0, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:53:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(r3, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f0000000280)={0x0, 0x0, 0x2, 0x0, '\x00', [{0x10001, 0x7, 0x0, 0x10001, 0xe53, 0x81}, {0x0, 0x0, 0x9, 0x1, 0x8000, 0x4}], ['\x00', '\x00']}) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) readahead(r1, 0x8, 0x9) fallocate(r4, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:53:25 executing program 1: getsockname$netlink(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0xc) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f0000000180)) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) [ 2679.872532] FAULT_INJECTION: forcing a failure. [ 2679.872532] name failslab, interval 1, probability 0, space 0, times 0 [ 2679.875285] CPU: 0 PID: 41416 Comm: syz-executor.6 Not tainted 5.10.123 #1 [ 2679.876983] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2679.879481] Call Trace: [ 2679.880073] dump_stack+0x107/0x163 [ 2679.880884] should_fail.cold+0x5/0xa [ 2679.881739] ? iter_file_splice_write+0x16d/0xbe0 [ 2679.882799] should_failslab+0x5/0x10 [ 2679.883703] __kmalloc+0x72/0x3e0 [ 2679.884479] iter_file_splice_write+0x16d/0xbe0 [ 2679.885491] ? atime_needs_update+0x5f0/0x5f0 [ 2679.886461] ? generic_splice_sendpage+0x140/0x140 [ 2679.887531] ? pipe_to_user+0x170/0x170 [ 2679.888390] ? _cond_resched+0x12/0x80 [ 2679.889258] ? avc_policy_seqno+0x9/0x70 [ 2679.890121] ? selinux_file_permission+0x36/0x510 [ 2679.891165] ? lockdep_init_map_type+0x2c3/0x770 [ 2679.892204] ? generic_splice_sendpage+0x140/0x140 [ 2679.893264] direct_splice_actor+0x10f/0x170 [ 2679.894212] splice_direct_to_actor+0x387/0x980 [ 2679.895220] ? pipe_to_sendpage+0x380/0x380 [ 2679.896169] ? do_splice_to+0x160/0x160 [ 2679.897024] ? security_file_permission+0x24e/0x570 [ 2679.898122] do_splice_direct+0x1c4/0x290 [ 2679.899022] ? splice_direct_to_actor+0x980/0x980 [ 2679.900063] ? selinux_file_permission+0x36/0x510 [ 2679.901101] ? security_file_permission+0x24e/0x570 [ 2679.902177] vfs_copy_file_range+0x57b/0x10f0 [ 2679.903161] ? generic_file_rw_checks+0x230/0x230 [ 2679.904215] ? __fget_files+0x296/0x480 [ 2679.905101] __do_sys_copy_file_range+0x176/0x410 [ 2679.906145] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2679.907158] ? ksys_write+0x1a5/0x250 [ 2679.908018] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2679.909073] do_syscall_64+0x33/0x40 [ 2679.909868] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2679.910981] RIP: 0033:0x7f288225bb19 [ 2679.911796] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2679.915780] RSP: 002b:00007f287f7d1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2679.917437] RAX: ffffffffffffffda RBX: 00007f288236ef60 RCX: 00007f288225bb19 [ 2679.918994] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 2679.920864] RBP: 00007f287f7d11d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2679.922422] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2679.923980] R13: 00007ffff3a8541f R14: 00007f287f7d1300 R15: 0000000000022000 01:53:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x5000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:53:25 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 8) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:53:25 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, 0x0, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:53:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x9000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:53:25 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) [ 2680.306508] FAULT_INJECTION: forcing a failure. [ 2680.306508] name failslab, interval 1, probability 0, space 0, times 0 [ 2680.309000] CPU: 1 PID: 41536 Comm: syz-executor.6 Not tainted 5.10.123 #1 [ 2680.310469] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2680.312845] Call Trace: [ 2680.313428] dump_stack+0x107/0x163 [ 2680.314189] should_fail.cold+0x5/0xa [ 2680.315008] ? create_object.isra.0+0x3a/0xa20 [ 2680.315997] should_failslab+0x5/0x10 [ 2680.316792] kmem_cache_alloc+0x5b/0x350 [ 2680.317709] create_object.isra.0+0x3a/0xa20 [ 2680.318626] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2680.319745] kmem_cache_alloc+0x159/0x350 [ 2680.320632] jbd2__journal_start+0x18c/0x880 [ 2680.321631] __ext4_journal_start_sb+0x210/0x420 [ 2680.322624] ext4_dirty_inode+0xbc/0x130 [ 2680.323506] ? ext4_setattr+0x22b0/0x22b0 [ 2680.324360] __mark_inode_dirty+0x492/0xf10 [ 2680.325281] ? security_inode_need_killpriv+0x79/0xa0 [ 2680.326350] generic_update_time+0x21c/0x370 [ 2680.327312] file_update_time+0x436/0x520 [ 2680.328184] ? evict_inodes+0x420/0x420 [ 2680.329034] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 2680.330084] file_modified+0x7d/0xa0 [ 2680.330916] ext4_file_write_iter+0x8f5/0x1890 [ 2680.331888] ? stack_trace_consume_entry+0x160/0x160 [ 2680.333024] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2680.333970] ? kasan_save_stack+0x32/0x40 [ 2680.334891] ? kasan_save_stack+0x1b/0x40 [ 2680.335764] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2680.336879] ? iter_file_splice_write+0x16d/0xbe0 [ 2680.337881] ? direct_splice_actor+0x10f/0x170 [ 2680.338901] ? splice_direct_to_actor+0x387/0x980 [ 2680.339929] ? do_splice_direct+0x1c4/0x290 [ 2680.340864] ? vfs_copy_file_range+0x57b/0x10f0 [ 2680.341844] ? __do_sys_copy_file_range+0x176/0x410 [ 2680.342950] do_iter_readv_writev+0x476/0x750 [ 2680.343908] ? new_sync_write+0x660/0x660 [ 2680.344817] ? selinux_file_permission+0x36/0x510 [ 2680.345860] do_iter_write+0x18d/0x670 [ 2680.346700] vfs_iter_write+0x70/0xa0 [ 2680.347523] iter_file_splice_write+0x71d/0xbe0 [ 2680.348532] ? generic_splice_sendpage+0x140/0x140 [ 2680.349588] ? avc_policy_seqno+0x9/0x70 [ 2680.350431] ? selinux_file_permission+0x36/0x510 [ 2680.351458] ? lockdep_init_map_type+0x2c3/0x770 01:53:25 executing program 5: statx(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x100, 0x1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = getpid() ioprio_get$pid(0x3, r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) msgctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x1, 0xee01, r0, 0x0, 0x0, 0xb0, 0xffe1}, 0x0, 0x0, 0x9b, 0x4, 0x9, 0x3, 0x5, 0x0, 0xffff, 0x1, r1, r2}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101142, 0x0) pidfd_getfd(0xffffffffffffffff, r5, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) pidfd_getfd(0xffffffffffffffff, r3, 0x0) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x67, 0xc0, 0x20, 0x4, 0x0, 0x3, 0xc0000, 0x5, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x3}, 0x800, 0x20, 0x9, 0x188945b4ba41c684, 0x1, 0x8, 0x7, 0x0, 0x22c, 0x0, 0x55d9}, r2, 0xb, r4, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r6, 0x0, r3, 0x0, 0x200f5ef, 0x0) r7 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r8 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r8, 0x0, 0x0, 0x8800000) dup(r7) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r7, 0x8, 0x10000, 0x1000) [ 2680.352467] ? generic_splice_sendpage+0x140/0x140 [ 2680.353772] direct_splice_actor+0x10f/0x170 [ 2680.354692] splice_direct_to_actor+0x387/0x980 [ 2680.355690] ? pipe_to_sendpage+0x380/0x380 [ 2680.356597] ? do_splice_to+0x160/0x160 [ 2680.357434] ? security_file_permission+0x24e/0x570 [ 2680.358486] do_splice_direct+0x1c4/0x290 [ 2680.359357] ? splice_direct_to_actor+0x980/0x980 [ 2680.360380] ? selinux_file_permission+0x36/0x510 [ 2680.361400] ? security_file_permission+0x24e/0x570 [ 2680.362451] vfs_copy_file_range+0x57b/0x10f0 [ 2680.363406] ? generic_file_rw_checks+0x230/0x230 [ 2680.364438] ? __fget_files+0x296/0x480 [ 2680.365303] __do_sys_copy_file_range+0x176/0x410 [ 2680.366327] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2680.367328] ? ksys_write+0x1a5/0x250 [ 2680.368176] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2680.369199] do_syscall_64+0x33/0x40 [ 2680.369988] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2680.371083] RIP: 0033:0x7f288225bb19 [ 2680.371890] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2680.375902] RSP: 002b:00007f287f7d1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2680.377534] RAX: ffffffffffffffda RBX: 00007f288236ef60 RCX: 00007f288225bb19 [ 2680.379060] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 2680.380585] RBP: 00007f287f7d11d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2680.382105] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2680.383626] R13: 00007ffff3a8541f R14: 00007f287f7d1300 R15: 0000000000022000 01:53:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xa000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:53:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x6000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:53:26 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, 0x0, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:53:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/166, 0xa6) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x4043c0, 0x0) ioctl$FIOCLEX(r4, 0x5451) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) 01:53:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x6400) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:53:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xa010000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:53:26 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, 0x0, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:53:26 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10002, 0x1000) [ 2696.579878] kmemleak: 34 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:53:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f00000000c0)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:53:50 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:53:50 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10004, 0x1000) 01:53:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40000, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) 01:53:50 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xb000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:53:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x7681) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:53:50 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:53:50 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 9) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 2704.881387] FAULT_INJECTION: forcing a failure. [ 2704.881387] name failslab, interval 1, probability 0, space 0, times 0 [ 2704.884254] CPU: 1 PID: 41904 Comm: syz-executor.6 Not tainted 5.10.123 #1 [ 2704.885934] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2704.888648] Call Trace: [ 2704.889282] dump_stack+0x107/0x163 [ 2704.890151] should_fail.cold+0x5/0xa [ 2704.891074] ? jbd2__journal_start+0x18c/0x880 [ 2704.892181] should_failslab+0x5/0x10 [ 2704.893093] kmem_cache_alloc+0x5b/0x350 [ 2704.894070] jbd2__journal_start+0x18c/0x880 [ 2704.895147] __ext4_journal_start_sb+0x210/0x420 [ 2704.896317] ext4_file_write_iter+0xd79/0x1890 [ 2704.897415] ? stack_trace_consume_entry+0x160/0x160 [ 2704.898643] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2704.899739] ? kasan_save_stack+0x32/0x40 [ 2704.900744] ? kasan_save_stack+0x1b/0x40 [ 2704.901743] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2704.902961] ? iter_file_splice_write+0x16d/0xbe0 [ 2704.904127] ? direct_splice_actor+0x10f/0x170 [ 2704.905219] ? splice_direct_to_actor+0x387/0x980 [ 2704.906368] ? do_splice_direct+0x1c4/0x290 [ 2704.907390] ? vfs_copy_file_range+0x57b/0x10f0 [ 2704.908531] ? __do_sys_copy_file_range+0x176/0x410 [ 2704.909740] do_iter_readv_writev+0x476/0x750 [ 2704.910826] ? new_sync_write+0x660/0x660 [ 2704.911843] ? selinux_file_permission+0x36/0x510 [ 2704.913012] do_iter_write+0x18d/0x670 [ 2704.913955] vfs_iter_write+0x70/0xa0 [ 2704.914874] iter_file_splice_write+0x71d/0xbe0 [ 2704.916020] ? generic_splice_sendpage+0x140/0x140 [ 2704.917204] ? avc_policy_seqno+0x9/0x70 [ 2704.918168] ? selinux_file_permission+0x36/0x510 [ 2704.919306] ? lockdep_init_map_type+0x2c3/0x770 [ 2704.920451] ? generic_splice_sendpage+0x140/0x140 [ 2704.921612] direct_splice_actor+0x10f/0x170 [ 2704.922674] splice_direct_to_actor+0x387/0x980 [ 2704.923790] ? pipe_to_sendpage+0x380/0x380 [ 2704.924828] ? do_splice_to+0x160/0x160 [ 2704.925769] ? security_file_permission+0x24e/0x570 [ 2704.926977] do_splice_direct+0x1c4/0x290 [ 2704.927978] ? splice_direct_to_actor+0x980/0x980 [ 2704.929125] ? selinux_file_permission+0x36/0x510 [ 2704.930289] ? security_file_permission+0x24e/0x570 [ 2704.931494] vfs_copy_file_range+0x57b/0x10f0 [ 2704.932595] ? generic_file_rw_checks+0x230/0x230 [ 2704.933745] ? __fget_files+0x296/0x480 [ 2704.934717] __do_sys_copy_file_range+0x176/0x410 [ 2704.935881] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2704.937012] ? ksys_write+0x1a5/0x250 [ 2704.937932] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2704.939088] do_syscall_64+0x33/0x40 [ 2704.940115] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2704.941472] RIP: 0033:0x7f288225bb19 [ 2704.942530] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2704.947317] RSP: 002b:00007f287f7d1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2704.949361] RAX: ffffffffffffffda RBX: 00007f288236ef60 RCX: 00007f288225bb19 [ 2704.951180] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 2704.952888] RBP: 00007f287f7d11d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2704.954667] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2704.956454] R13: 00007ffff3a8541f R14: 00007f287f7d1300 R15: 0000000000022000 01:53:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x3ff, 0x7, &(0x7f00000014c0)=[{&(0x7f0000000180)="0fd03355bbaf872c5b39e7ec830d771c853ffc0753beea5d682e078b82cec8445e172ab6fdbc43eee3fe10cb87c3fb1f327b1e0d2f34db35f7fbaeed39a3da82d4ac6f73cf", 0x45, 0x7}, {&(0x7f0000000100)="84d12fc0c63a981586c50b5fb08ac530bb63de266bf38f8e930e0b382da94ec79ad40838a43e9827d1abdb8dd78c51669a9ccf4e06c9ea7a7ae2231216", 0x3d, 0x401}, {&(0x7f0000000280)="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", 0x1000, 0x6}, {&(0x7f0000000200), 0x0, 0x2}, {&(0x7f0000001280)="87859a1ae0a39079912bfeb6073fb4cffd7298616b91603cee51583aeef723ef4fc2b10f47d6878d7a84acef270f578f82ccfc5cd26c193ef54859e975d52080ffc43f59ab48050322f5fa386bc2531d93d46b8182d535d56a8e1dd7a4a050e6c61373607e46b6ec7b81a07212f8646acc22a7bbca0874a4", 0x78, 0x7}, {&(0x7f0000001300)="1a5f495ae7b218693a2689d031b9bff65b573a95b4af45fe02c04fca132e52240416a1a268ff5ac17f8f8500f2fb29590e142a29e23d6d2804c512c0d731101696c506f84f7f3c2d19c3e62767526bfb9f8a7ac8d73a138eb92ea13e6997b09db298c923dc334bcabaf1a8df90943423f229d3cfbbad2a6073994126ba46abcdd112a7e883ed31307abe6a87f2c821a34a4a088b65f0fe189ef1f00901b8ac3c467567302363f24a26edf7d8522bc417b0e82a222ac072ec7204983f99aa067dfeb8fd25fd", 0xc5, 0x4}, {&(0x7f0000001400)="d415f6323a80b6075f83e3642e2f28d24fe71daf08ea897bcb1ab55e2bfa5a9fb83a3c1294f8b16fc21dece56c65bdb017d98f4ad3bac875707701bf2fa3a79e34b1d42850b8c6a70d49ec575bb18774dd39f39295abaab26ed5fab353711bd921658afae4714ea01073361fc871457b4e1a6503eccedb837b03c4e8af69345edf7abd9fb1972b960f74284929ee085e81d13a00a0605cba2233f5d80a1f352e7fbd47eebb8a", 0xa6, 0x7}], 0x1000000, &(0x7f0000001800)=ANY=[@ANYBLOB="646d6f64653d3078303030303030303030303030303030342c646d6f64653d3078303030303030303030303030307676662c6673636f6e746578743d757365725f752c736d61636b6673666c6f6f723d5e2c61707072616973655f74798e653d696d617369672c657569643ee24b045d2df4c017c72faed176fc505d9579a4f7bfd8447d08990adc51ec3b2cd8e9ce14d44fe5bc690a4939c859d150f3b9112ca6ca7f456166900dc6823e7d458c4fd39a425b881562c9a622a0a4482965", @ANYRESDEC=0xee01, @ANYBLOB=',rootcontext=uncined_u,\x00']) openat(r4, &(0x7f0000001640)='./file0\x00', 0x101280, 0x4) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) r5 = syz_open_dev$vcsa(&(0x7f0000000200), 0xfffffffffffff035, 0x240000) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f00000016c0), r3) sendmsg$SEG6_CMD_SET_TUNSRC(r5, &(0x7f00000017c0)={&(0x7f0000001680)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001780)={&(0x7f0000001700)={0x58, r6, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x6c, 0x8, 0x5]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x3e0}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x24048890) 01:53:50 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:53:50 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xc000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:53:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x7f00) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:53:50 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) (fail_nth: 10) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 2718.500880] kmemleak: 44 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:54:12 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:54:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101142, 0x0) pidfd_getfd(0xffffffffffffffff, r3, 0x0) write$snapshot(r3, &(0x7f0000000080)="d4360a0a71d6425800ae100d41e0c1b0a87e581482ab945ec76bde886ebf523be41163136faec3728872721336ae00b396928690437a213d087ed94468afbe6c919a8f2b32d33f72d394929df85cad22d26e647df2f7f9bbd226e7cc", 0x5c) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) 01:54:12 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:54:12 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10005, 0x1000) 01:54:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xc010000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:54:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) r4 = dup(r3) fallocate(r4, 0x1, 0x9, 0x10000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:54:12 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:54:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x8008) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:54:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xd000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:54:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x80b7) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:54:13 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:54:13 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xe000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:54:13 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) [ 2742.657660] kmemleak: 28 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:54:36 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x2) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:54:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x8102) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:54:36 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:54:36 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:54:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) dup(r0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) 01:54:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xf000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:54:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:54:36 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10008, 0x1000) 01:54:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x10000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:54:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x8176) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:54:36 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x3) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:54:36 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:54:36 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, 0x0, 0x0, 0xcd00, 0x0, 0x0) 01:54:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x12000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:54:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0xa9, 0x20, 0x1, 0xff, 0x0, 0x7fff, 0x80004, 0x6, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x5, @perf_bp={&(0x7f0000000080), 0x8}, 0x82200, 0x2, 0x5, 0x6, 0x100000001, 0x2, 0x4, 0x0, 0x800, 0x0, 0x8000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xa) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000280)={0x59e, {{0xa, 0x4e21, 0x183, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x81}}, 0x0, 0xa, [{{0xa, 0x4e21, 0x40, @loopback, 0xffff09e7}}, {{0xa, 0x4e20, 0x1c0, @mcast1, 0x3}}, {{0xa, 0x4e22, 0x1000, @loopback, 0x400}}, {{0xa, 0x4e21, 0x727a, @local, 0x11}}, {{0xa, 0x4e20, 0x1, @private0, 0x1b}}, {{0xa, 0x4e24, 0x4, @ipv4={'\x00', '\xff\xff', @private=0xa010101}, 0x5a0}}, {{0xa, 0x4e21, 0x6, @private2, 0x800}}, {{0xa, 0x4e21, 0x6, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}}, {{0xa, 0x4e21, 0xff, @rand_addr=' \x01\x00', 0x4}}, {{0xa, 0x4e20, 0x7fff, @mcast2}}]}, 0x590) fallocate(r2, 0x26, 0x9, 0x3) fallocate(r2, 0x8, 0x10000, 0x1000) 01:54:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x8f18) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 2764.876651] kmemleak: 28 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:54:58 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:54:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r2) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000180)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_TID_CONFIG(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={0x34, r6, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xa0}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5, 0xc, 0x2}]}]}]}, 0x34}}, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x38, r4, 0x100, 0x70bd25, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r7}, @val={0xc, 0x99, {0x7, 0x6c}}}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x3}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x9d4}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 01:54:58 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, 0x0, 0x0, 0xcd00, 0x0, 0x0) 01:54:58 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:54:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(r4, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000280)={0x0, ""/256, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, &(0x7f0000000480)={{r4}, r5, 0xa, @unused=[0x0, 0x5, 0xc0e, 0x80000001], @subvolid=0x6}) fallocate(r2, 0x8, 0x1, 0x1000) 01:54:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x16810000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:54:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x90b7) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:54:58 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10010, 0x1000) 01:54:58 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x5) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:54:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xb780) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:54:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x20000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:54:58 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, 0x0, 0x0, 0xcd00, 0x0, 0x0) 01:54:58 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, 0x0, 0x0, 0xcd00, 0x0, 0x0) 01:54:58 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x6) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:54:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x3f000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:54:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xb790) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:54:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000080)) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000001780)={{0xffffffffffffffff, 0x1, 0x5, 0x0, 0x10000}, 0x1, 0x9f}) statx(r0, &(0x7f0000000180)='./file0\x00', 0x400, 0x40, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$security_capability(r2, &(0x7f00000000c0), &(0x7f00000001c0)=@v3={0x3000000, [{0x1, 0x8}, {0x2, 0x5}], r3}, 0x18, 0x6) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(r4, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000280)={0x0, 0x9ca, 0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r4, 0xd000941e, &(0x7f0000000680)={r5, "7494b698277adfb7b5051ed635b58b2e"}) r6 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) 01:54:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x40000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:54:58 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10011, 0x1000) 01:54:58 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:54:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x1a9) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:54:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xda01) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:54:58 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x7) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 2786.665308] kmemleak: 47 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:55:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x40b40000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:55:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x9b68c4046af74f49) fallocate(r3, 0x0, 0x0, 0x8800000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101142, 0x0) pidfd_getfd(0xffffffffffffffff, r4, 0x0) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x11, r4, 0x7fffffff) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(r5, 0xffffffffffffffff, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40000, 0xcb) close(r5) 01:55:21 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10012, 0x1000) 01:55:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x7, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0), 0x80c01, 0x0) r5 = openat$incfs(r4, &(0x7f00000001c0)='.log\x00', 0x802, 0x0) syncfs(r5) ioctl$FITRIM(r4, 0xc0185879, &(0x7f0000000100)={0xd, 0x2, 0x9}) signalfd(r1, &(0x7f0000000080)={[0x7f]}, 0x8) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000200)=""/16) fallocate(r2, 0x8, 0x2010003, 0x1003) bind$802154_dgram(r4, &(0x7f0000000180)={0x24, @long={0x3, 0xffff, {0xaaaaaaaaaaaa0102}}}, 0x14) r6 = syz_io_uring_setup(0x3619, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000040), &(0x7f0000000000)) r7 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r6, 0x7, &(0x7f0000000500)=r7, 0x1) io_uring_enter(r6, 0x76d3, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0xffff0001, &(0x7f0000000280)={0x0, 0xd695, 0x2, 0x3, 0x1e9, 0x0, r6}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000340)) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000003c0)={0x0, 0x2, 0x2, 0x81}) 01:55:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xff01) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:55:21 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x8) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:55:21 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:55:21 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, 0x0, 0x0, 0xcd00, 0x0, 0x0) [ 2810.077561] kmemleak: 17 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:55:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x4f000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:55:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(r4, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(r4, 0x4008f50a, &(0x7f0000000080)={0x2, 0xff}) fallocate(r2, 0x8, 0x10000, 0x1000) 01:55:43 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10110, 0x1000) 01:55:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_io_uring_setup(0x3619, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x7}, 0xe7) syz_memcpy_off$IO_URING_METADATA_FLAGS(r2, 0x118, &(0x7f0000000100)=0x1, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f0000000080)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x14}, 0x20) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x8800000) fallocate(r4, 0x8, 0x10000, 0x1000) 01:55:43 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:55:43 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, 0x0, 0x0, 0xcd00, 0x0, 0x0) 01:55:43 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x9) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:55:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x59030) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:55:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x59040) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:55:43 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xa) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:55:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x50000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:55:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x59050) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:55:43 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:55:43 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xb) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:55:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x50b40000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:55:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x61000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:55:43 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10500, 0x1000) 01:55:43 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 2831.606772] kmemleak: 52 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:56:04 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x11001, 0x1000) 01:56:04 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xc) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:56:04 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:56:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x61010) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:56:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x122) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) socket$netlink(0x10, 0x3, 0x14) 01:56:04 executing program 1: r0 = syz_open_dev$hidraw(&(0x7f0000000000), 0x2, 0x20000) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r0, 0x8010661b, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) copy_file_range(0xffffffffffffffff, 0x0, r1, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x2c52613a05c2a8ab) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) copy_file_range(r4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x300000000000000) getsockopt$inet_tcp_buf(r4, 0x6, 0xd, &(0x7f00000000c0)=""/45, &(0x7f0000000100)=0x2d) fallocate(r2, 0x8, 0x10000, 0x1000) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x200, 0x0) socketpair(0x1, 0xa, 0xe9, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$INCFS_IOC_PERMIT_FILL(r5, 0x40046721, &(0x7f0000000200)={r6}) pidfd_getfd(r3, r0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 01:56:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x6) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:56:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x64000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:56:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x7fc00500) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:56:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(r4, &(0x7f00000000c0)='./file0\x00', 0x0) mkdirat(r4, &(0x7f0000000080)='./file0\x00', 0x11) rename(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000200)) 01:56:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x7185f) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:56:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x6) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:56:05 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xd) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 2853.601556] kmemleak: 17 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:56:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) fcntl$setstatus(r1, 0x4, 0x24000) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) 01:56:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:56:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xe) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:56:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x81020000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:56:28 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x11100, 0x1000) 01:56:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x7186f) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:56:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r3 = creat(&(0x7f0000000080)='./file0\x00', 0xc2) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:56:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r2) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000180)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_TID_CONFIG(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={0x34, r6, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xa0}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5, 0xc, 0x2}]}]}]}, 0x34}}, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x38, r4, 0x100, 0x70bd25, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r7}, @val={0xc, 0x99, {0x7, 0x6c}}}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x3}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x9d4}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 01:56:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xf) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:56:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x7187f) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:56:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x86ffffff) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:56:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:56:29 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x10) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:56:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r2) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000180)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_TID_CONFIG(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={0x34, r6, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xa0}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5, 0xc, 0x2}]}]}]}, 0x34}}, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x38, r4, 0x100, 0x70bd25, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r7}, @val={0xc, 0x99, {0x7, 0x6c}}}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x3}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x9d4}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 01:56:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x88a61d00) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:56:29 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x7188f) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:56:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = signalfd4(r3, &(0x7f0000000080)={[0x10000]}, 0x8, 0x80000) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r4, 0x80489439, &(0x7f00000000c0)) fallocate(r3, 0x0, 0x9, 0x6) fallocate(r2, 0x8, 0x10000, 0x1000) 01:56:29 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x11200, 0x1000) 01:56:29 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xb0000, 0x210) fallocate(r2, 0x8, 0x10000, 0x1000) [ 2878.763948] kmemleak: 21 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:56:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x80000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:56:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x10) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:56:52 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x15090, 0x1000) 01:56:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:56:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r2) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000180)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_TID_CONFIG(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={0x34, r6, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xa0}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5, 0xc, 0x2}]}]}]}, 0x34}}, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x38, r4, 0x100, 0x70bd25, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r7}, @val={0xc, 0x99, {0x7, 0x6c}}}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x3}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x9d4}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 01:56:52 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x147143, 0x108) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x100010, r1, 0xe73c8000) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) readv(r2, &(0x7f0000000080)=[{&(0x7f0000000100)=""/113, 0x71}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x2) 01:56:52 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x12) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:56:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x90000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:56:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xa0000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:56:52 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x64) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:56:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file0/file0\x00'}) 01:56:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xb0e70300) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:56:52 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x102) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:56:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x7188f) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:56:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r3 = creat(&(0x7f0000000080)='./file0\x00', 0xc2) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:56:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x100000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 2904.193572] kmemleak: 19 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:57:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) clock_gettime(0x0, &(0x7f0000000800)={0x0, 0x0}) recvmmsg$unix(r0, &(0x7f0000000c80)=[{{&(0x7f0000000180), 0x6e, &(0x7f0000000200)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000280)=""/189, 0xbd}], 0x2}}, {{&(0x7f0000000340), 0x6e, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/76, 0x4c}, {&(0x7f0000000440)=""/2, 0x2}, {&(0x7f0000000480)=""/5, 0x5}], 0x3, &(0x7f0000000500)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x48}}, {{&(0x7f0000000580)=@abs, 0x6e, &(0x7f0000000640)=[{&(0x7f0000000600)=""/15, 0xf}], 0x1, &(0x7f0000000680)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc0}}, {{&(0x7f0000000940)=@abs, 0x6e, &(0x7f0000000b00)=[{&(0x7f00000009c0)=""/3, 0x3}, {&(0x7f0000000a00)=""/209, 0xd1}], 0x2, &(0x7f0000000d80)=ANY=[@ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="18000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="1c00000000000000070000e08162eb00886060155f6c7fad8027b036fb990be37ea76899ad7686d215068c3fc26787a417e30ceb232ef714b12ed19dcf4c590b81689a795556f134b93b8e", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x128}}], 0x4, 0x10000, &(0x7f0000000840)={r4, r5+60000000}) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x4008, &(0x7f0000000880)={[{@size={'size', 0x3d, [0x6d, 0x34, 0x67, 0x36]}}, {@huge_always}, {@nr_blocks={'nr_blocks', 0x3d, [0x6d, 0x33, 0x74, 0x32, 0x31, 0x35, 0x65]}}, {@huge_advise}, {@size={'size', 0x3d, [0x32]}}, {@huge_always}], [{@uid_gt={'uid>', 0xffffffffffffffff}}, {@fowner_eq={'fowner', 0x3d, r6}}, {@appraise_type}, {@fowner_gt={'fowner>', 0xee01}}, {@fsname={'fsname', 0x3d, '\\'}}]}) 01:57:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xc0810400) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:57:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r3 = creat(&(0x7f0000000080)='./file0\x00', 0xc2) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:57:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x102) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:57:18 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x103) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:57:18 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x1517f, 0x1000) 01:57:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(r0, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x80, 0x40, 0x8, 0x40, 0x0, 0x400, 0x88, 0x4, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x200, 0x9}, 0xa000, 0x80000000, 0x1ff, 0x2, 0x401, 0x2, 0x7f, 0x0, 0x1da, 0x0, 0x800}, 0x0, 0x0, r1, 0x3) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:57:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x100600) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:57:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xe) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:57:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xc0e70300) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:57:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x180000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:57:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xd0810400) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:57:18 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x110) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 2913.438679] tmpfs: Bad value for 'size' 01:57:18 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x1da) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 2925.837687] kmemleak: 20 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:57:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xd0e70300) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:57:39 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x17f51, 0x1000) 01:57:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r3 = creat(&(0x7f0000000080)='./file0\x00', 0xc2) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:57:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) utime(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)={0x7, 0x80}) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x1) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:57:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) r4 = socket$netlink(0x10, 0x3, 0x10) copy_file_range(r2, &(0x7f0000000080)=0x4, r4, &(0x7f00000000c0)=0x7f, 0x2b, 0x0) 01:57:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x1da688) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:57:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x201) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:57:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101142, 0x0) pidfd_getfd(0xffffffffffffffff, r3, 0x0) write$snapshot(r3, &(0x7f0000000080)="d4360a0a71d6425800ae100d41e0c1b0a87e581482ab945ec76bde886ebf523be41163136faec3728872721336ae00b396928690437a213d087ed94468afbe6c919a8f2b32d33f72d394929df85cad22d26e647df2f7f9bbd226e7cc", 0x5c) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) 01:57:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xda010000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:57:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x281) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:57:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x200000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:57:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101142, 0x0) pidfd_getfd(0xffffffffffffffff, r3, 0x0) write$snapshot(r3, &(0x7f0000000080)="d4360a0a71d6425800ae100d41e0c1b0a87e581482ab945ec76bde886ebf523be41163136faec3728872721336ae00b396928690437a213d087ed94468afbe6c919a8f2b32d33f72d394929df85cad22d26e647df2f7f9bbd226e7cc", 0x5c) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) 01:57:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x7681) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:57:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xe0810400) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:57:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x300) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:57:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x800000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:57:39 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x19050, 0x1000) 01:57:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x5, 0x0, 0x0, 0x0, 0x12345, 0x0, 0x0, 0x1}, 0x40) sendfile(0xffffffffffffffff, r1, &(0x7f0000000080)=0x81, 0x9) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) truncate(&(0x7f00000001c0)='./file0\x00', 0x7f) fallocate(r2, 0x8, 0x10000, 0x1000) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') ioctl$FAT_IOCTL_GET_ATTRIBUTES(r4, 0x80047210, &(0x7f0000000100)) r5 = socket$inet_udp(0x2, 0x2, 0x0) syz_io_uring_setup(0x1ce7, &(0x7f0000001280)={0x0, 0xb9c4, 0x1, 0x1, 0x6, 0x0, r3}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000001300)) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(r5, 0xffffffffffffffff, 0x0) pwrite64(r5, &(0x7f0000000280)="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", 0x1000, 0x5) 01:57:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x301) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:57:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000080)=@nfc_llcp={0x27, 0x1, 0x2, 0x3, 0xf7, 0x4, "e4053650fe6153bfd4d798319269e8aecb96871b87e8babaf5ba1d03b1b3c6fb6383ef709c38d56c1c1def228bd33e723e3011ad4ff9ac935e48303e1013e6", 0x39}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000180)="2fbf528a9086224da1cd38aae0dd3664d7363c6275ffbaae17906180c5c34209ee88fd59a09dd7b8a18695c9d46cda881a67c83734695af1b78c149bb9712f020243cec98196936d210a2b4927db9ac11e", 0x51}, {&(0x7f0000000100)="4e7bb1e7f09fe05aacfdd7dab0adac61f36e", 0x12}, {&(0x7f0000000200)="a971f082faeae0fa9d3f4fceb4728cbf354081aa2bfa33cc281180606ce2dc62dd28f2c2c7d92155dd59", 0x2a}, {&(0x7f0000000280)="98f77cdfb16b8b0b64bf6f1d5dda0e81fcdba942a1e7c67e9ff7947d9ea75a285c57eb312c10add18653283f09644641552bb147b2c9569bdb8f27387f3d4520d6c58b4b1cee49e12d88b17632c20f7f1d584ba04c2c5d3280180bac9e9c440f39b1b248f902", 0x66}, {&(0x7f0000000300)="164db5e1704d343e7d4dbe90eec6b3c0c04d4d57bdc06e44d7fcae3e7c320da4b5", 0x21}], 0x5, &(0x7f00000003c0)=[{0x108, 0x103, 0x7, "10224dc3d4c48ddc40e05fb115df7b39e782ef96afcdc4818357df9742f20c9e512300f4e966573d6a48bf97bad538364ee7b9bba329584bd27459eb18840cda9dbeb46bd2d6d4e14d34ca9ac891254b2154f7c2e2259fafe413df0b6db66731e127933fb0a6b8e9f91a586335f22e7e018a40a9f9f53c37968ac6ee9090e03c29dbb1197b9fc67587d752cddefbdc75f38eeedb1cefa16a678e740504dbaa8e51c07f6e021a9bc1c31d5f0cad48f4b2cd8b17ef32e911c46af698eac0ca7c2eda43930fd260de41d76ed53a000b2cd58fa373b0880fd4e0d8ee2d13f77ee139ff74075dc84f86ca323975ce4b1fe4ae9b8b58"}, {0x98, 0x10c, 0x0, "96f93728c7c1b8e37860588264dae8f67c1c45102d12704fa802001a70f10c010e8c0f9730b22da7c3b48d2156b8f9595f6b444fa252c04674f7dd5fb7ea8dd064b5166cb2bff0f7069f5706808bea4d9949cf1da7ac3d692b7672b805d5513092659126aa6f5f8b1a590909d5cb6b20086fd961e329d70e7a284f7d673b638e7e190a"}, {0x78, 0x118, 0xe3, "ceeb3ddd14048b5ec5dd9234e04a01fb3ecf7ed65fd3888b1a6cbe56ddf44ea9468586d589858da880837b07a3a07f3c349f0abc8befe1f5485e95785c6172779c2b56889399b3b16dad6f603db31718dbe8d2ab758738f14f2f6afd3c30d95e3f082cb2c052"}, {0x28, 0x88, 0x8001, "7680892ab291711dfd61425290160f71dfdb64b078"}, {0x60, 0x0, 0x858, "c52938bf0eeced1139cb23390604c13c31ae7d680f1711e8cc9ea4768a47251f0410f0a0180334652137b498cc4c96c3ba21e48489532480427edacf31268c59f26a6a8001f707b75317b7ea31abcb"}, {0x70, 0x10d, 0x633, "2da6c0fc62d7133d65b792973cfff538c7b568f2d27e4cf7b358152c436a93eadbc5db9bc8705d349abedf68abe5ca8d631aa02a57966bb1ba1ba26abcffbb5faeb667fd1cc43d4e386d7422fc03b42f621d0b46cc99daea85962c0323"}, {0x48, 0x103, 0x101, "23f6389080f514b85dc539636254e0f09ad18bb035de3aea967d733fc19f6102ed59e67f6a980576c7440ba01ae57b83e26857"}, {0xd0, 0x10b, 0x1, "4b98c9e75f4d4a14b08561f76af238dac1cfe3ccc60067df1bb8e73dc1b0380b45b895e14322416cf0966ef5c1aa5d03d058596fc16aed2a372ec583bf8b7cd9c7fdeaaba6e41d67d04c4e6b9d8705daba2904f722274524b8f9bebb637dc642e8e2e1ddbd3319e3c66dc971f6634e221e873542174981c9cf59eedd221ab1c27552970b5f96b82db82c34abe3824706d989ab0d76e53efc155df3f4404b99b621850ac42578352720c3cf87184a26f4d3b77687eadc5d5f9233496d36cfee"}], 0x428}, 0x200d4) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) 01:57:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x408) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:57:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101142, 0x0) pidfd_getfd(0xffffffffffffffff, r3, 0x0) write$snapshot(r3, &(0x7f0000000080)="d4360a0a71d6425800ae100d41e0c1b0a87e581482ab945ec76bde886ebf523be41163136faec3728872721336ae00b396928690437a213d087ed94468afbe6c919a8f2b32d33f72d394929df85cad22d26e647df2f7f9bbd226e7cc", 0x5c) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) [ 2947.259033] kmemleak: 54 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:57:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xe4ffffff) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:57:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x1000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:57:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = accept$unix(r0, &(0x7f00000001c0)=@abs, &(0x7f0000000280)=0x6e) write$binfmt_elf64(r1, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"/5552], 0x15b0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x200f5ef, 0x0) r3 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x8800000) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000014c0)={{{@in=@dev={0xac, 0x14, 0x14, 0x36}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(r5, 0xffffffffffffffff, 0x0) fstatfs(r5, &(0x7f0000000080)=""/170) openat(r2, &(0x7f0000000180)='./file0\x00', 0x141000, 0x1c) fallocate(r3, 0x8, 0x10000, 0x1000) 01:57:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) pread64(r2, &(0x7f0000000280)=""/200, 0xc8, 0xffffffff00000001) 01:57:59 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x500) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:57:59 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x5000000, 0x1000) 01:57:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x6400) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:57:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/166, 0xa6) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x4043c0, 0x0) ioctl$FIOCLEX(r4, 0x5451) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) 01:57:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x2000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:57:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000080)=@nfc_llcp={0x27, 0x1, 0x2, 0x3, 0xf7, 0x4, "e4053650fe6153bfd4d798319269e8aecb96871b87e8babaf5ba1d03b1b3c6fb6383ef709c38d56c1c1def228bd33e723e3011ad4ff9ac935e48303e1013e6", 0x39}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000180)="2fbf528a9086224da1cd38aae0dd3664d7363c6275ffbaae17906180c5c34209ee88fd59a09dd7b8a18695c9d46cda881a67c83734695af1b78c149bb9712f020243cec98196936d210a2b4927db9ac11e", 0x51}, {&(0x7f0000000100)="4e7bb1e7f09fe05aacfdd7dab0adac61f36e", 0x12}, {&(0x7f0000000200)="a971f082faeae0fa9d3f4fceb4728cbf354081aa2bfa33cc281180606ce2dc62dd28f2c2c7d92155dd59", 0x2a}, {&(0x7f0000000280)="98f77cdfb16b8b0b64bf6f1d5dda0e81fcdba942a1e7c67e9ff7947d9ea75a285c57eb312c10add18653283f09644641552bb147b2c9569bdb8f27387f3d4520d6c58b4b1cee49e12d88b17632c20f7f1d584ba04c2c5d3280180bac9e9c440f39b1b248f902", 0x66}, {&(0x7f0000000300)="164db5e1704d343e7d4dbe90eec6b3c0c04d4d57bdc06e44d7fcae3e7c320da4b5", 0x21}], 0x5, &(0x7f00000003c0)=[{0x108, 0x103, 0x7, "10224dc3d4c48ddc40e05fb115df7b39e782ef96afcdc4818357df9742f20c9e512300f4e966573d6a48bf97bad538364ee7b9bba329584bd27459eb18840cda9dbeb46bd2d6d4e14d34ca9ac891254b2154f7c2e2259fafe413df0b6db66731e127933fb0a6b8e9f91a586335f22e7e018a40a9f9f53c37968ac6ee9090e03c29dbb1197b9fc67587d752cddefbdc75f38eeedb1cefa16a678e740504dbaa8e51c07f6e021a9bc1c31d5f0cad48f4b2cd8b17ef32e911c46af698eac0ca7c2eda43930fd260de41d76ed53a000b2cd58fa373b0880fd4e0d8ee2d13f77ee139ff74075dc84f86ca323975ce4b1fe4ae9b8b58"}, {0x98, 0x10c, 0x0, "96f93728c7c1b8e37860588264dae8f67c1c45102d12704fa802001a70f10c010e8c0f9730b22da7c3b48d2156b8f9595f6b444fa252c04674f7dd5fb7ea8dd064b5166cb2bff0f7069f5706808bea4d9949cf1da7ac3d692b7672b805d5513092659126aa6f5f8b1a590909d5cb6b20086fd961e329d70e7a284f7d673b638e7e190a"}, {0x78, 0x118, 0xe3, "ceeb3ddd14048b5ec5dd9234e04a01fb3ecf7ed65fd3888b1a6cbe56ddf44ea9468586d589858da880837b07a3a07f3c349f0abc8befe1f5485e95785c6172779c2b56889399b3b16dad6f603db31718dbe8d2ab758738f14f2f6afd3c30d95e3f082cb2c052"}, {0x28, 0x88, 0x8001, "7680892ab291711dfd61425290160f71dfdb64b078"}, {0x60, 0x0, 0x858, "c52938bf0eeced1139cb23390604c13c31ae7d680f1711e8cc9ea4768a47251f0410f0a0180334652137b498cc4c96c3ba21e48489532480427edacf31268c59f26a6a8001f707b75317b7ea31abcb"}, {0x70, 0x10d, 0x633, "2da6c0fc62d7133d65b792973cfff538c7b568f2d27e4cf7b358152c436a93eadbc5db9bc8705d349abedf68abe5ca8d631aa02a57966bb1ba1ba26abcffbb5faeb667fd1cc43d4e386d7422fc03b42f621d0b46cc99daea85962c0323"}, {0x48, 0x103, 0x101, "23f6389080f514b85dc539636254e0f09ad18bb035de3aea967d733fc19f6102ed59e67f6a980576c7440ba01ae57b83e26857"}, {0xd0, 0x10b, 0x1, "4b98c9e75f4d4a14b08561f76af238dac1cfe3ccc60067df1bb8e73dc1b0380b45b895e14322416cf0966ef5c1aa5d03d058596fc16aed2a372ec583bf8b7cd9c7fdeaaba6e41d67d04c4e6b9d8705daba2904f722274524b8f9bebb637dc642e8e2e1ddbd3319e3c66dc971f6634e221e873542174981c9cf59eedd221ab1c27552970b5f96b82db82c34abe3824706d989ab0d76e53efc155df3f4404b99b621850ac42578352720c3cf87184a26f4d3b77687eadc5d5f9233496d36cfee"}], 0x428}, 0x200d4) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) 01:58:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xeff50002) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:58:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x200f5ef) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:58:00 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x600) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 2968.687770] kmemleak: 23 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:58:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x48, 0x2, 0x1001) 01:58:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x2010000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:58:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/166, 0xa6) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x4043c0, 0x0) ioctl$FIOCLEX(r4, 0x5451) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) 01:58:23 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat(r0, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) r3 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r3, 0x48, 0x3, 0x3ba4e955) 01:58:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000080)=@nfc_llcp={0x27, 0x1, 0x2, 0x3, 0xf7, 0x4, "e4053650fe6153bfd4d798319269e8aecb96871b87e8babaf5ba1d03b1b3c6fb6383ef709c38d56c1c1def228bd33e723e3011ad4ff9ac935e48303e1013e6", 0x39}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000180)="2fbf528a9086224da1cd38aae0dd3664d7363c6275ffbaae17906180c5c34209ee88fd59a09dd7b8a18695c9d46cda881a67c83734695af1b78c149bb9712f020243cec98196936d210a2b4927db9ac11e", 0x51}, {&(0x7f0000000100)="4e7bb1e7f09fe05aacfdd7dab0adac61f36e", 0x12}, {&(0x7f0000000200)="a971f082faeae0fa9d3f4fceb4728cbf354081aa2bfa33cc281180606ce2dc62dd28f2c2c7d92155dd59", 0x2a}, {&(0x7f0000000280)="98f77cdfb16b8b0b64bf6f1d5dda0e81fcdba942a1e7c67e9ff7947d9ea75a285c57eb312c10add18653283f09644641552bb147b2c9569bdb8f27387f3d4520d6c58b4b1cee49e12d88b17632c20f7f1d584ba04c2c5d3280180bac9e9c440f39b1b248f902", 0x66}, {&(0x7f0000000300)="164db5e1704d343e7d4dbe90eec6b3c0c04d4d57bdc06e44d7fcae3e7c320da4b5", 0x21}], 0x5, &(0x7f00000003c0)=[{0x108, 0x103, 0x7, "10224dc3d4c48ddc40e05fb115df7b39e782ef96afcdc4818357df9742f20c9e512300f4e966573d6a48bf97bad538364ee7b9bba329584bd27459eb18840cda9dbeb46bd2d6d4e14d34ca9ac891254b2154f7c2e2259fafe413df0b6db66731e127933fb0a6b8e9f91a586335f22e7e018a40a9f9f53c37968ac6ee9090e03c29dbb1197b9fc67587d752cddefbdc75f38eeedb1cefa16a678e740504dbaa8e51c07f6e021a9bc1c31d5f0cad48f4b2cd8b17ef32e911c46af698eac0ca7c2eda43930fd260de41d76ed53a000b2cd58fa373b0880fd4e0d8ee2d13f77ee139ff74075dc84f86ca323975ce4b1fe4ae9b8b58"}, {0x98, 0x10c, 0x0, "96f93728c7c1b8e37860588264dae8f67c1c45102d12704fa802001a70f10c010e8c0f9730b22da7c3b48d2156b8f9595f6b444fa252c04674f7dd5fb7ea8dd064b5166cb2bff0f7069f5706808bea4d9949cf1da7ac3d692b7672b805d5513092659126aa6f5f8b1a590909d5cb6b20086fd961e329d70e7a284f7d673b638e7e190a"}, {0x78, 0x118, 0xe3, "ceeb3ddd14048b5ec5dd9234e04a01fb3ecf7ed65fd3888b1a6cbe56ddf44ea9468586d589858da880837b07a3a07f3c349f0abc8befe1f5485e95785c6172779c2b56889399b3b16dad6f603db31718dbe8d2ab758738f14f2f6afd3c30d95e3f082cb2c052"}, {0x28, 0x88, 0x8001, "7680892ab291711dfd61425290160f71dfdb64b078"}, {0x60, 0x0, 0x858, "c52938bf0eeced1139cb23390604c13c31ae7d680f1711e8cc9ea4768a47251f0410f0a0180334652137b498cc4c96c3ba21e48489532480427edacf31268c59f26a6a8001f707b75317b7ea31abcb"}, {0x70, 0x10d, 0x633, "2da6c0fc62d7133d65b792973cfff538c7b568f2d27e4cf7b358152c436a93eadbc5db9bc8705d349abedf68abe5ca8d631aa02a57966bb1ba1ba26abcffbb5faeb667fd1cc43d4e386d7422fc03b42f621d0b46cc99daea85962c0323"}, {0x48, 0x103, 0x101, "23f6389080f514b85dc539636254e0f09ad18bb035de3aea967d733fc19f6102ed59e67f6a980576c7440ba01ae57b83e26857"}, {0xd0, 0x10b, 0x1, "4b98c9e75f4d4a14b08561f76af238dac1cfe3ccc60067df1bb8e73dc1b0380b45b895e14322416cf0966ef5c1aa5d03d058596fc16aed2a372ec583bf8b7cd9c7fdeaaba6e41d67d04c4e6b9d8705daba2904f722274524b8f9bebb637dc642e8e2e1ddbd3319e3c66dc971f6634e221e873542174981c9cf59eedd221ab1c27552970b5f96b82db82c34abe3824706d989ab0d76e53efc155df3f4404b99b621850ac42578352720c3cf87184a26f4d3b77687eadc5d5f9233496d36cfee"}], 0x428}, 0x200d4) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) 01:58:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xf0810400) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:58:23 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x700) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:58:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x3) 01:58:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x26a482, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(r4, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x401c5820, &(0x7f00000000c0)={0x80, 0x0, 0xfffffff9, 0x3, 0x1}) 01:58:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xf4ffffff) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:58:23 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x804) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:58:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x3000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:58:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(r2, &(0x7f00000000c0)='./file0\x00', 0x0) openat(r2, &(0x7f0000000080)='./file0\x00', 0x100, 0x9) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r3 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r3, 0x8, 0x10000, 0x1000) 01:58:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/166, 0xa6) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x4043c0, 0x0) ioctl$FIOCLEX(r4, 0x5451) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) 01:58:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000080)=@nfc_llcp={0x27, 0x1, 0x2, 0x3, 0xf7, 0x4, "e4053650fe6153bfd4d798319269e8aecb96871b87e8babaf5ba1d03b1b3c6fb6383ef709c38d56c1c1def228bd33e723e3011ad4ff9ac935e48303e1013e6", 0x39}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000180)="2fbf528a9086224da1cd38aae0dd3664d7363c6275ffbaae17906180c5c34209ee88fd59a09dd7b8a18695c9d46cda881a67c83734695af1b78c149bb9712f020243cec98196936d210a2b4927db9ac11e", 0x51}, {&(0x7f0000000100)="4e7bb1e7f09fe05aacfdd7dab0adac61f36e", 0x12}, {&(0x7f0000000200)="a971f082faeae0fa9d3f4fceb4728cbf354081aa2bfa33cc281180606ce2dc62dd28f2c2c7d92155dd59", 0x2a}, {&(0x7f0000000280)="98f77cdfb16b8b0b64bf6f1d5dda0e81fcdba942a1e7c67e9ff7947d9ea75a285c57eb312c10add18653283f09644641552bb147b2c9569bdb8f27387f3d4520d6c58b4b1cee49e12d88b17632c20f7f1d584ba04c2c5d3280180bac9e9c440f39b1b248f902", 0x66}, {&(0x7f0000000300)="164db5e1704d343e7d4dbe90eec6b3c0c04d4d57bdc06e44d7fcae3e7c320da4b5", 0x21}], 0x5, &(0x7f00000003c0)=[{0x108, 0x103, 0x7, "10224dc3d4c48ddc40e05fb115df7b39e782ef96afcdc4818357df9742f20c9e512300f4e966573d6a48bf97bad538364ee7b9bba329584bd27459eb18840cda9dbeb46bd2d6d4e14d34ca9ac891254b2154f7c2e2259fafe413df0b6db66731e127933fb0a6b8e9f91a586335f22e7e018a40a9f9f53c37968ac6ee9090e03c29dbb1197b9fc67587d752cddefbdc75f38eeedb1cefa16a678e740504dbaa8e51c07f6e021a9bc1c31d5f0cad48f4b2cd8b17ef32e911c46af698eac0ca7c2eda43930fd260de41d76ed53a000b2cd58fa373b0880fd4e0d8ee2d13f77ee139ff74075dc84f86ca323975ce4b1fe4ae9b8b58"}, {0x98, 0x10c, 0x0, "96f93728c7c1b8e37860588264dae8f67c1c45102d12704fa802001a70f10c010e8c0f9730b22da7c3b48d2156b8f9595f6b444fa252c04674f7dd5fb7ea8dd064b5166cb2bff0f7069f5706808bea4d9949cf1da7ac3d692b7672b805d5513092659126aa6f5f8b1a590909d5cb6b20086fd961e329d70e7a284f7d673b638e7e190a"}, {0x78, 0x118, 0xe3, "ceeb3ddd14048b5ec5dd9234e04a01fb3ecf7ed65fd3888b1a6cbe56ddf44ea9468586d589858da880837b07a3a07f3c349f0abc8befe1f5485e95785c6172779c2b56889399b3b16dad6f603db31718dbe8d2ab758738f14f2f6afd3c30d95e3f082cb2c052"}, {0x28, 0x88, 0x8001, "7680892ab291711dfd61425290160f71dfdb64b078"}, {0x60, 0x0, 0x858, "c52938bf0eeced1139cb23390604c13c31ae7d680f1711e8cc9ea4768a47251f0410f0a0180334652137b498cc4c96c3ba21e48489532480427edacf31268c59f26a6a8001f707b75317b7ea31abcb"}, {0x70, 0x10d, 0x633, "2da6c0fc62d7133d65b792973cfff538c7b568f2d27e4cf7b358152c436a93eadbc5db9bc8705d349abedf68abe5ca8d631aa02a57966bb1ba1ba26abcffbb5faeb667fd1cc43d4e386d7422fc03b42f621d0b46cc99daea85962c0323"}, {0x48, 0x103, 0x101, "23f6389080f514b85dc539636254e0f09ad18bb035de3aea967d733fc19f6102ed59e67f6a980576c7440ba01ae57b83e26857"}, {0xd0, 0x10b, 0x1, "4b98c9e75f4d4a14b08561f76af238dac1cfe3ccc60067df1bb8e73dc1b0380b45b895e14322416cf0966ef5c1aa5d03d058596fc16aed2a372ec583bf8b7cd9c7fdeaaba6e41d67d04c4e6b9d8705daba2904f722274524b8f9bebb637dc642e8e2e1ddbd3319e3c66dc971f6634e221e873542174981c9cf59eedd221ab1c27552970b5f96b82db82c34abe3824706d989ab0d76e53efc155df3f4404b99b621850ac42578352720c3cf87184a26f4d3b77687eadc5d5f9233496d36cfee"}], 0x428}, 0x200d4) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) 01:58:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xf5ffffff) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 2993.579436] kmemleak: 12 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:58:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x4000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:58:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(r2, 0xffffffffffffffff, 0x0) copy_file_range(r2, &(0x7f0000000180)=0x1, r0, 0x0, 0x1, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r3 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r5 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(r5, &(0x7f00000000c0)='./file0\x00', 0x0) openat(r5, &(0x7f0000000080)='./file0\x00', 0x40, 0x110) fallocate(r4, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r3, 0x8, 0x10000, 0x1000) openat(r5, &(0x7f00000001c0)='./file0\x00', 0x0, 0x62) 01:58:46 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) (fail_nth: 1) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:58:46 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x900) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:58:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x3, 0x10000, 0x1000) 01:58:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x305942, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) 01:58:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xfbffffff) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:58:46 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x9) [ 3001.424348] FAULT_INJECTION: forcing a failure. [ 3001.424348] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3001.426894] CPU: 1 PID: 46434 Comm: syz-executor.4 Not tainted 5.10.123 #1 [ 3001.428347] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 3001.430870] Call Trace: [ 3001.431439] dump_stack+0x107/0x163 [ 3001.432243] should_fail.cold+0x5/0xa [ 3001.433065] _copy_from_user+0x2e/0x1b0 [ 3001.433923] __copy_msghdr_from_user+0x91/0x4b0 [ 3001.434915] ? __ia32_sys_shutdown+0x70/0x70 [ 3001.435876] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3001.437007] ? __lock_acquire+0xbb1/0x5b00 [ 3001.437922] sendmsg_copy_msghdr+0xa1/0x160 [ 3001.438851] ? __ia32_sys_recvmmsg+0x260/0x260 [ 3001.439833] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3001.440949] ? SOFTIRQ_verbose+0x10/0x10 [ 3001.441825] ? lock_downgrade+0x6d0/0x6d0 [ 3001.442824] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3001.443950] ? SOFTIRQ_verbose+0x10/0x10 [ 3001.444823] ___sys_sendmsg+0xc6/0x170 [ 3001.445654] ? sendmsg_copy_msghdr+0x160/0x160 [ 3001.446630] ? __fget_files+0x26d/0x480 [ 3001.447477] ? lock_downgrade+0x6d0/0x6d0 [ 3001.448376] ? find_held_lock+0x2c/0x110 [ 3001.449260] ? __fget_files+0x296/0x480 [ 3001.450120] ? __fget_light+0xea/0x280 [ 3001.450961] __sys_sendmsg+0xe5/0x1b0 [ 3001.451774] ? __sys_sendmsg_sock+0xb0/0xb0 [ 3001.452715] ? rcu_read_lock_any_held+0x69/0x90 [ 3001.453717] ? fput_many+0x2f/0x1a0 [ 3001.454500] ? ksys_write+0x1a5/0x250 [ 3001.455321] ? rcu_read_lock_sched_held+0x3a/0x70 [ 3001.456366] do_syscall_64+0x33/0x40 [ 3001.457168] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3001.458272] RIP: 0033:0x7f5cd3300b19 [ 3001.459075] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3001.463044] RSP: 002b:00007f5cd0876188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3001.464685] RAX: ffffffffffffffda RBX: 00007f5cd3413f60 RCX: 00007f5cd3300b19 [ 3001.466213] RDX: 0000000010044001 RSI: 00000000200006c0 RDI: 0000000000000004 [ 3001.467743] RBP: 00007f5cd08761d0 R08: 0000000000000000 R09: 0000000000000000 [ 3001.469282] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3001.470805] R13: 00007ffe1d00e0ff R14: 00007f5cd0876300 R15: 0000000000022000 01:58:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(r4, 0xffffffffffffffff, 0x0) fcntl$dupfd(r4, 0x0, r1) 01:58:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x8) 01:58:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xfeffffff) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:58:47 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xa00) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:58:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x5000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:58:47 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:58:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x3, 0x10000, 0x1000) [ 3014.177924] kmemleak: 34 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:59:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) syncfs(r0) fallocate(r2, 0x8, 0x10000, 0x1000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000280)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private1}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f00000000c0)={@empty, r4}, 0x14) 01:59:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x3, 0x10000, 0x1000) 01:59:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x6000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:59:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xff000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:59:07 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xb00) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:59:07 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1a) 01:59:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = open(&(0x7f00000000c0)='./file1\x00', 0x40000, 0x41) creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(r2, &(0x7f0000000080)='./file0\x00', 0x101400, 0x10a) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="04000080ffffffffffffff696c653000"]) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(r4, 0xffffffffffffffff, 0x0) fallocate(r3, 0x12, 0x1000, 0xfffffffffffffffb) fallocate(r2, 0x8, 0x10000, 0x1000) 01:59:07 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:59:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xff010000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:59:07 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xc00) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:59:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x7000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:59:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xb00) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:59:07 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0xa, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) [ 3034.288977] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:59:27 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x240, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:59:27 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0xa, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:59:27 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0xf00) 01:59:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xffefffff) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:59:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x8000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:59:27 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xd00) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:59:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) execveat(r1, &(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)='+$:\x00', &(0x7f00000001c0)='{&\x00', &(0x7f0000000200)='!+\x00', &(0x7f0000000280)='\\-.\':.\x00'], &(0x7f0000000540)=[&(0x7f0000000300)='\\\x00', &(0x7f0000000340)='/\x00', &(0x7f0000000380)='\'/}#}\x00', &(0x7f00000003c0)='#\xf0\\@#', &(0x7f0000000400)='#\xb4$)\x00', &(0x7f0000000440)=')^\x00', &(0x7f0000000480)='\x84@\x00', &(0x7f00000004c0)='-&*}\x00', &(0x7f0000000500)='\x00'], 0x400) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000005c0)=0x2) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x40) openat(r4, &(0x7f00000000c0)='./file0\x00', 0xe4001, 0x0) fallocate(r2, 0x8, 0x10000, 0x1000) 01:59:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r1, 0xc4089434, &(0x7f0000000cc0)={0x0, 0xd3, 0x0, [0x8, 0x3, 0x800, 0x3f, 0x3], [0x5, 0xbc79, 0x2, 0x7f, 0x20, 0x58c, 0x4185, 0x3, 0x3, 0xfffffffffffffffa, 0x100000000, 0x5, 0x2, 0x0, 0x446, 0x5, 0x0, 0x917, 0x4, 0x9, 0x0, 0xfffffffffffffffc, 0x4, 0x5, 0x1f, 0x5, 0x29e, 0x8, 0x2, 0x2, 0x4, 0x100000000, 0x3, 0x5a, 0x6, 0x2, 0xad, 0x6, 0x5, 0x63, 0xcac, 0x9, 0x3, 0x0, 0x4, 0x4, 0x1f, 0x6, 0x9, 0xee0, 0x5, 0x0, 0x7, 0x5, 0xfffffffffffffffb, 0x6, 0x6c, 0x3, 0x7ff, 0xfff, 0x80000001, 0x0, 0x1000, 0x10001, 0x4, 0x5, 0x8, 0x8, 0xcf, 0x2, 0x2, 0x0, 0xf3, 0x20, 0x2, 0x7, 0xe4b, 0x5, 0x6, 0xfffffffffffff000, 0x7, 0x5, 0x6, 0x7, 0x2, 0xfffffffffffffffb, 0x1, 0x4, 0x7606, 0x3, 0x5, 0x5, 0x27e0, 0x7f, 0x9, 0xffffffffffff8001, 0x5, 0x101, 0xb8, 0x0, 0x5, 0x5, 0x9, 0xfaf, 0x8, 0x7ff, 0x9d92, 0xdd32, 0x6553, 0x1000, 0x9, 0x0, 0xe4, 0xfffffffffffffff8, 0x3, 0x800, 0xfffffffffffffffd, 0x800000000000000, 0x4, 0x5, 0x3]}) ioctl$BTRFS_IOC_DEV_REPLACE(r1, 0xca289435, &(0x7f0000001100)={0x2, 0x0, @start={r3, 0x0, "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", "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"}, [0xfff, 0x5, 0x7, 0x3f, 0x200, 0x3, 0x6, 0xffff, 0x106b, 0x3, 0xd9f6, 0x6, 0x3ff, 0x1ea1, 0x69f3, 0xffffffff, 0x1, 0x200, 0x101, 0x7fff, 0x3ff, 0x4, 0x0, 0x0, 0x1f, 0x100000000, 0x5, 0xe088, 0x0, 0x7, 0x800, 0x8000000000, 0x8, 0xfffffffffffffffd, 0x7ff, 0xbe, 0x5, 0x800, 0x4, 0xffff, 0x7f, 0x1f, 0x8000, 0x2106f954, 0x3, 0x6, 0xee8, 0xffffffffffff8001, 0x7f2e, 0x6, 0x6, 0x9, 0x4, 0x1, 0x7f, 0xffffffffffffffe1, 0x1f, 0x1, 0x4, 0x1, 0x2b80, 0xe0, 0x8, 0x2]}) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) 01:59:27 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xe00) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:59:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xffffefff) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:59:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(r4, 0xffffffffffffffff, 0x0) fcntl$dupfd(r4, 0x0, r1) 01:59:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x8040000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:59:27 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0xa00, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:59:27 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1002) 01:59:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x8800000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:59:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xffffff7f) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:59:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xf00) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:59:28 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2040, 0x100) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x182, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(r2, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_user}, {@debug={'debug', 0x3d, 0x32c9}}, {@privport}, {@cache_none}], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@fsname}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) r3 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r4, 0x58, 0x0, 0x8800000) fallocate(r3, 0x8, 0x10000, 0x1000) 01:59:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x1c6) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) 01:59:28 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x4002, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:59:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(r4, 0xffffffffffffffff, 0x0) fcntl$dupfd(r4, 0x0, r1) 01:59:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xffffff86) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:59:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x1001) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 3056.114362] kmemleak: 29 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:59:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(r4, 0xffffffffffffffff, 0x0) fcntl$dupfd(r4, 0x0, r1) 01:59:51 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0xa000000, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:59:51 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1004) 01:59:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x400000, 0x40) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = getegid() setresgid(r2, r2, 0x0) chown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, r2) r3 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r3, 0x8, 0x10000, 0x1000) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x6c, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x0, @in6=@private2}}, 0xe8) close_range(r5, 0xffffffffffffffff, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(r6, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_START_SYNC(r6, 0x80089418, &(0x7f00000000c0)) ioctl$EXT4_IOC_MIGRATE(r5, 0x6609) 01:59:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xffffffe4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:59:51 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x10b2) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:59:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x9000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:59:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) 01:59:51 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x1200) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:59:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xa000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:59:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x125) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 01:59:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xfffffff4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 01:59:51 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x40020000, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 01:59:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) execveat(r1, &(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)='+$:\x00', &(0x7f00000001c0)='{&\x00', &(0x7f0000000200)='!+\x00', &(0x7f0000000280)='\\-.\':.\x00'], &(0x7f0000000540)=[&(0x7f0000000300)='\\\x00', &(0x7f0000000340)='/\x00', &(0x7f0000000380)='\'/}#}\x00', &(0x7f00000003c0)='#\xf0\\@#', &(0x7f0000000400)='#\xb4$)\x00', &(0x7f0000000440)=')^\x00', &(0x7f0000000480)='\x84@\x00', &(0x7f00000004c0)='-&*}\x00', &(0x7f0000000500)='\x00'], 0x400) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000005c0)=0x2) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x40) openat(r4, &(0x7f00000000c0)='./file0\x00', 0xe4001, 0x0) fallocate(r2, 0x8, 0x10000, 0x1000) 01:59:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xfffffff5) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 3079.999789] kmemleak: 12 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:00:14 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x2000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:00:14 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) (fail_nth: 1) 02:00:14 executing program 5: ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BLKROSET(r0, 0x125d, &(0x7f00000000c0)=0x8) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) r3 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r4, 0x2d, 0x0, 0xff) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r3, 0x8, 0x10000, 0x1000) 02:00:14 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1005) 02:00:14 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0xffffff7f, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 02:00:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xfffffffb) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:00:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xb000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:00:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x400000, 0x1e) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(r4, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000080)={0x0, 0x2, 0x0, 0xfff}) fallocate(r2, 0x8, 0x10000, 0x1000) 02:00:14 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x20b2) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:00:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xfffffffe) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:00:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x4000, 0x1a) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) execveat(r2, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=[&(0x7f0000000180)='\x00'], &(0x7f0000000280)=[&(0x7f0000000200)='\x00'], 0x1000) readv(r0, &(0x7f00000007c0)=[{&(0x7f00000002c0)=""/253, 0xfd}, {&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f0000000480)=""/40, 0x28}, {&(0x7f00000004c0)=""/124, 0x7c}, {&(0x7f00000015c0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/74, 0x4a}, {&(0x7f00000005c0)=""/214, 0xd6}, {&(0x7f00000006c0)=""/244, 0xf4}], 0x8) syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x3, 0x0, r1, 0x0, 0x0, 0x0, 0x1, 0x1, {0x2}}, 0x2) r3 = creat(&(0x7f0000000240)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(r4, 0xffffffffffffffff, 0x0) fallocate(r4, 0x55, 0x1, 0xfffffffffffffff9) fallocate(r3, 0x8, 0x10000, 0x1000) 02:00:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xc000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:00:15 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0x7ffff000}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 02:00:15 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 02:00:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xd000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:00:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x10000000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 3102.531053] kmemleak: 30 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:00:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file2\x00', 0x3850c2, 0xc6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) r5 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) copy_file_range(r5, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x300000000000000) sendmsg$IPSET_CMD_SWAP(r5, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x3001c0}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x54, 0x6, 0x6, 0x101, 0x0, 0x0, {0x7, 0x0, 0x3}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x24004000}, 0x4) stat(&(0x7f00000002c0)='./file2\x00', &(0x7f0000000300)) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r4, 0x3, 0xfffffffffffffff8, 0x5, 0x1}) fallocate(r2, 0x8, 0x10000, 0x1000) 02:00:38 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x3f00) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:00:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x40000000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:00:38 executing program 3: r0 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x10100, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000580)={0x120, r4, 0x1, 0x70bd28, 0x25dfdbfc, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8}, {0x11}}, {0x8}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8}, {0x11}}, {0x8}}}]}, 0x120}, 0x1, 0x0, 0x0, 0x20040800}, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x2000002, @mcast2, 0x8}, 0xfffffffffffffe34) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r5 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r5, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 02:00:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xd010000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:00:38 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1008) 02:00:38 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0x11fffffaf}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 02:00:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 02:00:38 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x4000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:00:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xe000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:00:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) 02:00:38 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x8}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 02:00:38 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @remote}, 0x1c) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 02:00:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xf000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 3118.165441] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 3125.751090] kmemleak: 20 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:01:01 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0xa}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 02:01:01 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x6400) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:01:01 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1010) 02:01:01 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 02:01:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x50000000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:01:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) ioctl$RTC_VL_CLR(r0, 0x7014) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(r4, 0xffffffffffffffff, 0x0) write$binfmt_script(r4, &(0x7f0000000080)={'#! ', './file0', [{0x20, '^\'],'}, {0x20, '}'}, {}, {0x20, '@'}], 0xa, "21ed6c6ced5ee1aecb2c22f873e284689ff45a6c26e3e17158aff51218d54cdbcf854e9e78166cb243a4afed338cf0d2aa8d0ac72b63f69703b97b8eb255ffc4fe62a8355e740d2a8fe96a9750ee2f0fc7b472df849f12d31ec9f8c4e64d9aa3896f988f6e97193cb4f1aaeec738c93eb93bc6c88c685222a34188ae529cf6a1ef6b090dadfa042a8132d8e250ad1c6278a9d9f6"}, 0xa9) 02:01:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000040c0)=[{{&(0x7f0000000080), 0x6e, &(0x7f0000000840)=[{&(0x7f0000000280)=""/227, 0xe3}, {&(0x7f0000000380)=""/213, 0xd5}, {&(0x7f0000000180)=""/98, 0x62}, {&(0x7f0000000480)=""/105, 0x69}, {&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000580)=""/250, 0xfa}, {&(0x7f0000000680)=""/197, 0xc5}, {&(0x7f0000000780)=""/183, 0xb7}], 0x9}}, {{&(0x7f0000000900), 0x6e, &(0x7f0000000ec0)=[{&(0x7f0000000980)=""/194, 0xc2}, {&(0x7f0000000a80)=""/204, 0xcc}, {&(0x7f0000000b80)=""/176, 0xb0}, {&(0x7f0000000c40)=""/219, 0xdb}, {&(0x7f0000000d40)=""/101, 0x65}, {&(0x7f0000000dc0)=""/73, 0x49}, {&(0x7f0000000e40)=""/86, 0x56}, {&(0x7f0000000200)=""/45, 0x2d}], 0x8, &(0x7f0000000f40)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x160}}, {{&(0x7f00000010c0)=@abs, 0x6e, &(0x7f00000023c0)=[{&(0x7f0000001140)=""/150, 0x96}, {&(0x7f0000001200)=""/18, 0x12}, {&(0x7f0000001240)=""/51, 0x33}, {&(0x7f0000001280)=""/48, 0x30}, {&(0x7f00000012c0)=""/66, 0x42}, {&(0x7f0000001340)=""/101, 0x65}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x7, &(0x7f0000002440)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xe0}}, {{&(0x7f0000002540), 0x6e, &(0x7f00000035c0)=[{&(0x7f00000025c0)=""/4096, 0x1000}], 0x1, &(0x7f0000003600)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x38}}, {{&(0x7f0000003640), 0x6e, &(0x7f0000003740)=[{&(0x7f00000036c0)=""/10, 0xa}, {&(0x7f0000003700)=""/35, 0x23}], 0x2, &(0x7f0000003780)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x138}}, {{&(0x7f00000038c0), 0x6e, &(0x7f0000003b40)=[{&(0x7f0000003940)=""/201, 0xc9}, {&(0x7f0000003a40)=""/242, 0xf2}], 0x2}}, {{&(0x7f0000003b80)=@abs, 0x6e, &(0x7f0000003f40)=[{&(0x7f0000003c00)=""/138, 0x8a}, {&(0x7f0000003cc0)=""/169, 0xa9}, {&(0x7f0000003d80)=""/49, 0x31}, {&(0x7f0000003dc0)=""/60, 0x3c}, {&(0x7f0000003e00)=""/127, 0x7f}, {&(0x7f0000003e80)=""/179, 0xb3}], 0x6, &(0x7f0000003fc0)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe0}}], 0x7, 0x40000000, &(0x7f0000004280)) fallocate(r2, 0x8, 0x10000, 0x1000) 02:01:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xf010000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:01:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x10000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:01:01 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x7681) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:01:01 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0x240}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 02:01:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x10100600) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:01:01 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0e0000008a2700"/20], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 02:01:01 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1011) 02:01:02 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x8008) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:01:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x12000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:01:02 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xffffffff000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:01:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sysvipc/shm\x00', 0x0, 0x0) sendmsg$NL80211_CMD_GET_MESH_CONFIG(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x20, 0x0, 0xa511ba332633a85e, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x9, 0x43}}}}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x24000850}, 0x4044004) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) [ 3148.371869] kmemleak: 23 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:01:21 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1012) 02:01:21 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0xa00}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 02:01:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) syz_io_uring_setup(0x3619, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x7}, 0xe7) syz_memcpy_off$IO_URING_METADATA_FLAGS(r1, 0x118, &(0x7f0000000100)=0x1, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000080)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index=0x6, 0x0, 0x0, 0x800, 0x9, 0x1}, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r0, 0x0, 0x200f5ef, 0x0) r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(r6, 0xffffffffffffffff, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(r7, 0xffffffffffffffff, 0x0) copy_file_range(r6, &(0x7f00000001c0)=0x1, r7, &(0x7f0000000280)=0x1, 0x10001, 0x0) fallocate(r5, 0x0, 0x0, 0x8800000) fallocate(r4, 0x8, 0x10000, 0x1000) 02:01:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x800800000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:01:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x4) socketpair(0x1f, 0x5, 0xc0000000, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r4, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/123, 0x7b}, {&(0x7f0000000180)=""/152, 0x98}, {&(0x7f0000000280)=""/157, 0x9d}], 0x3) fallocate(r2, 0x8, 0x10000, 0x1000) 02:01:21 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x9}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 02:01:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x20000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:01:21 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x8102) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:01:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x30000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:01:21 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x8176) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:01:21 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0x4002}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 02:01:22 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xb210) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) [ 3177.258541] kmemleak: 139 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:01:51 executing program 3: ioctl$TIOCL_SETVESABLANK(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 02:01:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) inotify_add_watch(r4, &(0x7f00000000c0)='./file0\x00', 0x200000c2) fallocate(r2, 0x8, 0x10000, 0x1000) 02:01:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x30900500) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:01:51 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0xa000000}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 02:01:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x1000000000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:01:51 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x3b19) 02:01:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) ftruncate(r2, 0x4) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r3 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x40, 0x0, 0x7}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000100)) r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x8800000) fallocate(r4, 0x8, 0x10000, 0x1000) 02:01:51 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xb220) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:01:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x3f000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:01:51 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xda01) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:01:51 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0x40020000}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 02:01:51 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000600)={0x28, 0x0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5}, @ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x28}}, 0x0) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f00000005c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000580)={&(0x7f0000001e00)=ANY=[@ANYBLOB="20040000", @ANYRES16=0x0, @ANYBLOB="100127bd7000ffdbdf25000000000800080005c4a4894990b39c336db7c845dccc5fd3af51216b48846798077c2216425a513c04ad02c46ca53c3246dba6a4dab792dbd376b08e60a4b28c", @ANYRES32=0x0, @ANYBLOB="540102803c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b000000080004000500000008000700000000005c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000002c0004001f320680040000008100ddfede000000ff0f2006010400000900015002000000ff7f02810500000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000100000008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000500000008000100", @ANYRES32=0x0, @ANYBLOB="7c00028038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000800000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000001000008000600", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="280102803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000050003000300000008000400020000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000100000008000100", @ANYRES32=0x0, @ANYBLOB="f400028040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000000004008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004000300000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000200000008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c000000000000000000000005000300030000000800040004000000"], 0x420}, 0x1, 0x0, 0x0, 0x40000}, 0x8800) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 02:01:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x40000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:01:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x8000000000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:01:51 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x8f00) 02:01:51 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xff01) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:01:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x8, 0x13, r0, 0x8000000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_io_uring_setup(0x3619, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000040), &(0x7f0000000000)) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r3, 0x7, &(0x7f0000000500)=r4, 0x1) io_uring_enter(r3, 0x76d3, 0x0, 0x0, 0x0, 0x0) r5 = syz_io_uring_setup(0x714b, &(0x7f0000000180)={0x0, 0x3, 0x0, 0x3, 0x35d, 0x0, r3}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r2, 0x0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, {0x0, r8}}, 0x0) lsetxattr$security_evm(&(0x7f0000000100)='./file0\x00', &(0x7f0000000280), &(0x7f00000002c0)=@v1={0x2, "5df4f02befdf239816f1f86b2b7bc8"}, 0x10, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000080)=@IORING_OP_MADVISE={0x19, 0x4, 0x0, 0x0, 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x11, 0x1, {0x0, r8}}, 0x7fffffff) r9 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r9, 0x0, r0, 0x0, 0x200f5ef, 0x0) r10 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r11 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r11, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fadvise64(r0, 0x6759, 0x24, 0x3) fallocate(r10, 0x8, 0x10000, 0x1000) [ 3198.439407] kmemleak: 26 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:02:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x80) inotify_rm_watch(r3, 0x0) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) r5 = dup2(0xffffffffffffffff, r4) ioctl$AUTOFS_DEV_IOCTL_VERSION(r5, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) r6 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(r6, &(0x7f00000000c0)='./file0\x00', 0x0) openat(r6, &(0x7f0000000100)='./file0\x00', 0x202000, 0x103) fallocate(r2, 0x8, 0x10000, 0x1000) 02:02:12 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x9000) 02:02:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x40900500) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:02:12 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f0000000000000062c9bfe1e41576af2cb40afc9e0c62cbfe10e36bdc39e7620521e695a5ab96ff8a428a8924c0b4"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000001700)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000001e00)={{}, r4, 0x14, @unused=[0x7fffffff, 0x7, 0x2, 0x4], @name="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"}) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r5, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 02:02:12 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x13800) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:02:12 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0xffffff7f}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 02:02:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xa000000000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:02:12 executing program 1: sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x28, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0xffffffffffffffe9, 0x4, 0x800}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}]}, 0x28}, 0x1, 0x0, 0x0, 0x20001800}, 0x20004c40) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480), &(0x7f00000004c0)={'L+', 0x38db400000000000}, 0x16, 0x1) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@private2}}, 0xe8) close_range(r5, 0xffffffffffffffff, 0x0) sendfile(r5, r2, &(0x7f0000000280)=0x9, 0x906) stat(&(0x7f00000001c0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r6, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x139080a, &(0x7f0000000180)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB="2c6e6f657874656e642c63616368657461673d232f5d2307b76465766d61702c6d61736b3d4d41595f415050454e442c7365636c6162656c2c6d61736b3d5e4d41595f524541442c657569643d", @ANYRESDEC=r6, @ANYBLOB=',\x00']) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r2, 0x8, 0x10000, 0x1000) 02:02:13 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0xa00000000000000}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 02:02:13 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x13810) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:02:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x50000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:02:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x50900500) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:02:13 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x13820) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:02:13 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001e00210e0000008a2f00000000000000"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0x4002000000000000}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) 02:02:13 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001e00)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f0000001fc0)=ANY=[@ANYBLOB="2c050000", @ANYRES16=0x0, @ANYBLOB="000125bd7000ffdbdf25080000003c0002802c000380280001800500020000000000080001000000000004000300080001000400000008000100000000000400010006000500c45700004000018008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000300010000001400020067726530000000000000000000000000080003000600000008000100", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="140002006d6163766c616e300000000000000000"], 0x52c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) recvfrom$inet6(r3, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) ptrace(0x10, r4) 02:02:13 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) r4 = accept$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) fremovexattr(r4, &(0x7f0000000180)=@known='system.posix_acl_access\x00') 02:02:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000040)={0x9, 0x1, 0x9, 0x9}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x17c) fallocate(r3, 0x0, 0x0, 0x8800000) fchmod(r1, 0x180) truncate(&(0x7f0000001580)='./file0\x00', 0x80) fallocate(r2, 0x8, 0x10000, 0x1000) 02:02:13 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x10000000000000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) 02:02:13 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x13830) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) BUG: leak checking failed VM DIAGNOSIS: 02:02:14 Registers: info registers vcpu 0 RAX=0000000000000001 RBX=6f6b9b0db4271c3f RCX=ffff88800f867c00 RDX=1ffff11002d86dd4 RSI=0000000000000000 RDI=ffff888016c36ea0 RBP=1ffff11001f0cf78 RSP=ffff88800f867bb0 R8 =0000000000000000 R9 =0000000000000000 R10=0000000000000001 R11=0000000000000001 R12=0000000000000001 R13=0000000000000002 R14=ffff888016c36ea8 R15=ffff888016c36600 RIP=ffffffff812698f4 RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f16637578c0 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffff9176cf8 CR3=000000000c8d6000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 2525252525252525 2525252525252525 YMM01=0000000000000000 0000000000000000 0000000000000000 00000000000000ff YMM02=0000000000000000 0000000000000000 0000000000000000 00000000000000ff YMM03=0000000000000000 0000000000000000 747269762f736563 697665642f737973 YMM04=0000000000000000 0000000000000000 0000000300000000 000055c8f646f450 YMM05=0000000000000000 0000000000000000 000055c8f6459540 000055c8f646f0d0 YMM06=0000000000000000 0000000000000000 0000000000000000 ffffffff00000003 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 2064616572206f74 2064656c69614600 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000001f217e0 RBX=0000000001f217e0 RCX=000000c000001800 RDX=00007f4071c477d0 RSI=0000000000000000 RDI=0000000000000010 RBP=000000c0008a9040 RSP=000000c0008a8fb0 R8 =000000000093a1c0 R9 =0000000000000001 R10=000000c004ebdc10 R11=0000000000000001 R12=ffffffffffffffff R13=00000000000001c2 R14=00000000000001c1 R15=0000000000000200 RIP=000000000040c47c RFL=00000246 [---Z-P-] CPL=3 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0033 0000000000000000 ffffffff 00a0fb00 DPL=3 CS64 [-RA] SS =002b 0000000000000000 ffffffff 00c0f300 DPL=3 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000001f21870 00000000 00000000 GS =0000 0000000000000000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000555556597c58 CR3=000000000f212000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 000000c001273320 0000000000ea8a40 YMM01=0000000000000000 0000000000000000 c2908be170b69e2d 61e2ffb211ca463e YMM02=0000000000000000 0000000000000000 0000000000000000 416f72dd00000000 YMM03=0000000000000000 0000000000000000 9d815872efb875a0 28fe1c142ff78b5f YMM04=0000000000000000 0000000000000000 98976b79687d2195 ac0846b113e2292b YMM05=0000000000000000 0000000000000000 6ec57f7b90420987 3870cc3f98283e22 YMM06=0000000000000000 0000000000000000 bacf6774264e5a18 c3fd55ff2f020655 YMM07=0000000000000000 0000000000000000 4e9952c5ecc46e21 47cba0de8d9f10c9 YMM08=0000000000000000 0000000000000000 8323b0bfbec4843a 1a9e808088a7ab4d YMM09=0000000000000000 0000000000000000 d2be93758c25f8e3 1914e8737dcf332c YMM10=0000000000000000 0000000000000000 b7ae988ce6748fa7 2d23187b60fe09a8 YMM11=0000000000000000 0000000000000000 da395051d2b5a42e ccf44cdec82cc69f YMM12=0000000000000000 0000000000000000 c4a800459345060c cfca7a64bf2f8dd0 YMM13=0000000000000000 0000000000000000 5cff5ac39b0c9b15 5593c44c8379b8d4 YMM14=0000000000000000 0000000000000000 fbe4f9f9e856078e 6ea96366c7e6839d YMM15=0000000000000000 0000000000000000 8051363d3b9bcd5b 391d4bf975ab7e2b